00080), &(0x7f0000001240)='./file0\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0xff, 0x11fc, &(0x7f0000001280)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_elf64(r0, &(0x7f00000004c0)=ANY=[], 0xab4) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.current\x00', 0x275a, 0x0) 05:43:47 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x11, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, 0x88) 05:43:47 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'geneve0\x00'}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x2}, 0x0) 05:43:47 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x127f) 05:43:47 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000005480)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="9041", 0xffc3}], 0x1}}, {{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000600)='\r', 0x1}], 0x1}}], 0x2, 0x0) 05:43:47 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x2, 0x4, 0x600, 0xffff, 0x14}, 0x48) 05:43:47 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'geneve0\x00'}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x2}, 0x0) 05:43:47 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x24, 0x4, 0x8, 0x201, 0x0, 0x0, {}, [@CTA_TIMEOUT_L3PROTO={0x6}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x1}]}, 0x24}}, 0x0) 05:43:47 executing program 5: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/netstat\x00') syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/netstat\x00') 05:43:47 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000005480)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="9041", 0xffc3}], 0x1}}, {{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000600)='\r', 0x1}], 0x1}}], 0x2, 0x0) 05:43:47 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'geneve0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GENEVE_TTL={0x5}, @IFLA_GENEVE_ID={0x8}]}}}]}, 0x44}, 0x1, 0x2}, 0x0) 05:43:47 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x2, &(0x7f0000000000)=@raw=[@alu={0x4}, @ldst], &(0x7f0000000080)='syzkaller\x00', 0x6, 0xc4, &(0x7f0000000180)=""/196, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 293.148969][T14581] loop0: detected capacity change from 0 to 8192 05:43:47 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000001240)='./file0\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0xff, 0x11fc, &(0x7f0000001280)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_elf64(r0, &(0x7f00000004c0)=ANY=[], 0xab4) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.current\x00', 0x275a, 0x0) 05:43:47 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000), 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000005480)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="9041", 0xffc3}], 0x1}}, {{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000600)='\r', 0x1}], 0x1}}], 0x2, 0x0) 05:43:47 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={0x50, 0x1, 0x2, 0x3, 0x0, 0x0, {0xa}, [@CTA_EXPECT_MASTER={0x3c, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x300}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1}, {0x14, 0x4, @remote}}}]}]}, 0x50}}, 0x0) 05:43:47 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'geneve0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GENEVE_TTL={0x5}, @IFLA_GENEVE_ID={0x8}]}}}]}, 0x44}, 0x1, 0x2}, 0x0) 05:43:47 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000003680)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x4c, 0x12, 0x301, 0x0, 0x0, {0x2a}}, 0x4c}}, 0x0) [ 293.269519][T14619] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.5'. [ 293.284465][T14619] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.5'. 05:43:47 executing program 4: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001100)={&(0x7f0000001080)={0x28, 0x14, 0x1, 0x0, 0x0, {0x1}, [@INET_DIAG_REQ_BYTECODE={0x11, 0x1, "658855000000269d006bd666b1"}]}, 0x28}}, 0x0) 05:43:47 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000), 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000005480)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="9041", 0xffc3}], 0x1}}, {{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000600)='\r', 0x1}], 0x1}}], 0x2, 0x0) 05:43:47 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'\x00', 0x4009}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) write$tun(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="000086dd00002800000000000000607702cc0f982c0a02bedfe45746bcaf16f36ca22d6110472f26c1d0b7b92d158e9aef03bf96d8a4783c28"], 0xfce) 05:43:47 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'geneve0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GENEVE_TTL={0x5}, @IFLA_GENEVE_ID={0x8}]}}}]}, 0x44}, 0x1, 0x2}, 0x0) 05:43:47 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x3, 0xff8, &(0x7f00000017c0)=""/4088, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:43:47 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000001240)='./file0\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0xff, 0x11fc, &(0x7f0000001280)="$eJzs3E9rHHUYB/CnTWrT1PxRa7UF8UEvehmbHDx5CdKCGFCqKaggTM1Gl0x2w84SWBGrJ6++DFGP3gTxDeTixbPgRXLx2IM40p1oTV0FLbhp+Xwu87Az3+UZBhZ+y++Zgxc+3dneqoutchgnT5yI2d1TkTczMk7GTLQ+imevff/DE6+98ebLa+vrl69mXll7feX5zFx88pu3PvjyqW+HZ699tfj16dhffvvg59Uf98/vXzj49Yvo1tmts9cfZpnX+/1heb3q5Ga33i4yX606Zd3Jbq/uDI6c36r6u7ujLHubC/O7g05dZ9kb5XZnlMN+DgejLN8tu70siiIX5oO7sfH5zaZpIprmVDwQTdM0Z2I+zsaDsRCLsRTL8VA8HI/EuXg0zsdj8XhcGF817b4BAAAAAAAAAAAAAAAAAADg/mL+HwAAAAAAAAAAAAAAAAAAAKbP/D8AAAAAAAAAAAAAAAAAAABMn/l/AAAAAAAAAAAAAAAAAAAAOAbm2sPVzLmInU/2NvY22mP7+dpWdKOKTlyKpfglxtP/rba+8tL65Us5thzP7dw4zN/Y25g5ml8Zv05gYn6lzefR/OmY/3N+NZbi3OT86sT8XDzz9K38x22+iKX47p3oRxWbcSt7O//hSuaLr6zfkb84vg4AAADuB0X+YeL6vSj+7nybP1yf5+/f9w//D9yxvp6Ni7NTu20O1aP3t8uq6gwUd1HMHI822sIzrX767Fi0cU8X0/5l4v9w+6FPuxMAAAAAAAAAAAD+jYm7/85ExF/2A773n7cTTvseAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPiNHTgWAAAAABDmb51GxwYAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwFUBAAD///PO7J0=") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.current\x00', 0x275a, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[], 0xab4) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.current\x00', 0x275a, 0x0) [ 293.360788][T14622] loop0: detected capacity change from 0 to 8192 05:43:47 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'geneve0\x00'}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GENEVE_TTL={0x5}, @IFLA_GENEVE_ID={0x8}]}}}]}, 0x44}, 0x1, 0x2}, 0x0) 05:43:47 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x23, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, 0x88) 05:43:47 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000), 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000005480)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="9041", 0xffc3}], 0x1}}, {{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000600)='\r', 0x1}], 0x1}}], 0x2, 0x0) 05:43:47 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CONFIGURE(r0, 0x4c0a, &(0x7f0000000040)={r0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "650f444715b2b2bd42632f09e5fd8303e8533865df6b2f4675d43dd2b96405932971963d3966f4f5fe1d77e166f4f3c29df44e3d9b389d33c881e808d96626e2", "7cf2e85933c6742ce553572c92c2eae2fddc23b1dc0aee16d7c81f202566a26696fdb54540462ba293611d544f5bf01c03d57330f848cc91d5fdb3d371e40a0b", "e357ce896aa7ef0a09e8d74d2c20a32cb80a4c9d032a5a62576aeb8b68119143"}}) 05:43:47 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00c9e71410a3308f000800ff88506c00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)=0x2) read(r1, 0x0, 0x2006) 05:43:47 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(0xffffffffffffffff, 0x6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000005480)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="9041", 0xffc3}], 0x1}}, {{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000600)='\r', 0x1}], 0x1}}], 0x2, 0x0) 05:43:47 executing program 4: unshare(0x20000680) r0 = socket(0x26, 0x5, 0x0) bind$xdp(r0, 0x0, 0x0) [ 293.478410][T14626] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 293.496012][T14626] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:43:47 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(0xffffffffffffffff, 0x6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000005480)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="9041", 0xffc3}], 0x1}}, {{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000600)='\r', 0x1}], 0x1}}], 0x2, 0x0) [ 293.527811][T14645] serio: Serial port pts0 [ 293.555129][T14626] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 293.562245][T14630] loop0: detected capacity change from 0 to 8192 05:43:47 executing program 3: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001100)={&(0x7f0000000f40)={0x54, 0x13, 0x4dce8ef8bbbce68b, 0x0, 0x0, {}, [@INET_DIAG_REQ_BYTECODE={0x8, 0x1, "0c6c91ed"}]}, 0x54}}, 0x0) 05:43:47 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'geneve0\x00'}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GENEVE_TTL={0x5}, @IFLA_GENEVE_ID={0x8}]}}}]}, 0x44}, 0x1, 0x2}, 0x0) 05:43:47 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x10b042) write$char_usb(r0, &(0x7f0000000080)='g', 0xfff000) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/73) syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x10b042) write$char_usb(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_WOWLAN(0xffffffffffffffff, 0x0, 0x0) 05:43:47 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(0xffffffffffffffff, 0x6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000005480)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="9041", 0xffc3}], 0x1}}, {{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000600)='\r', 0x1}], 0x1}}], 0x2, 0x0) 05:43:47 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000001240)='./file0\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c757466383d312c646973636172642c00604efedabe596c1cfcdc122f91c0be6b35aba3f521a19d12843fec3b3b3ae698a430fe87cc6a02c529cc1ad5d0cfc4b15ee5b4a75edbb5df8c12dfc2b441d4cb456f44a33e63ef7ff89a2cff1c120ab54231e146ea6ce73aa0efe45eed83aa1115259c2b5f6b43ea94237faf606e882da7fe0a1f3f197817d6d445153cb306dfd2b040afcabe8e4f426d3462223feb96bcad0721faf8d601f9f68e638218bb63d86ae785771bcf2dfe46acd8b97e45b72a089520c122205d673436f23bb91a5af2a0cebc9c03ee35bb06caff31953c2259e9ecb0908716f357bd013fa4c6189587e932e392ce29916713fd20cae2519a08ddeb05fea28214ea7517223aff0a9737cd43927b0af718c264623199810c6b36baf5e8291f6881d00885ca6062befdcac4f5bc5cbd528e8d747279d412baaddbdbe3e103f4fe610c3c5bd16e002e3d087d5cf80f431f5b103746a40d584c8dab84dfe6ef86da4e039ab8e8cf9f247e28857e7325485576a140805f14d481b994441d3dfb4a67048f78cdb085aa460178481236a473c604ef3bae0c68694e7fa73e1ee76fc1632afb2f"], 0xff, 0x11fc, &(0x7f0000001280)="$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") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.current\x00', 0x275a, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[], 0xab4) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.current\x00', 0x275a, 0x0) 05:43:47 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x0) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000005480)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="9041", 0xffc3}], 0x1}}, {{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000600)='\r', 0x1}], 0x1}}], 0x2, 0x0) 05:43:47 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={0x44, 0x1, 0x2, 0x3, 0x0, 0x0, {0xa}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x4, 0x3, @private1}, {0x14, 0x4, @remote}}}]}]}, 0x44}}, 0x0) [ 293.652426][ T23] audit: type=1400 audit(1677995027.735:366): avc: denied { write } for pid=14654 comm="syz-executor.4" name="event0" dev="devtmpfs" ino=217 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 05:43:47 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'geneve0\x00'}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GENEVE_TTL={0x5}, @IFLA_GENEVE_ID={0x8}]}}}]}, 0x44}, 0x1, 0x2}, 0x0) [ 293.711732][T14667] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.3'. [ 293.742723][T14662] loop0: detected capacity change from 0 to 8192 05:43:48 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000080)=ANY=[], 0x15) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000050000000000000001000000850000006d00000085"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0, r2}, 0x10) r3 = dup(r1) mount$9p_fd(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000b80), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r3}}) 05:43:48 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x0) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000005480)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="9041", 0xffc3}], 0x1}}, {{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000600)='\r', 0x1}], 0x1}}], 0x2, 0x0) 05:43:48 executing program 3: socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000001340), 0x0, 0x0) mmap$xdp(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x0) 05:43:48 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'geneve0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@newlink={0x20, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}}, 0x20}, 0x1, 0x2}, 0x0) 05:43:48 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000001240)='./file0\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0xff, 0x11fc, &(0x7f0000001280)="$eJzs3E9rHHUYB/CnTWrT1PxRa7UF8UEvehmbHDx5CdKCGFCqKaggTM1Gl0x2w84SWBGrJ6++DFGP3gTxDeTixbPgRXLx2IM40p1oTV0FLbhp+Xwu87Az3+UZBhZ+y++Zgxc+3dneqoutchgnT5yI2d1TkTczMk7GTLQ+imevff/DE6+98ebLa+vrl69mXll7feX5zFx88pu3PvjyqW+HZ699tfj16dhffvvg59Uf98/vXzj49Yvo1tmts9cfZpnX+/1heb3q5Ga33i4yX606Zd3Jbq/uDI6c36r6u7ujLHubC/O7g05dZ9kb5XZnlMN+DgejLN8tu70siiIX5oO7sfH5zaZpIprmVDwQTdM0Z2I+zsaDsRCLsRTL8VA8HI/EuXg0zsdj8XhcGF817b4BAAAAAAAAAAAAAAAAAADg/mL+HwAAAAAAAAAAAAAAAAAAAKbP/D8AAAAAAAAAAAAAAAAAAABMn/l/AAAAAAAAAAAAAAAAAAAAOAbm2sPVzLmInU/2NvY22mP7+dpWdKOKTlyKpfglxtP/rba+8tL65Us5thzP7dw4zN/Y25g5ml8Zv05gYn6lzefR/OmY/3N+NZbi3OT86sT8XDzz9K38x22+iKX47p3oRxWbcSt7O//hSuaLr6zfkb84vg4AAADuB0X+YeL6vSj+7nybP1yf5+/f9w//D9yxvp6Ni7NTu20O1aP3t8uq6gwUd1HMHI822sIzrX767Fi0cU8X0/5l4v9w+6FPuxMAAAAAAAAAAAD+jYm7/85ExF/2A773n7cTTvseAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPiNHTgWAAAAABDmb51GxwYAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwFUBAAD///PO7J0=") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.current\x00', 0x275a, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[], 0xab4) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.current\x00', 0x275a, 0x0) 05:43:48 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x10b042) write$char_usb(r0, &(0x7f0000000080)='g', 0xfff000) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/73) syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x10b042) write$char_usb(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_WOWLAN(0xffffffffffffffff, 0x0, 0x0) 05:43:48 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'geneve0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@newlink={0x20, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}}, 0x20}, 0x1, 0x2}, 0x0) 05:43:48 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x0) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000005480)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="9041", 0xffc3}], 0x1}}, {{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000600)='\r', 0x1}], 0x1}}], 0x2, 0x0) 05:43:48 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000780)='syzkaller\x00', 0x3, 0xff8, &(0x7f00000007c0)=""/4088, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x0, 0x0}, 0x8) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r0}, 0x4) 05:43:48 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x1277) 05:43:48 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) setsockopt(0xffffffffffffffff, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000005480)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="9041", 0xffc3}], 0x1}}, {{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000600)='\r', 0x1}], 0x1}}], 0x2, 0x0) 05:43:48 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x2, 0x4, 0x1000000, 0xffff}, 0x48) 05:43:48 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'geneve0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@newlink={0x20, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}}, 0x20}, 0x1, 0x2}, 0x0) 05:43:48 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={0x18, 0x1, 0x2, 0x3, 0x0, 0x0, {0x2}, [@CTA_EXPECT_MASTER={0x4}]}, 0x18}}, 0x0) 05:43:48 executing program 3: unshare(0x20000680) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, 0x0) 05:43:48 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000400)={0x6, 0xfffff, &(0x7f0000000240)=@raw=[@cb_func], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2}, 0x80) [ 294.464720][T14696] dccp_xmit_packet: Payload too large (65475) for featneg. [ 294.482898][T14679] loop0: detected capacity change from 0 to 8192 05:43:48 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000001240)='./file0\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0xff, 0x11fc, &(0x7f0000001280)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.current\x00', 0x275a, 0x0) write$binfmt_elf64(r0, 0x0, 0xab4) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.current\x00', 0x275a, 0x0) [ 294.602873][T14709] loop0: detected capacity change from 0 to 8192 05:43:48 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x10b042) write$char_usb(r0, &(0x7f0000000080)='g', 0xfff000) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/73) syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x10b042) write$char_usb(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_WOWLAN(0xffffffffffffffff, 0x0, 0x0) 05:43:48 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'geneve0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_TTL={0x5}]}}}]}, 0x3c}, 0x1, 0x2}, 0x0) 05:43:48 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) setsockopt(0xffffffffffffffff, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000005480)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="9041", 0xffc3}], 0x1}}, {{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000600)='\r', 0x1}], 0x1}}], 0x2, 0x0) 05:43:48 executing program 3: socket(0x10, 0x0, 0x0) r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 05:43:48 executing program 5: syz_emit_ethernet(0x126a, &(0x7f0000001580)=ANY=[@ANYBLOB="aaaaaaaaaa2d0000000000008848"], 0x0) 05:43:48 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000001240)='./file0\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0xff, 0x11fc, &(0x7f0000001280)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.current\x00', 0x275a, 0x0) write$binfmt_elf64(r0, 0x0, 0xab4) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.current\x00', 0x275a, 0x0) 05:43:48 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0x80108906, 0x0) 05:43:48 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'geneve0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_TTL={0x5}]}}}]}, 0x3c}, 0x1, 0x2}, 0x0) 05:43:49 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) setsockopt(0xffffffffffffffff, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000005480)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="9041", 0xffc3}], 0x1}}, {{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000600)='\r', 0x1}], 0x1}}], 0x2, 0x0) 05:43:49 executing program 5: r0 = request_key(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0) add_key$keyring(&(0x7f0000001300), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_provisioning(&(0x7f00000003c0), 0x0, 0x0, 0x0, r0) [ 294.866901][T14715] dccp_xmit_packet: Payload too large (65475) for featneg. 05:43:49 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'geneve0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_TTL={0x5}]}}}]}, 0x3c}, 0x1, 0x2}, 0x0) 05:43:49 executing program 3: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001100)={&(0x7f0000000f40)={0x58, 0x13, 0x4dce8ef8bbbce68b, 0x0, 0x0, {}, [@INET_DIAG_REQ_BYTECODE={0xc, 0x1, "0c6c91ed4b860f1f"}]}, 0x58}}, 0x0) [ 294.949637][T14732] dccp_xmit_packet: Payload too large (65475) for featneg. [ 294.987750][T14716] loop0: detected capacity change from 0 to 8192 05:43:49 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x10b042) write$char_usb(r0, &(0x7f0000000080)='g', 0xfff000) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/73) syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x10b042) write$char_usb(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_WOWLAN(0xffffffffffffffff, 0x0, 0x0) 05:43:49 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'geneve0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8}]}}}]}, 0x3c}, 0x1, 0x2}, 0x0) 05:43:49 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x48, 0x1, 0x9, 0x801, 0x0, 0x0, {}, [@NFCTH_TUPLE={0x34, 0x2, [@CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}]}]}, 0x48}}, 0x0) 05:43:49 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0xf, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 05:43:49 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) setsockopt(r1, 0x0, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000005480)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="9041", 0xffc3}], 0x1}}, {{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000600)='\r', 0x1}], 0x1}}], 0x2, 0x0) 05:43:49 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000001240)='./file0\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0xff, 0x11fc, &(0x7f0000001280)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.current\x00', 0x275a, 0x0) write$binfmt_elf64(r0, 0x0, 0xab4) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.current\x00', 0x275a, 0x0) 05:43:49 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x401070ca) 05:43:49 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'geneve0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8}]}}}]}, 0x3c}, 0x1, 0x2}, 0x0) 05:43:49 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) setsockopt(r1, 0x0, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000005480)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="9041", 0xffc3}], 0x1}}, {{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000600)='\r', 0x1}], 0x1}}], 0x2, 0x0) [ 295.302807][T14743] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 295.310462][T14746] dccp_xmit_packet: Payload too large (65475) for featneg. [ 295.311072][T14743] netlink: 'syz-executor.5': attribute type 1 has an invalid length. 05:43:49 executing program 3: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001100)={&(0x7f0000001080)={0x14, 0x14, 0x1, 0x0, 0x0, {0x1}}, 0x14}}, 0x0) 05:43:49 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'geneve0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8}]}}}]}, 0x3c}, 0x1, 0x2}, 0x0) 05:43:49 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000400)={0x1d, 0x2, &(0x7f0000000240)=@raw=[@cb_func], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2}, 0x80) [ 295.385284][T14757] dccp_xmit_packet: Payload too large (65475) for featneg. [ 295.387987][T14745] loop0: detected capacity change from 0 to 8192 05:43:49 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) setsockopt(r1, 0x0, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000005480)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="9041", 0xffc3}], 0x1}}, {{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000600)='\r', 0x1}], 0x1}}], 0x2, 0x0) 05:43:49 executing program 5: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_AVC(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000300)={0x14, 0x453, 0x0, 0x0, 0x0, ';'}, 0x14}}, 0x0) 05:43:49 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x1c, 0x1, 0x1, 0x201, 0x0, 0x0, {0xa}, [@CTA_STATUS_MASK={0x8}]}, 0x1c}}, 0x0) 05:43:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f0000000340), 0x88) 05:43:49 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000001240)='./file0\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0xff, 0x11fc, &(0x7f0000001280)="$eJzs3E9rHHUYB/CnTWrT1PxRa7UF8UEvehmbHDx5CdKCGFCqKaggTM1Gl0x2w84SWBGrJ6++DFGP3gTxDeTixbPgRXLx2IM40p1oTV0FLbhp+Xwu87Az3+UZBhZ+y++Zgxc+3dneqoutchgnT5yI2d1TkTczMk7GTLQ+imevff/DE6+98ebLa+vrl69mXll7feX5zFx88pu3PvjyqW+HZ699tfj16dhffvvg59Uf98/vXzj49Yvo1tmts9cfZpnX+/1heb3q5Ga33i4yX606Zd3Jbq/uDI6c36r6u7ujLHubC/O7g05dZ9kb5XZnlMN+DgejLN8tu70siiIX5oO7sfH5zaZpIprmVDwQTdM0Z2I+zsaDsRCLsRTL8VA8HI/EuXg0zsdj8XhcGF817b4BAAAAAAAAAAAAAAAAAADg/mL+HwAAAAAAAAAAAAAAAAAAAKbP/D8AAAAAAAAAAAAAAAAAAABMn/l/AAAAAAAAAAAAAAAAAAAAOAbm2sPVzLmInU/2NvY22mP7+dpWdKOKTlyKpfglxtP/rba+8tL65Us5thzP7dw4zN/Y25g5ml8Zv05gYn6lzefR/OmY/3N+NZbi3OT86sT8XDzz9K38x22+iKX47p3oRxWbcSt7O//hSuaLr6zfkb84vg4AAADuB0X+YeL6vSj+7nybP1yf5+/f9w//D9yxvp6Ni7NTu20O1aP3t8uq6gwUd1HMHI822sIzrX767Fi0cU8X0/5l4v9w+6FPuxMAAAAAAAAAAAD+jYm7/85ExF/2A773n7cTTvseAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPiNHTgWAAAAABDmb51GxwYAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwFUBAAD///PO7J0=") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.current\x00', 0x275a, 0x0) write$binfmt_elf64(r0, &(0x7f00000004c0)=ANY=[], 0xab4) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) 05:43:49 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={&(0x7f0000000940)={0x14, 0x1, 0x2, 0x401}, 0x14}}, 0x0) 05:43:49 executing program 5: unshare(0x20000680) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x2, 0x0, 0x18) 05:43:49 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x3b, 0x0, 0x0) 05:43:49 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)={0x50, 0x1, 0x2, 0x301, 0x0, 0x0, {0xa}, [@CTA_EXPECT_MASTER={0x3c}]}, 0x50}}, 0x0) 05:43:49 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={0x58, 0x1, 0x2, 0x3, 0x0, 0x0, {0xa}, [@CTA_EXPECT_MASTER={0x44, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1}, {0x14, 0x4, @remote}}}]}]}, 0x58}}, 0x0) [ 295.745162][ T23] audit: type=1107 audit(1677995029.825:367): pid=14767 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg=';' [ 295.751369][T14775] dccp_xmit_packet: Payload too large (65475) for featneg. 05:43:49 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={0x2c, 0x1, 0x2, 0x201, 0x0, 0x0, {0xa}, [@CTA_EXPECT_MASTER={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @remote}}}]}]}, 0x2c}}, 0x0) 05:43:49 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000180)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) socket(0x11, 0x800000003, 0x0) r1 = socket(0x200000000000011, 0x4000000000080002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) bind$packet(r1, &(0x7f0000000d00)={0x11, 0x0, r3}, 0x14) r4 = socket(0x10, 0x803, 0x0) writev(r4, &(0x7f0000000040)=[{&(0x7f0000000080)="390000001300034700bb5be1c3e4feff06000000010000004500000025000000190004000400ad000200000000000006040000000000f93132", 0x39}], 0x1) 05:43:49 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) setsockopt(r1, 0x10d, 0x0, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000005480)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="9041", 0xffc3}], 0x1}}, {{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000600)='\r', 0x1}], 0x1}}], 0x2, 0x0) 05:43:49 executing program 3: prctl$PR_SET_TAGGED_ADDR_CTRL(0x37, 0x1) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000002c0)={'\x00', 0x846512678b3a18b2}) ioctl$TUNSETVNETLE(r0, 0x800454e0, 0x0) 05:43:49 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000780)='syzkaller\x00', 0x3, 0xff8, &(0x7f00000007c0)=""/4088, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000140)={r0}, 0xc) 05:43:49 executing program 1: prctl$PR_SET_TAGGED_ADDR_CTRL(0x37, 0x1) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000002c0)={'\x00', 0x846512678b3a18b2}) ioctl$TUNSETVNETLE(r0, 0x800454d2, &(0x7f0000000040)) [ 295.814796][T14784] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.1'. [ 295.854151][T14791] dccp_xmit_packet: Payload too large (65475) for featneg. [ 295.873414][T14794] netlink: 'syz-executor.5': attribute type 4 has an invalid length. [ 295.877720][T14771] loop0: detected capacity change from 0 to 8192 05:43:50 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000001240)='./file0\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0xff, 0x11fc, &(0x7f0000001280)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.current\x00', 0x275a, 0x0) write$binfmt_elf64(r0, &(0x7f00000004c0)=ANY=[], 0xab4) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) 05:43:50 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.current\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) sync_file_range(r0, 0x0, 0x0, 0x2) 05:43:50 executing program 3: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nfc(0x0, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 05:43:50 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) setsockopt(r1, 0x10d, 0x0, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000005480)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="9041", 0xffc3}], 0x1}}, {{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000600)='\r', 0x1}], 0x1}}], 0x2, 0x0) 05:43:50 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='bbr\x00', 0x4) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0xc89f, 0x700}, 0x1700) 05:43:50 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x18, 0x1, 0x9, 0x801, 0x0, 0x0, {}, [@NFCTH_TUPLE={0x4}]}, 0x18}}, 0x0) 05:43:50 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x401}, 0x14}}, 0x0) 05:43:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000000)={'wg2\x00', 0x0}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000400)={0x6, 0x2, &(0x7f0000000240)=@raw=[@cb_func], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0xa, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 295.934154][T14794] netlink: 'syz-executor.5': attribute type 4 has an invalid length. [ 295.954058][T14804] dccp_xmit_packet: Payload too large (65475) for featneg. 05:43:50 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) setsockopt(r1, 0x10d, 0x0, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000005480)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="9041", 0xffc3}], 0x1}}, {{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000600)='\r', 0x1}], 0x1}}], 0x2, 0x0) 05:43:50 executing program 4: r0 = socket(0x11, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8990, &(0x7f0000000100)={'ip6tnl0\x00', 0x0}) 05:43:50 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(r0, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000a40)={&(0x7f0000000a00)={0x1c, 0x3, 0x8, 0x201, 0x0, 0x0, {}, [@CTA_TIMEOUT_L3PROTO={0x6}]}, 0x1c}}, 0x0) 05:43:50 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x10b042) write$char_usb(r0, &(0x7f0000000080)='g', 0xfff000) ioctl$EVIOCGBITSW(r0, 0x80084502, &(0x7f0000000180)=""/73) [ 295.993029][ T23] audit: type=1400 audit(1677995030.075:368): avc: denied { name_bind } for pid=14806 comm="syz-executor.5" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 296.056714][T14820] dccp_xmit_packet: Payload too large (65475) for featneg. 05:43:50 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000001240)='./file0\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c757466383d312c646973636172642c00604efedabe596c1cfcdc122f91c0be6b35aba3f521a19d12843fec3b3b3ae698a430fe87cc6a02c529cc1ad5d0cfc4b15ee5b4a75edbb5df8c12dfc2b441d4cb456f44a33e63ef7ff89a2cff1c120ab54231e146ea6ce73aa0efe45eed83aa1115259c2b5f6b43ea94237faf606e882da7fe0a1f3f197817d6d445153cb306dfd2b040afcabe8e4f426d3462223feb96bcad0721faf8d601f9f68e638218bb63d86ae785771bcf2dfe46acd8b97e45b72a089520c122205d673436f23bb91a5af2a0cebc9c03ee35bb06caff31953c2259e9ecb0908716f357bd013fa4c6189587e932e392ce29916713fd20cae2519a08ddeb05fea28214ea7517223aff0a9737cd43927b0af718c264623199810c6b36baf5e8291f6881d00885ca6062befdcac4f5bc5cbd528e8d747279d412baaddbdbe3e103f4fe610c3c5bd16e002e3d087d5cf80f431f5b103746a40d584c8dab84dfe6ef86da4e039ab8e8cf9f247e28857e7325485576a140805f14d481b994441d3dfb4a67048f78cdb085aa460178481236a473c604ef3bae0c68694e7fa73e1ee76fc1632afb2f"], 0xff, 0x11fc, &(0x7f0000001280)="$eJzs3E9rHHUYB/CnTWrT1PxRa7UF8UEvehmbHDx5CdKCGFCqKaggTM1Gl0x2w84SWBGrJ6++DFGP3gTxDeTixbPgRXLx2IM40p1oTV0FLbhp+Xwu87Az3+UZBhZ+y++Zgxc+3dneqoutchgnT5yI2d1TkTczMk7GTLQ+imevff/DE6+98ebLa+vrl69mXll7feX5zFx88pu3PvjyqW+HZ699tfj16dhffvvg59Uf98/vXzj49Yvo1tmts9cfZpnX+/1heb3q5Ga33i4yX606Zd3Jbq/uDI6c36r6u7ujLHubC/O7g05dZ9kb5XZnlMN+DgejLN8tu70siiIX5oO7sfH5zaZpIprmVDwQTdM0Z2I+zsaDsRCLsRTL8VA8HI/EuXg0zsdj8XhcGF817b4BAAAAAAAAAAAAAAAAAADg/mL+HwAAAAAAAAAAAAAAAAAAAKbP/D8AAAAAAAAAAAAAAAAAAABMn/l/AAAAAAAAAAAAAAAAAAAAOAbm2sPVzLmInU/2NvY22mP7+dpWdKOKTlyKpfglxtP/rba+8tL65Us5thzP7dw4zN/Y25g5ml8Zv05gYn6lzefR/OmY/3N+NZbi3OT86sT8XDzz9K38x22+iKX47p3oRxWbcSt7O//hSuaLr6zfkb84vg4AAADuB0X+YeL6vSj+7nybP1yf5+/f9w//D9yxvp6Ni7NTu20O1aP3t8uq6gwUd1HMHI822sIzrX767Fi0cU8X0/5l4v9w+6FPuxMAAAAAAAAAAAD+jYm7/85ExF/2A773n7cTTvseAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPiNHTgWAAAAABDmb51GxwYAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwFUBAAD///PO7J0=") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.current\x00', 0x275a, 0x0) write$binfmt_elf64(r0, &(0x7f00000004c0)=ANY=[], 0xab4) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) 05:43:50 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x16, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, 0x88) 05:43:50 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) setsockopt(r1, 0x10d, 0x800000000d, 0x0, 0x0) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000005480)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="9041", 0xffc3}], 0x1}}, {{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000600)='\r', 0x1}], 0x1}}], 0x2, 0x0) 05:43:50 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x15, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, 0x88) [ 296.109120][T14814] loop0: detected capacity change from 0 to 8192 [ 296.160646][T14831] dccp_xmit_packet: Payload too large (65475) for featneg. [ 296.238534][T14834] loop0: detected capacity change from 0 to 8192 05:43:50 executing program 5: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$SOCK_DESTROY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3c02000012004177952d81aeeb5b526f4be5268ded9491be26021badc81c9d329979255af79060a617ba70dc37354204dbb912646d44eb066f8914f929abf3d72d36a38a9a"], 0x23c}}, 0x0) 05:43:50 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f00000000c0)={'nat\x00', 0x2, [{}, {}]}, 0x48) 05:43:50 executing program 4: r0 = socket(0x11, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8930, &(0x7f0000000100)={'ip6tnl0\x00', 0x0}) 05:43:50 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) setsockopt(r1, 0x10d, 0x800000000d, 0x0, 0x0) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000005480)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="9041", 0xffc3}], 0x1}}, {{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000600)='\r', 0x1}], 0x1}}], 0x2, 0x0) 05:43:50 executing program 0: r0 = socket(0x26, 0x5, 0x0) bind$xdp(r0, 0x0, 0x0) 05:43:50 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x40101283) 05:43:50 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200}}, &(0x7f0000000780)='syzkaller\x00', 0x3, 0xff8, &(0x7f00000007c0)=""/4088, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:43:50 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) setsockopt(r1, 0x10d, 0x800000000d, 0x0, 0x0) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000005480)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="9041", 0xffc3}], 0x1}}, {{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000600)='\r', 0x1}], 0x1}}], 0x2, 0x0) 05:43:50 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='GPL\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) fcntl$lock(r1, 0x6, &(0x7f0000000480)) 05:43:50 executing program 0: unshare(0x20000680) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(r0, 0x11b, 0x6, &(0x7f0000000000)=0x1000000, 0x4) 05:43:51 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14, 0x1, 0x1, 0x301}, 0x14}}, 0x0) 05:43:51 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff), 0x0) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000005480)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="9041", 0xffc3}], 0x1}}, {{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000600)='\r', 0x1}], 0x1}}], 0x2, 0x0) 05:43:51 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp\x00') pread64(r0, &(0x7f0000001100)=""/4096, 0x1000, 0x0) 05:43:51 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='GPL\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.current\x00', 0x275a, 0x0) pwritev(r1, &(0x7f00000007c0)=[{&(0x7f0000000580)="ef", 0x1}], 0x1, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='ext4_begin_ordered_truncate\x00', r0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.current\x00', 0x275a, 0x0) 05:43:51 executing program 4: io_uring_setup(0x7a9, &(0x7f0000003180)={0x0, 0x1743, 0x2, 0x2, 0x22e}) 05:43:51 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff), 0x0) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000005480)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="9041", 0xffc3}], 0x1}}, {{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000600)='\r', 0x1}], 0x1}}], 0x2, 0x0) 05:43:51 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='GPL\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.current\x00', 0x275a, 0x0) pwritev(r1, &(0x7f00000007c0)=[{&(0x7f0000000580)="ef", 0x1}], 0x1, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='ext4_begin_ordered_truncate\x00', r0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.current\x00', 0x275a, 0x0) 05:43:51 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000001240)='./file0\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0xff, 0x11fc, &(0x7f0000001280)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.current\x00', 0x275a, 0x0) pwritev(r0, &(0x7f00000007c0)=[{&(0x7f0000000580)="ef", 0x1}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) writev(r0, &(0x7f0000000880)=[{&(0x7f00000000c0)="1d4db9fa6e3740056440026fdc404b4b78f655995094578e7f7a86dd282599b45baba3413e65a4ed6c1077126e9fc6f67fab502ad393d888a2e879f050de3141a8d4de3004142fc9a4928a898a803644e5c3fa72d5cfd782bd54528e71599311ae5778f3aa05cd28da541fcd1525340a7249a93be47092399d161b07f6cd203a0b38d416223e4d5a22e9c8f3774f258133f8368a902dbe5c6147565597f5bc6226953ebfd50c6d543d593e364b3e22906425e0b60f", 0xb5}, {&(0x7f0000000180)="0921bb4dc0b55e3b8041fe862722ee5b19a8709064d417f506976c03b21e38d98e87f3e8ce7d8038efe5e5a2197fa69c778812cde3a646886ada681c52991043f9d688ec7d1a14257a921a0133e0ebed04c60824a8abf09fc96be045e8da7975066e12", 0x63}, {&(0x7f0000000200)="2429840d7ab0dcbeb2044e70b7baefe4b7177d4d30678a979d26d2179d4a841d40344327220c5d5a2ecd1e3b4068a17239aa76fda94691c94e548aa5b3", 0x3d}, {&(0x7f0000000240)="7d4646e55e32e0d1cbfb74a1473bc67cedd4b6c2b0c2e03aaadd06a9e5a30058a0c929b7c09c96a59dfe05b19a6deee13e94f61a3db67f75c2414c8eca52e3d2d5e746b9be88c5ac33a456ba80b60efec2adf44518a8ecba7ef752a8586b04909fe8e7975f3e66ff5ab057ff18227adbf094b53c87850900b55d60a7b0ce844291f359a8f66d2419c6408be6a6903efaf37a54f2f06dc56b0101f78578d187e1bdb27c3dd740d4", 0xa7}, {&(0x7f00000004c0)="f461079e", 0x4}], 0x5) 05:43:51 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff), 0x0) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000005480)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="9041", 0xffc3}], 0x1}}, {{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000600)='\r', 0x1}], 0x1}}], 0x2, 0x0) 05:43:51 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x24, 0x0, 0x0) 05:43:51 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/softnet_stat\x00') pread64(r0, &(0x7f0000000080)=""/83, 0x53, 0xea) 05:43:51 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={0x50, 0x1, 0x2, 0x3, 0x0, 0x0, {0xa}, [@CTA_EXPECT_MASTER={0x3c, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x2}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1}, {0x14, 0x4, @remote}}}]}]}, 0x50}}, 0x0) 05:43:51 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='GPL\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.current\x00', 0x275a, 0x0) pwritev(r1, &(0x7f00000007c0)=[{&(0x7f0000000580)="ef", 0x1}], 0x1, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='ext4_begin_ordered_truncate\x00', r0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.current\x00', 0x275a, 0x0) 05:43:51 executing program 4: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) read(r0, &(0x7f0000000000)=""/24, 0x18) 05:43:51 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x4, 0x8, 0x201, 0x0, 0x0, {}, [@CTA_TIMEOUT_L3PROTO={0x6}, @CTA_TIMEOUT_L4PROTO={0x5}]}, 0x24}}, 0x0) 05:43:51 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000e5c000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000005480)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="9041", 0xffc3}], 0x1}}, {{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000600)='\r', 0x1}], 0x1}}], 0x2, 0x0) 05:43:51 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_buf(r0, 0x107, 0x16, 0x0, 0x0) 05:43:51 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x6, 0x4, 0x5, 0xffff}, 0x48) 05:43:51 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='io\x00') pread64(r0, &(0x7f0000000100)=""/84, 0x54, 0x0) 05:43:51 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000e5c000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000005480)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="9041", 0xffc3}], 0x1}}, {{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000600)='\r', 0x1}], 0x1}}], 0x2, 0x0) 05:43:51 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='GPL\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.current\x00', 0x275a, 0x0) pwritev(r1, &(0x7f00000007c0)=[{&(0x7f0000000580)="ef", 0x1}], 0x1, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='ext4_begin_ordered_truncate\x00', r0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.current\x00', 0x275a, 0x0) 05:43:51 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/raw\x00') pread64(r0, &(0x7f0000000080)=""/103, 0x1ac, 0xec4) 05:43:51 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='stat\x00') pread64(r0, &(0x7f0000000080)=""/105, 0x69, 0x0) 05:43:51 executing program 0: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) fcntl$setstatus(r0, 0x40c, 0x0) 05:43:51 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000e5c000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000005480)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="9041", 0xffc3}], 0x1}}, {{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000600)='\r', 0x1}], 0x1}}], 0x2, 0x0) 05:43:51 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000002180)='net/ip_tables_matches\x00') pread64(r0, &(0x7f0000000040)=""/97, 0x61, 0x0) pread64(r0, &(0x7f0000000140)=""/118, 0x76, 0x5) [ 297.201900][T14879] loop1: detected capacity change from 0 to 8192 05:43:51 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_trie\x00') pread64(r0, &(0x7f0000000100)=""/44, 0x2c, 0x1c) 05:43:51 executing program 3: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={0x6, 0xc8}, 0x20) 05:43:51 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_trie\x00') pread64(r0, &(0x7f0000000100)=""/44, 0x2c, 0x1c) 05:43:54 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') openat$cgroup_procs(r0, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) 05:43:54 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip6_flowlabel\x00') pread64(r0, &(0x7f0000000080)=""/103, 0x67, 0x4) 05:43:54 executing program 0: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x22143, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r0, 0xc080661a, 0x0) 05:43:54 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ipv6_route\x00') pread64(r0, &(0x7f0000000040)=""/84, 0x54, 0xc8e5) 05:43:54 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, 0x0, 0x0) sendmmsg(r1, &(0x7f0000005480)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="9041", 0xffc3}], 0x1}}, {{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000600)='\r', 0x1}], 0x1}}], 0x2, 0x0) 05:43:54 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_trie\x00') pread64(r0, &(0x7f0000000100)=""/44, 0x2c, 0x1c) 05:43:54 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, 0x0, 0x0) sendmmsg(r1, &(0x7f0000005480)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="9041", 0xffc3}], 0x1}}, {{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000600)='\r', 0x1}], 0x1}}], 0x2, 0x0) 05:43:54 executing program 0: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000002100), 0x200000, 0x0) fcntl$setstatus(r0, 0x3, 0x0) 05:43:54 executing program 1: r0 = io_uring_setup(0x35bd, &(0x7f0000000280)) r1 = io_uring_setup(0x691b, &(0x7f0000000340)) io_uring_register$IORING_REGISTER_FILES(r1, 0x15, &(0x7f0000000400)=[r0], 0x1) 05:43:54 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/softnet_stat\x00') pread64(r0, &(0x7f0000000080)=""/83, 0x53, 0x75) 05:43:54 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_trie\x00') pread64(r0, &(0x7f0000000100)=""/44, 0x2c, 0x1c) 05:43:54 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, 0x0, 0x0) sendmmsg(r1, &(0x7f0000005480)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="9041", 0xffc3}], 0x1}}, {{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000600)='\r', 0x1}], 0x1}}], 0x2, 0x0) 05:43:54 executing program 3: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) fcntl$setstatus(r0, 0x5, 0x0) 05:43:54 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='smaps_rollup\x00') pread64(r0, &(0x7f0000000080)=""/83, 0x53, 0x401) 05:43:54 executing program 4: pread64(0xffffffffffffffff, &(0x7f0000000100)=""/44, 0x2c, 0x1c) 05:43:54 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') pread64(r0, &(0x7f0000000080)=""/103, 0x67, 0x0) 05:43:54 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000001c0)={0x9, 0x108, 0xfa00, {r1, 0x0, "008ad5", "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"}}, 0x110) 05:43:54 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev}, 0x10) sendmmsg(r1, &(0x7f0000005480)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="9041", 0xffc3}], 0x1}}, {{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000600)='\r', 0x1}], 0x1}}], 0x2, 0x0) 05:43:54 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/igmp6\x00') pread64(r0, &(0x7f0000000080)=""/83, 0x53, 0x8e) 05:43:54 executing program 1: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x41) write$sndseq(r0, &(0x7f0000000040)=[{0xff, 0x0, 0x0, 0x0, @time, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x38) 05:43:54 executing program 4: pread64(0xffffffffffffffff, &(0x7f0000000100)=""/44, 0x2c, 0x1c) 05:43:54 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000002180)='net/arp\x00') pread64(r0, &(0x7f0000000080)=""/103, 0x1ac, 0x0) 05:43:54 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_tables_targets\x00') pread64(r0, &(0x7f0000000080)=""/83, 0x53, 0xdc) 05:43:54 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev}, 0x10) sendmmsg(r1, &(0x7f0000005480)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="9041", 0xffc3}], 0x1}}, {{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000600)='\r', 0x1}], 0x1}}], 0x2, 0x0) 05:43:54 executing program 5: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) fcntl$setstatus(r0, 0x402, 0x0) 05:43:54 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/if_inet6\x00') pread64(r0, &(0x7f0000001100)=""/4096, 0x1000, 0x1) 05:43:54 executing program 4: pread64(0xffffffffffffffff, &(0x7f0000000100)=""/44, 0x2c, 0x1c) 05:43:54 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/xfrm_stat\x00') pread64(r0, &(0x7f0000000100)=""/84, 0x54, 0x59) 05:43:54 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev}, 0x10) sendmmsg(r1, &(0x7f0000005480)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="9041", 0xffc3}], 0x1}}, {{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000600)='\r', 0x1}], 0x1}}], 0x2, 0x0) 05:43:54 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/snmp6\x00') pread64(r0, &(0x7f0000000080)=""/90, 0x5a, 0x2) 05:43:54 executing program 1: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) fcntl$setstatus(r0, 0x40a, 0x0) 05:43:54 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000000100)=""/44, 0x2c, 0x1c) 05:43:54 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp\x00') pread64(r0, &(0x7f0000000080)=""/83, 0x53, 0x500) 05:43:54 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/xfrm_stat\x00') pread64(r0, &(0x7f0000000100)=""/84, 0x54, 0x59) 05:43:54 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005480)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="9041", 0xffc3}], 0x1}}, {{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000600)='\r', 0x1}], 0x1}}], 0x2, 0x0) 05:43:54 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000002180)='net/psched\x00') pread64(r0, &(0x7f0000000080)=""/103, 0x67, 0x0) 05:43:54 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/fs/cgroup', 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000000), 0x2, 0x0) 05:43:54 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000000100)=""/44, 0x2c, 0x1c) 05:43:54 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') pread64(r0, &(0x7f0000000080)=""/83, 0x53, 0x59) 05:43:54 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/xfrm_stat\x00') pread64(r0, &(0x7f0000000100)=""/84, 0x54, 0x59) 05:43:54 executing program 5: unlinkat(0xffffffffffffffff, &(0x7f0000001100)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x200) 05:43:54 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000000100)=""/44, 0x2c, 0x1c) 05:43:54 executing program 1: mknod(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) mount$9p_virtio(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', &(0x7f0000000100), 0x200002, &(0x7f0000000140)) 05:43:54 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005480)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="9041", 0xffc3}], 0x1}}, {{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000600)='\r', 0x1}], 0x1}}], 0x2, 0x0) 05:43:54 executing program 3: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.pending_reads\x00', 0x22143, 0x0) fcntl$lock(r0, 0x7, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2}) 05:43:54 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005480)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="9041", 0xffc3}], 0x1}}, {{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000600)='\r', 0x1}], 0x1}}], 0x2, 0x0) 05:43:54 executing program 4: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_trie\x00') pread64(0xffffffffffffffff, &(0x7f0000000100)=""/44, 0x2c, 0x1c) 05:43:54 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/xfrm_stat\x00') pread64(r0, &(0x7f0000000100)=""/84, 0x54, 0x59) 05:43:54 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x41) write$sndseq(r0, &(0x7f0000000040)=[{0xff, 0x0, 0x0, 0x0, @time, {}, {}, @connect}, {0x0, 0x9, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x38) 05:43:54 executing program 5: unlinkat(0xffffffffffffffff, &(0x7f0000001100)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x200) 05:43:54 executing program 4: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_trie\x00') pread64(0xffffffffffffffff, &(0x7f0000000100)=""/44, 0x2c, 0x1c) [ 300.752664][T15006] 9pnet_virtio: no channels available for device syz 05:43:54 executing program 1: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) fcntl$setstatus(r0, 0x8, 0x2000000) 05:43:54 executing program 0: pread64(0xffffffffffffffff, &(0x7f0000000100)=""/84, 0x54, 0x59) 05:43:54 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, 0x0, 0x0, 0x0) 05:43:54 executing program 4: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_trie\x00') pread64(0xffffffffffffffff, &(0x7f0000000100)=""/44, 0x2c, 0x1c) 05:43:54 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') getdents(r0, &(0x7f0000000080)=""/43, 0x2b) getdents(r0, 0xffffffffffffffff, 0x18) 05:43:54 executing program 5: unlinkat(0xffffffffffffffff, &(0x7f0000001100)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x200) 05:43:54 executing program 1: r0 = io_uring_setup(0x691b, &(0x7f0000000340)) io_uring_register$IORING_REGISTER_FILES(r0, 0x4, &(0x7f0000000400)=[0xffffffffffffffff], 0x1) 05:43:54 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, 0x0, 0x0, 0x0) 05:43:54 executing program 0: pread64(0xffffffffffffffff, &(0x7f0000000100)=""/84, 0x54, 0x59) 05:43:54 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') getdents(r0, &(0x7f0000000080)=""/43, 0x2b) getdents(r0, 0xffffffffffffffff, 0x18) 05:43:54 executing program 5: unlinkat(0xffffffffffffffff, &(0x7f0000001100)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x200) 05:43:54 executing program 0: pread64(0xffffffffffffffff, &(0x7f0000000100)=""/84, 0x54, 0x59) 05:43:55 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, 0x0, 0x0, 0x0) 05:43:55 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/igmp6\x00') pread64(r0, &(0x7f0000000080)=""/83, 0x53, 0x53) 05:43:55 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_trie\x00') pread64(r0, 0x0, 0x0, 0x1c) 05:43:55 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') getdents(r0, &(0x7f0000000080)=""/43, 0x2b) getdents(r0, 0xffffffffffffffff, 0x18) 05:43:55 executing program 5: unlinkat(0xffffffffffffffff, 0x0, 0x200) 05:43:55 executing program 0: r0 = syz_open_procfs(0x0, 0x0) pread64(r0, &(0x7f0000000100)=""/84, 0x54, 0x59) 05:43:55 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_trie\x00') pread64(r0, 0x0, 0x0, 0x1c) 05:43:55 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000005480)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="9041", 0x2}], 0x1}}], 0x1, 0x0) 05:43:55 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') getdents(r0, &(0x7f0000000080)=""/43, 0x2b) getdents(r0, 0xffffffffffffffff, 0x18) 05:43:55 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') pread64(r0, &(0x7f0000000100)=""/4082, 0xff2, 0x1) 05:43:55 executing program 5: unlinkat(0xffffffffffffffff, 0x0, 0x200) 05:43:55 executing program 0: r0 = syz_open_procfs(0x0, 0x0) pread64(r0, &(0x7f0000000100)=""/84, 0x54, 0x59) 05:43:55 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_trie\x00') pread64(r0, 0x0, 0x0, 0x1c) 05:43:55 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000005480)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="9041", 0x2}], 0x1}}], 0x1, 0x0) 05:43:55 executing program 5: unlinkat(0xffffffffffffffff, 0x0, 0x200) 05:43:55 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/if_inet6\x00') pread64(r0, &(0x7f0000001100)=""/4096, 0x1000, 0x0) 05:43:55 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000740)='net/rt_cache\x00') pread64(r0, &(0x7f0000000100)=""/114, 0x72, 0x21) 05:43:55 executing program 5: unlinkat(0xffffffffffffffff, &(0x7f0000001100)='./file1\x00', 0x200) 05:43:55 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_trie\x00') pread64(r0, &(0x7f0000000100)=""/44, 0x2c, 0x0) 05:43:55 executing program 0: r0 = syz_open_procfs(0x0, 0x0) pread64(r0, &(0x7f0000000100)=""/84, 0x54, 0x59) 05:43:55 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000005480)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="9041", 0x2}], 0x1}}], 0x1, 0x0) 05:43:55 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='gid_map\x00') pread64(r0, &(0x7f0000000080)=""/83, 0x53, 0x0) 05:43:55 executing program 1: renameat2(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0, 0xfcff7b04691c91be) 05:43:55 executing program 5: unlinkat(0xffffffffffffffff, &(0x7f0000001100)='./file1\x00', 0x200) 05:43:55 executing program 0: syz_open_procfs(0x0, &(0x7f0000000000)='net/xfrm_stat\x00') pread64(0xffffffffffffffff, &(0x7f0000000100)=""/84, 0x54, 0x59) 05:43:55 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000005480)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="9041", 0x2}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) 05:43:55 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/ip_mr_cache\x00') pread64(r0, &(0x7f0000000080)=""/83, 0x53, 0x2) 05:43:55 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_mr_vif\x00') pread64(r0, &(0x7f0000000040)=""/97, 0x61, 0x0) pread64(r0, &(0x7f00000011c0)=""/4096, 0x1000, 0x6) 05:43:55 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_trie\x00') pread64(r0, &(0x7f0000000100)=""/44, 0x2c, 0x0) 05:43:55 executing program 5: unlinkat(0xffffffffffffffff, &(0x7f0000001100)='./file1\x00', 0x200) 05:43:55 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='uid_map\x00') pread64(r0, &(0x7f0000000080)=""/83, 0x53, 0x0) pread64(r0, &(0x7f0000001100)=""/4096, 0x1000, 0x1) 05:43:55 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000005480)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="9041", 0x2}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) 05:43:55 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_trie\x00') pread64(r0, &(0x7f0000000100)=""/44, 0x2c, 0x0) 05:43:55 executing program 1: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001280), 0x0, 0x0) ppoll(&(0x7f0000001300)=[{r0}], 0x1, &(0x7f0000001340)={0x0, 0x3938700}, 0x0, 0x0) 05:43:55 executing program 0: syz_open_procfs(0x0, &(0x7f0000000000)='net/xfrm_stat\x00') pread64(0xffffffffffffffff, &(0x7f0000000100)=""/84, 0x54, 0x59) 05:43:55 executing program 5: unlinkat(0xffffffffffffffff, &(0x7f0000001100)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) 05:43:55 executing program 0: syz_open_procfs(0x0, &(0x7f0000000000)='net/xfrm_stat\x00') pread64(0xffffffffffffffff, &(0x7f0000000100)=""/84, 0x54, 0x59) 05:43:55 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='uid_map\x00') pread64(r0, &(0x7f0000000080)=""/83, 0x53, 0x0) pread64(r0, &(0x7f0000001100)=""/4096, 0x1000, 0x1) 05:43:55 executing program 4: r0 = socket(0x1e, 0x2, 0x0) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x8045) 05:43:55 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000005480)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="9041", 0x2}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) 05:43:55 executing program 5: unlinkat(0xffffffffffffffff, &(0x7f0000001100)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) 05:43:55 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='uid_map\x00') pread64(r0, &(0x7f0000000080)=""/83, 0x53, 0x0) pread64(r0, &(0x7f0000001100)=""/4096, 0x1000, 0x1) 05:43:55 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/xfrm_stat\x00') pread64(r0, 0x0, 0x0, 0x59) 05:43:55 executing program 5: unlinkat(0xffffffffffffffff, &(0x7f0000001100)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) 05:43:55 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd\x00') getdents(r0, &(0x7f00000000c0)=""/108, 0x6c) 05:43:55 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000019c0), 0x0, 0x0) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000080)=""/21, 0x15}], 0x1, 0x0, 0x0) 05:43:55 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='uid_map\x00') pread64(r0, &(0x7f0000000080)=""/83, 0x53, 0x0) pread64(r0, &(0x7f0000001100)=""/4096, 0x1000, 0x1) 05:43:55 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000005480)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="9041", 0x2}], 0x1}}, {{0x0, 0x0, &(0x7f0000001680)}}], 0x2, 0x0) 05:43:55 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/igmp6\x00') mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000006, 0x12, r0, 0x10000000) 05:43:55 executing program 1: linkat(0xffffffffffffff9c, &(0x7f0000002100)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0xffffffffffffffff, 0x0, 0xc00) 05:43:55 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/xfrm_stat\x00') pread64(r0, 0x0, 0x0, 0x59) 05:43:55 executing program 4: readlinkat(0xffffffffffffff9c, &(0x7f0000000040)='\x00', &(0x7f0000000080)=""/67, 0x43) 05:43:55 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='uid_map\x00') pread64(r0, &(0x7f0000001100)=""/4096, 0x1000, 0x1) 05:43:55 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/xfrm_stat\x00') pread64(r0, 0x0, 0x0, 0x59) 05:43:55 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='uid_map\x00') pread64(r0, &(0x7f0000001100)=""/4096, 0x1000, 0x1) 05:43:55 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000005480)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="9041", 0x2}], 0x1}}, {{0x0, 0x0, &(0x7f0000001680)}}], 0x2, 0x0) 05:43:55 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x17, &(0x7f0000000100)={0x0, @empty, 0x0, 0x0, 'lc\x00'}, 0x2c) 05:43:55 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000005480)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="9041", 0x2}], 0x1}}, {{0x0, 0x0, &(0x7f0000001680)}}], 0x2, 0x0) 05:43:55 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) r1 = socket$igmp(0x2, 0x3, 0x2) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f00000000c0)={@dev, @remote, 0x0}, &(0x7f0000000100)=0xc) setsockopt$MRT_ADD_VIF(r1, 0x0, 0xca, &(0x7f0000000380)={0x0, 0x1, 0x0, 0x5, @vifc_lcl_ifindex=r3, @local}, 0x10) r4 = socket$igmp(0x2, 0x3, 0x2) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, 0x0) setsockopt$MRT_FLUSH(r4, 0x0, 0xd4, &(0x7f00000003c0)=0x5, 0x4) write$cgroup_type(r2, 0x0, 0x0) r5 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$NL802154_CMD_GET_SEC_LEVEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000580)={&(0x7f00000005c0)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="100028bd7000fddbdf251f0000000c00060002000000020000000c00060002000000020000000c000600020000000200000008000300", @ANYRES32=0x0, @ANYBLOB="0c00060003000000010000000c0006000000000000000000c6156d28efcb917b5ad43f7041e10228ee79f737dc06dd1c28bc424510549b9bf8ea8807bbbf56890352fd39c5e0f924e7d6ba2661fd3574f531cd7f26404927ce8cb2bb29df076f57a341fef7c45d4a79e779c5d8063357638a0ad3d2be9e40bb6550edf39ca516753f9bd5ec34c407ad8908833b0c5e88f07a5cf996d1d364b974724e5c08d15b853d971b3057dc606ca6bfb3978306f0b2903bebb1566541d6d186c093d855e7493b04bd94ffc09541814e12c8090f6031bb92c5ab2358"], 0x58}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) getsockopt$MRT(r1, 0x0, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000180)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) ioctl$BTRFS_IOC_WAIT_SYNC(r0, 0x40089416, &(0x7f0000000000)=r6) 05:43:55 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='uid_map\x00') pread64(r0, &(0x7f0000001100)=""/4096, 0x1000, 0x1) [ 301.331947][ T23] audit: type=1400 audit(1677995035.415:369): avc: denied { execute } for pid=15142 comm="syz-executor.5" path="/proc/15142/task/15143/net/igmp6" dev="proc" ino=4026532871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=file permissive=1 05:43:55 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/xfrm_stat\x00') pread64(r0, &(0x7f0000000100)=""/84, 0x54, 0x0) 05:43:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x31, &(0x7f0000000100)={0x0, @empty, 0x0, 0x0, 'lc\x00'}, 0x2c) 05:43:55 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000005480)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="9041", 0x2}], 0x1}}, {{0x0, 0x0, &(0x7f0000001680)=[{0x0}], 0x1}}], 0x2, 0x0) 05:43:55 executing program 3: pread64(0xffffffffffffffff, &(0x7f0000000080)=""/83, 0x53, 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4096, 0x1000, 0x1) 05:43:55 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_opts(r0, 0x0, 0x2, 0x0, 0x0) 05:43:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_mreq(r0, 0x0, 0x24, &(0x7f0000000080)={@local}, 0x8) 05:43:55 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/xfrm_stat\x00') pread64(r0, &(0x7f0000000100)=""/84, 0x54, 0x0) [ 301.413798][T15163] dvmrp0: entered allmulticast mode 05:43:55 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000005480)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="9041", 0x2}], 0x1}}, {{0x0, 0x0, &(0x7f0000001680)=[{0x0}], 0x1}}], 0x2, 0x0) 05:43:55 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x88, 0x6, 0x0, 0x300) 05:43:55 executing program 3: pread64(0xffffffffffffffff, &(0x7f0000000080)=""/83, 0x53, 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4096, 0x1000, 0x1) 05:43:55 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_newroute={0x24, 0x18, 0x401, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0xff}, [@RTA_FLOW={0x8}]}, 0x24}}, 0x0) 05:43:55 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/xfrm_stat\x00') pread64(r0, &(0x7f0000000100)=""/84, 0x54, 0x0) 05:43:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x5, &(0x7f0000000100)={0x0, @empty, 0x0, 0x0, 'lc\x00'}, 0x2c) 05:43:55 executing program 3: pread64(0xffffffffffffffff, &(0x7f0000000080)=""/83, 0x53, 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4096, 0x1000, 0x1) 05:43:55 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_group_source_req(r0, 0x0, 0x2b, &(0x7f0000000000)={0x5, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @multicast1}}}, 0x108) 05:43:55 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000005480)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="9041", 0x2}], 0x1}}, {{0x0, 0x0, &(0x7f0000001680)=[{0x0}], 0x1}}], 0x2, 0x0) 05:43:55 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000001500)=0x3, 0x4) syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), r0) 05:43:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x32, &(0x7f0000000100)={0x0, @empty, 0x0, 0x0, 'lc\x00'}, 0x2c) 05:43:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x33, 0x0, 0x0) 05:43:55 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x2, 0x4, 0x1200, 0xffff}, 0x48) 05:43:55 executing program 3: r0 = syz_open_procfs(0x0, 0x0) pread64(r0, &(0x7f0000000080)=""/83, 0x53, 0x0) pread64(r0, &(0x7f0000001100)=""/4096, 0x1000, 0x1) 05:43:55 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000e00)={0x0, 0x0, &(0x7f0000000dc0)={&(0x7f0000000140)=@newtaction={0x44, 0x30, 0x1, 0x0, 0x0, {}, [{0x30, 0x1, [@m_bpf={0x2c, 0x1, 0x0, 0x0, {{0x8}, {0x4}, {0x4}, {0xc}, {0xc, 0x8, {0x3}}}}]}]}, 0x44}}, 0x0) 05:43:55 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, 0x0, 0x0) 05:43:55 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000005480)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="9041", 0x2}], 0x1}}, {{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000600)}], 0x1}}], 0x2, 0x0) 05:43:55 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_int(r0, 0x0, 0x7, 0x0, &(0x7f0000000040)) 05:43:55 executing program 3: r0 = syz_open_procfs(0x0, 0x0) pread64(r0, &(0x7f0000000080)=""/83, 0x53, 0x0) pread64(r0, &(0x7f0000001100)=""/4096, 0x1000, 0x1) 05:43:55 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={0x20, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x20}}, 0x0) 05:43:55 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000040)=0x7fffffff, 0x8) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f00000001c0), 0x8) 05:43:55 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_SCHED_SCAN(r0, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f0000000100)={0x1c, r1, 0x1, 0x0, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) 05:43:55 executing program 3: r0 = syz_open_procfs(0x0, 0x0) pread64(r0, &(0x7f0000000080)=""/83, 0x53, 0x0) pread64(r0, &(0x7f0000001100)=""/4096, 0x1000, 0x1) 05:43:55 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000005480)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="9041", 0x2}], 0x1}}, {{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000600)}], 0x1}}], 0x2, 0x0) [ 301.628978][ T23] audit: type=1400 audit(1677995035.715:370): avc: denied { setopt } for pid=15217 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 301.653453][T15224] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 05:43:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x3, &(0x7f0000000100)={0x0, @empty, 0x0, 0x0, 'lc\x00'}, 0x2c) 05:43:56 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x0, 0x0, 0x0, 0x0, 0xa18, 0x1}, 0x48) 05:43:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000000)={0x1, 'syz_tun\x00'}, 0x18) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x8946, &(0x7f0000000100)={'gre0\x00', 0x0}) 05:43:56 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='uid_map\x00') pread64(0xffffffffffffffff, &(0x7f0000000080)=""/83, 0x53, 0x0) pread64(r0, &(0x7f0000001100)=""/4096, 0x1000, 0x1) 05:43:56 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000005480)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="9041", 0x2}], 0x1}}, {{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000600)}], 0x1}}], 0x2, 0x0) 05:43:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_buf(r0, 0x0, 0x29, &(0x7f0000000000)=""/4096, &(0x7f0000001000)=0x1000) 05:43:56 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='uid_map\x00') pread64(0xffffffffffffffff, &(0x7f0000000080)=""/83, 0x53, 0x0) pread64(r0, &(0x7f0000001100)=""/4096, 0x1000, 0x1) 05:43:56 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="5c000000640001"], 0x5c}}, 0x0) 05:43:56 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_SCHED_SCAN(r0, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f0000000100)={0x1c, r1, 0x1, 0x0, 0x0, {{0x1b}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) 05:43:56 executing program 4: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000840)) sendto$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 05:43:56 executing program 0: r0 = socket(0x29, 0x80002, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000a40)) 05:43:56 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000005480)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000600)='\r', 0x1}], 0x1}}], 0x1, 0x0) 05:43:56 executing program 4: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x40000000, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x3c) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/class/dmi', 0x0, 0x0) symlinkat(&(0x7f00000000c0)='./file0\x00', r1, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') 05:43:56 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="640000001a00010f25bd7000fbdbdf250a"], 0x64}}, 0x0) 05:43:56 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='uid_map\x00') pread64(0xffffffffffffffff, &(0x7f0000000080)=""/83, 0x53, 0x0) pread64(r0, &(0x7f0000001100)=""/4096, 0x1000, 0x1) [ 302.035654][T15247] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.1'. 05:43:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@rand_addr=' \x01\x00', @in=@broadcast}, {}, {}, 0x0, 0x0, 0x0, 0x2}, {{@in6=@private2}, 0x0, @in=@remote}}, 0xe8) 05:43:56 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='uid_map\x00') pread64(r0, 0x0, 0x0, 0x0) pread64(r0, &(0x7f0000001100)=""/4096, 0x1000, 0x1) 05:43:56 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) dup3(r1, r0, 0x0) sendmmsg$inet6(r0, 0x0, 0x0, 0x0) 05:43:56 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000005480)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000600)='\r', 0x1}], 0x1}}], 0x1, 0x0) 05:43:56 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x30, 0x0, 0x0) 05:43:56 executing program 0: pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0xb82e336200000000) close(r0) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f00000010c0)=@gcm_128={{}, "cec9f899c26d154c", "16624c2be0fbf692bcd239e778e7629d", "ac6855ac", "3270f0b71b22f7cd"}, 0x28) 05:43:56 executing program 1: sigaltstack(&(0x7f0000ffc000), 0x0) 05:43:56 executing program 1: semop(0x0, &(0x7f0000000000)=[{}], 0x1) munmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000) msync(&(0x7f0000ff3000/0xd000)=nil, 0xd000, 0x2) 05:43:56 executing program 4: pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0xb82e336200000000) close(r0) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet6_tcp_buf(r0, 0x6, 0x0, 0x0, 0x0) 05:43:56 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f00000000c0)='.pending_reads\x00', 0x80341, 0x0) dup3(r1, r0, 0x0) fdatasync(r0) 05:43:56 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='uid_map\x00') pread64(r0, 0x0, 0x0, 0x0) pread64(r0, &(0x7f0000001100)=""/4096, 0x1000, 0x1) 05:43:56 executing program 0: mknod(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 05:43:56 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000005480)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000600)='\r', 0x1}], 0x1}}], 0x1, 0x0) 05:43:56 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x3, 0x0, 0x0, 0x5f}]}) 05:43:56 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x14) r1 = socket$inet6(0xa, 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000400)={&(0x7f0000000080)={0x2, 0x4e21, @dev}, 0x10, 0x0}, 0x0) 05:43:56 executing program 5: pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0xb82e336200000000) close(r0) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) 05:43:56 executing program 1: openat$zero(0xffffffffffffff9c, 0x0, 0x240, 0x0) 05:43:56 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='uid_map\x00') pread64(r0, 0x0, 0x0, 0x0) pread64(r0, &(0x7f0000001100)=""/4096, 0x1000, 0x1) 05:43:56 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000005480)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000600)='\r', 0x1}], 0x1}}], 0x2, 0x0) 05:43:56 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) dup2(r1, r0) lseek(r0, 0x0, 0x0) 05:43:56 executing program 1: mremap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x2000, 0x0, &(0x7f0000ffa000/0x2000)=nil) 05:43:56 executing program 4: pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0xb82e336200000000) close(r0) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) 05:43:56 executing program 0: shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000000)=""/139) 05:43:56 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='uid_map\x00') pread64(r0, &(0x7f0000000080)=""/83, 0x53, 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4096, 0x1000, 0x1) 05:43:56 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000005480)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000600)='\r', 0x1}], 0x1}}], 0x2, 0x0) 05:43:56 executing program 4: pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0xb82e336200000000) close(r0) socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000180)=@gcm_128={{}, "b63cbb92097900", "8ae702be97357541e9b8575aa8da214f", "cd8cab91", "d464386f5d50f750"}, 0x28) 05:43:56 executing program 1: mknodat$null(0xffffffffffffff9c, &(0x7f0000000400)='./file0\x00', 0x4, 0x103) 05:43:56 executing program 5: pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0xb82e336200000000) close(r0) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x0, 0x0, 0x0) 05:43:56 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='uid_map\x00') pread64(r0, &(0x7f0000000080)=""/83, 0x53, 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4096, 0x1000, 0x1) 05:43:56 executing program 0: renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f0000001a40)='./file0\x00') 05:43:56 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000005480)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000600)='\r', 0x1}], 0x1}}], 0x2, 0x0) 05:43:56 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) dup3(r1, r0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, 0x0, 0x0) 05:43:56 executing program 5: timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x7}, 0x0) 05:43:56 executing program 4: pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0xb82e336200000000) close(r0) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, 0x0, 0x0) 05:43:56 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='uid_map\x00') pread64(r0, &(0x7f0000000080)=""/83, 0x53, 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4096, 0x1000, 0x1) 05:43:56 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000000), &(0x7f0000000040), 0x2, 0x2) 05:43:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0xb, 0x0, 0x0) 05:43:56 executing program 4: sched_setscheduler(0x0, 0x0, &(0x7f00000000c0)) 05:43:56 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001240)={{0x14}, [@NFT_MSG_NEWFLOWTABLE={0x54, 0x16, 0xa, 0x0, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HANDLE={0xc}, @NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_HANDLE={0xc}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_NEWSET={0x14}, @NFT_MSG_DELSETELEM={0xe34, 0xe, 0xa, 0x0, 0x0, 0x0, {}, [@NFTA_SET_ELEM_LIST_ELEMENTS={0xe20, 0x3, 0x0, 0x1, [{0x4}, {0xa8, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_DATA={0x88, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x34, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VERDICT={0x28, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VALUE={0x25, 0x1, "8b9b18fba074fe242a3c33d2a2de16a1f59f1dad37e4a3ca3a4e34b4f6037b355f"}]}, @NFTA_SET_ELEM_EXPIRATION={0xc}, @NFTA_SET_ELEM_KEY_END={0x10, 0xa, 0x0, 0x1, [@NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}]}]}]}, {0x254, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPIRATION={0xc}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz2\x00'}, @NFTA_SET_ELEM_KEY={0x150, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8}]}, @NFTA_DATA_VALUE={0x6d, 0x1, "d8f84387357dd60028fce65651fca976b4f27a35255dc20bac7b558651ae1ddfaeb45201ff7499e4bdade0e982077259b944d787681cd36abe2eb66571183edcb5e51ef8616fb7005a98ea5b3d1fe013b6454cecc54f16632cb5ed6feffcd62177967dacebee43efb4"}, @NFTA_DATA_VALUE={0xcd, 0x1, "67f2942c30e2370dd3e85f7a41dcb626f657bedee6876b4085e8e7704c26dfbc05dfcaeeb80bd4efa0c3b3af15de0d755ba2cd0bd6d6dbb84e8b395b7fb59a78ad5a1e53a571188305715abd489bcb152a756cfd533041ea74190f1ffc936f84eb11c03d7f022521e74966531eeea9d42c45944c9a8fe511cad8373b62018e3c9b1848532ecf736a1d35e0214ffa3b63ae3866a7fcb4f8e428774e6d874443637a02b96da284aea2d6ce1485b2dcdc3920b362620757710d3bb82c4fd2ed2a1049e2aa77e6e6ab200e"}]}, @NFTA_SET_ELEM_USERDATA={0xe1, 0x6, 0x1, 0x0, "805c3ad993db6e465f1dfc11775d6658c2ec885683c5f315f669850618e5d505de0f9c3ac8318f1213af9d42fabfd009c8759aad38bd9e824a67d049943f848e076b76e18a5e956c2e473738ddf7d44f5f5cea7fe54cd31da26c9d64cc17173a7e788eec629267f6329da8a59b279c31eb911c3bd9cd78ce50cf1ecd04c0b700d504eb2441ee8a20957b3c4ca96a87d47ced8706f8e01e6a9514b75294c5b2907af2e1d712f799ca5854baff3c0cda57658d3dbb1b802ac579ac3a862ccb6f6ebb276acfc51287ca6dc4c519348998632e69223213778127d40d4c5bee"}, @NFTA_SET_ELEM_EXPR={0x4}]}, {0xb1c, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPRESSIONS={0x6c, 0xb, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, @match={{0xa}, @void}}, {0x58, 0x1, 0x0, 0x1, @fib={{0x8}, @val={0x4c, 0x2, 0x0, 0x1, [@NFTA_FIB_RESULT={0x8}, @NFTA_FIB_DREG={0x8}, @NFTA_FIB_RESULT={0x8}, @NFTA_FIB_FLAGS={0x8}, @NFTA_FIB_DREG={0x8}, @NFTA_FIB_RESULT={0x8}, @NFTA_FIB_RESULT={0x8}, @NFTA_FIB_RESULT={0x8}, @NFTA_FIB_FLAGS={0x8}]}}}]}, @NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz1\x00'}, @NFTA_SET_ELEM_DATA={0xa9c, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x34, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN_ID={0x8}]}, @NFTA_DATA_VERDICT={0x18, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VERDICT={0x1c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VERDICT={0x24, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VALUE={0xa09, 0x1, "8826f21dc5671a81f76e5ccaf54b56f07cde426c287c2dfa31b545f248fe3b34d0231cd5607f7dcff5510f17827b17012d7ad65f1d2342699d8039b2425bdf6c812dda356a5287cb6b8b1e9bf1ae9654a046c8dd5be80ec5192e04b950491b25ba8fec69ceb0d7d27bea9fdfcf184f677455db27ffe7a4634d893c73c37e90d6dfa15a040264953d971c868f7884b81dc811c4dd9affcc971bf9bab7a2e77180c8810530d20f35e947ef21a29de35a3f1a9b6c72784606ae26d424f60d1f60482fa8edeb2213cfef11c99a397f763de5ed395d333fc66795b6d9fa93ad86da71ddeb1a5dc4030afab6327bf2e98892443af226a4fd223481926a9aeed4b1de18e1dc2a0472428af5bf2b7ab65aa6b24bef4e9f9f584c93e5f1662a8434c5116978474b073242b0b69295e4af147a12b3b6f7f72922bc6d8d0babacd912a8a7a04a919e369f2ecb12fd6ed04197f51a2c27639040c1afaedddee1539a7e770d3eb7eb1f4acff26b8ba564794ffca0f1c7f3236727a4392c262825ca96492e6ffa294dc1228d2e64703b9cc440e022c50584c53abf61bd863eb1ba274e7aad16af87477d914cdca21a1c770f2a3eec33ba0d1452a4904824c8c63b36e26e3e639a24d8154cfef5bd890b8afb68beb16fee8f840e1086a0dae2ae2ba771b8dfa1cb5f6303126b975dd3480206007acfb8ef48c787f1b5b675aabcfce5df67dccf100d40cd08de9431ce2610e9cdec8a7991d32e5698373ab721a4678eb519731b1d58536f98022c4a6c0a7f288b1db719dbed59cf0168c3710fb597f6674a78969b44463dc8c9dd9c47ad079f86a533efba73fa49e08489139f27268bbbd762baa3531a8156a7dc31a54b3bac49e6d567891cf95848c6fcec9c41eb56c14e37d5c1eb10f9c8a622082278373c4d1261309d75ffaddf45d09702f0744e069cbf8f46335efaa511e989f1cad05518fc1002b6f55024d9795aa2bb48213060735912ed49f97d2055671b9fb2651a06fabda6d7f000ff1433a2590a1247febee74f884f90ea8811741bde71ff35ba1ff671fd69dc24409e11372f79cd03b9a8e7ec5080704ef75a00eb9fbd99dd9f82c2c11ceaac79b2464fe54358a34b06f6ec4cd3a83ac11979ac0729c8ea3fa10e2c56590856b687af5f69c201460513d611f828f7c708b7930472be27423189e0efdcbdd08e6beb3beafe5f2eb247f57338844bd1979dfebb220f7ed2cba1dce6618aaea9f1f2bad9a23bc2220c76bfe00ff83edfd068008a8b77b37e32269a6b3c61ea8bb8e3391b8413af13cd25104ff5ba027a2e13354c0d11e29471c1b5e6fbb6ecb7aac49ebc55bfc767d31e6ad38f094eb9a2159af3cbe5e6471fc2712d0064210511b1202259828e43c57dfc643569b8cf25b1228c42981294a7d788dfe1ac550c14caa9eacefb5a8f2b268334cd0c2085b15ab68d7bb4514cf1dd2df8951aa75e94c3f387a225b365f8d0bf0ec1265b41c2c1c6b03c0c6f4fe39eb3c5a85c3b632c48d19f1a86ead8f391b15aeecd22b86b5ac8f247bc3c0b044c058da5cae870be4ef96d497a1c7a242710f0bdbfedcb115c74cad01ccd853f9b14e2feb1151fffee3636f5da30233a5a57f5597ca707fc618abc06eda8cda23501dd9728d32c399f6a684efc876916298de5e3d2fc2fd1f5ab03f9205b5c1a6dacb682e574757478f4bad521b00abafd7c8d48b55940d22b1a4699866513a27f6751a8f7936bb2fb5e61f0b78228327683bf64d5250d160a79c64462a4067a02ca0fc565072dcfd390685cd99a0309f6dd249f71f2886a0f70bad457ed2460803f8044cfc216d5d53430e81d709a6d223da151a808f15712e348efbec566cb13d7bacc67fe4b41c1d5fa5295178297e25d9b1430abcb4db55a46bbf8f8e90daeb1a7cbec37ffddacf8da2a7735090ebdf5ec7af64b58beb5a8fa58e938b657c3aad3b2d9aa9945c3a2c3af147570d04591012ed15a4fe01967e33d1fa21b63db69834cb285febd8310e926c8eeeed2b50b13d5bf1f9b34f1336fdb0c23c99a9f097dc1a1a38a9abd319602584f0da310e0e53bceb60b12723317c954f37cab96e3dd18f75f4b328d05bd825ba871896260764ae7d764d4b386e9d8a336b44ecde1c0214f60ddf04f25fddaf375722b8b52c0c9c7e03641051f9e793f6e0cc5bfdcd8da8c299c4d09ccc57a9bbfc043ca54cf899388652b70c9ff15cf65905cde4f3d0673ae19a278343dcb7d018be3c7770d23843724fd644e18926529be591fc13f47693cbf96f7a029411588230f90e37fb3ec71e85a9339738f7cc327e63cb58b072154e01bb13d4b1f0b4f318617d26cf90d1b6c5a0b73ded01e63580f840a395d69348698b2b8816a27f796ad143557506f6bf158867657a662d3f33bd743b1debd30dde92d5e7ce9f78648f0ab90c73caf6cb4e60f8701b2cfde8ea9b8f2df9750eeb6f949a928f1fa782ed7028c3d5ac0fe5cacbd490baa2a284aa68b3ff79f1d1311043e1cd4e5600c4cdddbb2c5921d7e32d39b531e1d364f90dfd841d5a63e3d55ae35bff5bf2a492809414c258e34ccfbc86850654bdfaf6240aa1cfdc61dff3b608ad1b9b797f79806e09eb3122b80c4231c3f78a06f837b8daed73d722bb206f78eccaaf22d6932b5364360b03af2a6cf06b274812f3ae8a44f10274e760247bd8ec422910016304924dd07330f12acf2fffa2d09e4711a445ed19ed4f7595d2e3005c673e7a1fa3a6c1f1f690835823cf2f8747a621004445ebb0143876e499d5060a1cedc6ce2b030c4bda72916ef939227b76522aede0c9b7e42a0e648b17788d237152740afd43bb921b1f1a0cecf612ce6479315db094086d9f0e0bebbe0bda770d49918fa00b19e15b7beb9470237adf7e00929a7ece758746635a818ef053155776d43f3a1c0bd7ca35d4a50c8e14c894ab3a7f5bfed1f651ced7ffe88cd25d2c1f35038c5a02166e49e81d3efe673aa5ced4b4566e8a0bf027309711449191a6c15e1af07df6fa1055361f30c172c45e960392ef1910f1eecd9d740b09bcb2c1040ef7db3f81e9abbd7db2eb7878dd9f1f790730f9861e37be229b525273dc5aa0a6f55e2bc6bf5230b1b57c17c49972b9da6fa19fcac6789a6c8cb7adc1b3a8a0286209527dd6fedb570c8ddd7c3f01e9203531e66bccbdffc0932a1d1de46c3b55334f5de077850bc53a3bdeb67a25679805033df74178be578388088e2970e3e2ac2ef3f98d6485bd1174156154ed2a78c54d243627dd3e79ca37461b397ef66511a527dae9523d3ea8e277706e42555fbedab939f54cd9113449971093d83c2e17ef84c2a7a261a492cbcd2d9d0fcea3ef7c30498c084f7af86110bba590a683a292119ad32dd80a6dd0c67683750bba6c18848b415df42a80f29cc0cec6f3389426f3eb79d52b8d59fa80001160cbfa32f28d0f6e5b8ba133cb888404471e88f9753ae4b740ffca64dd165a0dd352e86fd04baf9dd20d61213e58d273bc595d05b305d5c5da17b4d97d12c519c69c4eb2a6fa54f2ce5effc2e57a1f955f035c34c77fc6ef0daf2a9fc329cfee72b35cf9892c77cdb70aa1981d4c2b1db8af773bbbc53fede1fc068b42a79fc5cf9"}]}]}]}]}], {0x14}}, 0xec4}}, 0x0) 05:43:56 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000005480)=[{{0x0, 0x0, &(0x7f00000003c0)}}, {{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000600)='\r', 0x1}], 0x1}}], 0x2, 0x0) 05:43:56 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='uid_map\x00') pread64(r0, &(0x7f0000000080)=""/83, 0x53, 0x0) pread64(r0, 0x0, 0x0, 0x1) 05:43:56 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000001540), 0x0, 0x0) socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r0, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[@rights={{0x14, 0x1, 0x1, [r1]}}], 0x18}, 0x0) 05:43:56 executing program 1: pkey_mprotect(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000004, 0xffffffffffffffff) 05:43:56 executing program 4: shmctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/38) 05:43:56 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_mreqn(r0, 0x0, 0x15, 0x0, &(0x7f0000000080)) 05:43:56 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmmsg$unix(r0, &(0x7f0000000740)=[{{0x0, 0x0, &(0x7f00000025c0)=[{&(0x7f0000000040)='\b', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000080)="87", 0x1}], 0x1, &(0x7f0000000280)=[@rights={{0x10}}], 0x10}}], 0x2, 0x0) 05:43:56 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001180)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000040)={0x2, 0xb, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, [@sadb_key={0x1, 0x9}]}, 0x18}}, 0x0) 05:43:56 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000005480)=[{{0x0, 0x0, &(0x7f00000003c0)}}, {{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000600)='\r', 0x1}], 0x1}}], 0x2, 0x0) 05:43:56 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='uid_map\x00') pread64(r0, &(0x7f0000000080)=""/83, 0x53, 0x0) pread64(r0, 0x0, 0x0, 0x1) 05:43:56 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmmsg$unix(r0, &(0x7f0000000740)=[{{0x0, 0x0, &(0x7f00000025c0)=[{&(0x7f0000000040)='\b', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000080)="87", 0x1}], 0x1, &(0x7f0000000280)=[@rights={{0x10, 0x1, 0x2}}], 0x10}}], 0x2, 0x0) 05:43:56 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000005480)=[{{0x0, 0x0, &(0x7f00000003c0)}}, {{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000600)='\r', 0x1}], 0x1}}], 0x2, 0x0) 05:43:56 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8927, &(0x7f0000000380)={'batadv_slave_1\x00'}) 05:43:56 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001740)={0x0, 0x0, &(0x7f0000001500)={&(0x7f0000001680)={0x2, 0x7, 0x0, 0x2, 0x3, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}]}, 0x18}}, 0x0) 05:43:56 executing program 1: fcntl$lock(0xffffffffffffffff, 0xb, 0x0) 05:43:56 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='uid_map\x00') pread64(r0, &(0x7f0000000080)=""/83, 0x53, 0x0) pread64(r0, 0x0, 0x0, 0x1) 05:43:56 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_mreqn(r0, 0x0, 0xb, 0x0, &(0x7f0000000080)) 05:43:56 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmmsg$unix(r0, &(0x7f0000000740)=[{{0x0, 0x0, &(0x7f00000025c0)=[{&(0x7f0000000040)='\b', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000080)="87", 0x1}], 0x1, &(0x7f0000000280)=[@rights={{0x24}}], 0x10}}], 0x2, 0x0) 05:43:56 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8953, 0x0) 05:43:56 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='uid_map\x00') pread64(r0, &(0x7f0000000080)=""/83, 0x53, 0x0) pread64(r0, &(0x7f0000001100)=""/4096, 0x1000, 0x0) [ 302.526652][ T23] audit: type=1400 audit(1677995036.605:371): avc: denied { write } for pid=15359 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 05:43:56 executing program 4: select(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x4}, &(0x7f0000000100)={0x5}, &(0x7f0000000140)={0x77359400}) 05:43:56 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000005480)=[{{0x0, 0x0, &(0x7f00000003c0)=[{0x0}], 0x1}}, {{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000600)='\r', 0x1}], 0x1}}], 0x2, 0x0) 05:43:56 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_mreqn(r0, 0x0, 0x32, 0x0, &(0x7f0000000080)) 05:43:56 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="01"], 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), r1) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000480), r1) sendmsg$TIPC_NL_SOCK_GET(r0, &(0x7f00000008c0)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000580)={0x20, r2, 0xf5a0696b7a539547, 0x0, 0x0, {}, [@TIPC_NLA_NODE={0xc, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ID={0x5, 0x3, '6'}]}]}, 0x20}}, 0x0) 05:43:56 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000005480)=[{{0x0, 0x0, &(0x7f00000003c0)=[{0x0}], 0x1}}, {{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000600)='\r', 0x1}], 0x1}}], 0x2, 0x0) [ 302.656452][T15394] netlink: 'syz-executor.1': attribute type 11 has an invalid length. 05:43:57 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x18, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_WOL_HEADER={0x4}]}, 0x18}}, 0x0) 05:43:57 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='uid_map\x00') pread64(r0, &(0x7f0000000080)=""/83, 0x53, 0x0) pread64(r0, &(0x7f0000001100)=""/4096, 0x1000, 0x0) 05:43:57 executing program 5: openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x6102, 0x0) 05:43:57 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000000)={0x401}, 0x4) 05:43:57 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000005480)=[{{0x0, 0x0, &(0x7f00000003c0)=[{0x0}], 0x1}}, {{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000600)='\r', 0x1}], 0x1}}], 0x2, 0x0) 05:43:57 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmmsg$unix(r0, &(0x7f00000026c0)=[{{0x0, 0x0, &(0x7f00000025c0)=[{&(0x7f0000000280)='\b', 0x1}], 0x300}}], 0x1, 0x0) 05:43:57 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='uid_map\x00') pread64(r0, &(0x7f0000000080)=""/83, 0x53, 0x0) pread64(r0, &(0x7f0000001100)=""/4096, 0x1000, 0x0) 05:43:57 executing program 4: r0 = socket(0x11, 0x3, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x0, 0x0, 0x0) 05:43:57 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x7ffe, 0x0, 0x0, 0x0) 05:43:57 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000005480)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)}], 0x1}}, {{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000600)='\r', 0x1}], 0x1}}], 0x2, 0x0) 05:43:57 executing program 1: bpf$OBJ_PIN_MAP(0x12, &(0x7f00000000c0)={0x0}, 0x10) 05:43:57 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x12, &(0x7f0000000000)=0xffffff24, 0x4) 05:43:57 executing program 0: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x14, 0x3, 0x1, 0x301}, 0x14}}, 0x0) 05:43:57 executing program 1: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$inet(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000100)='#', 0x1}], 0x1, &(0x7f0000000d00)=ANY=[@ANYBLOB="1400000000000000", @ANYRES32, @ANYBLOB="ac141440ffffffff000000001103"], 0x118}, 0x0) 05:43:57 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_mreqn(r0, 0x0, 0xf, 0x0, &(0x7f0000000080)) 05:43:57 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="01"], 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000300), r1) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x50, r2, 0x321, 0x0, 0x0, {0x5}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x3}, {0x6}, {0x5}}]}, 0x50}}, 0x0) 05:43:57 executing program 3: socket$key(0xf, 0x3, 0x2) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x2, 0x11, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 05:43:57 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="01"], 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000300), r1) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x50, r2, 0x321, 0x0, 0x0, {0x5}, [{{@pci={{0x8, 0x117}, {0x11}}, {0x8}}, {0x8}, {0x6}, {0x5}}]}, 0x50}}, 0x0) 05:43:57 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000005480)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)}], 0x1}}, {{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000600)='\r', 0x1}], 0x1}}], 0x2, 0x0) 05:43:57 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'sit0\x00'}) 05:43:57 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x2, 0x16, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@local}}]}, 0x50}}, 0x0) 05:43:57 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000005480)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)}], 0x1}}, {{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000600)='\r', 0x1}], 0x1}}], 0x2, 0x0) 05:43:57 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="28000000020101"], 0xa8}}, 0x0) 05:43:57 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="01"], 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000300), r1) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x50, r2, 0x321, 0x0, 0x0, {0x5}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x3}, {0x6}, {0x5}}]}, 0x50}}, 0x0) [ 303.275658][T15504] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=259 sclass=netlink_tcpdiag_socket pid=15504 comm=syz-executor.0 [ 303.309279][T15511] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. 05:43:57 executing program 0: bpf$MAP_CREATE(0x16, &(0x7f0000000240), 0x48) 05:43:57 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x9, &(0x7f0000000040)=0x6fb42a70, 0x4) 05:43:57 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8914, &(0x7f0000000380)={'batadv_slave_1\x00'}) 05:43:57 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000005480)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="90", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000600)='\r', 0x1}], 0x1}}], 0x2, 0x0) 05:43:57 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmmsg$unix(r0, &(0x7f0000000740)=[{{0x0, 0x0, &(0x7f00000025c0)=[{&(0x7f0000000040)='\b', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000080)="87", 0xfffffdef}], 0x1, &(0x7f0000000280)=[@rights={{0x10}}], 0x10}}], 0x2, 0x0) 05:43:57 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="01"], 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000300), r1) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x50, r2, 0x321, 0x0, 0x0, {0x5}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x8}, {0x6}, {0x5}}]}, 0x50}}, 0x0) [ 303.374737][T15524] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 303.379200][T15525] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. 05:43:57 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000005480)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="90", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000600)='\r', 0x1}], 0x1}}], 0x2, 0x0) 05:43:57 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="01"], 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000300), r1) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x50, r2, 0x321, 0x0, 0x0, {0x5}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x3}, {0x6}, {0x5}}]}, 0x50}}, 0x0) 05:43:57 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="01"], 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000300), r1) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x50, r2, 0x321, 0x0, 0x0, {0x5}, [{{@pci={{0x8, 0x12d}, {0x11}}, {0x8}}, {0x8}, {0x6}, {0x5}}]}, 0x50}}, 0x0) 05:43:57 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)=@newtfilter={0x24, 0x2c, 0x1}, 0x24}}, 0x0) [ 303.415626][T15531] batman_adv: batadv0: Interface deactivated: batadv_slave_1 05:43:57 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev}, 0x10) sendmmsg(r1, &(0x7f0000005480)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="90", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000600)='\r', 0x1}], 0x1}}], 0x2, 0x0) 05:43:57 executing program 4: openat2$dir(0xffffffffffffff9c, 0x0, &(0x7f0000000400)={0x0, 0x0, 0x14}, 0x18) 05:43:57 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000180)={'nat\x00'}, &(0x7f0000000200)=0x54) 05:43:57 executing program 1: bpf$PROG_LOAD_XDP(0x21, 0x0, 0x0) 05:43:57 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x12, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 05:43:57 executing program 0: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x5, &(0x7f0000000c80)=@mangle={'mangle\x00', 0x1f, 0x6, 0x3a8, 0x338, 0x338, 0x0, 0x278, 0x198, 0x420, 0x420, 0x420, 0x420, 0x420, 0x6, 0x0, {[{{@ip={@multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'rose0\x00', 'veth1\x00'}, 0x0, 0x70, 0xb0}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@multicast2}}}, {{@ip={@empty, @remote, 0x0, 0x0, 'wlan0\x00', 'macvlan1\x00'}, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@ip={@private, @loopback, 0x0, 0x0, 'wg2\x00', 'rose0\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@ip={@local, @multicast2, 0x0, 0x0, 'macvlan1\x00', 'veth1_to_hsr\x00'}, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}, {{@ip={@loopback, @remote, 0x0, 0x0, 'veth1_macvtap\x00', 'pimreg1\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@CLASSIFY={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x408) 05:43:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000040)="e5c63488d225ffc32f9ec043817bbc7c", 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="763dea49bec3fa82ae7b2f9dd71e2656", 0x10) 05:43:57 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="01"], 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000300), r1) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x50, r2, 0x321, 0x0, 0x0, {0x5}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x3}, {0x6}, {0x5}}]}, 0x50}}, 0x0) 05:43:57 executing program 3: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) 05:43:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x25, 0x0, &(0x7f0000000100)) [ 303.502046][T15544] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. 05:43:57 executing program 4: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x30, 0x0, 0x0) 05:43:57 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x12, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 05:43:57 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x5, &(0x7f0000000000)=0x6, 0x4) 05:43:57 executing program 0: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x15, &(0x7f0000000c80)=@mangle={'mangle\x00', 0x1f, 0x6, 0x3a8, 0x338, 0x338, 0x0, 0x278, 0x198, 0x420, 0x420, 0x420, 0x420, 0x420, 0x6, 0x0, {[{{@ip={@multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'rose0\x00', 'veth1\x00'}, 0x0, 0x70, 0xb0}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@multicast2}}}, {{@ip={@empty, @remote, 0x0, 0x0, 'wlan0\x00', 'macvlan1\x00'}, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@ip={@private, @loopback, 0x0, 0x0, 'wg2\x00', 'rose0\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@ip={@local, @multicast2, 0x0, 0x0, 'macvlan1\x00', 'veth1_to_hsr\x00'}, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}, {{@ip={@loopback, @remote, 0x0, 0x0, 'veth1_macvtap\x00', 'pimreg1\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@CLASSIFY={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x408) 05:43:57 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x7, 0x0, 0x0, 0x0, 0x600}, 0x48) 05:43:57 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x12, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 05:43:57 executing program 0: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$SOCK_DESTROY(r0, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001340)={&(0x7f0000000300)={0x14, 0x15, 0x6914ba4a20539897}, 0x14}}, 0x0) 05:43:57 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x1b, 0x3, &(0x7f0000000040)=@framed, &(0x7f00000000c0)='GPL\x00', 0x6, 0x95, &(0x7f0000000100)=""/149, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:43:57 executing program 3: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000100)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0046209, &(0x7f00000012c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 05:43:57 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="01"], 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x50, 0x0, 0x321, 0x0, 0x0, {0x5}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x3}, {0x6}, {0x5}}]}, 0x50}}, 0x0) 05:43:57 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x12, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) [ 303.587268][T15567] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. 05:43:57 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000d00)=ANY=[@ANYBLOB="98000000000901080000000000000000020000040800034000000fff6c0002940006000340000300002c00018014000300fc00000000000000000000000000000114000400fc010000000000000000000000000001060003400000000006000340000300000c00028005000100060000000c00028005000100110000000c000280050001000100000008"], 0x98}}, 0x0) 05:43:57 executing program 1: openat$full(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x20, 0x0) execveat(0xffffffffffffffff, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000640)=[&(0x7f0000000600)='\x00'], &(0x7f0000000780)=[&(0x7f0000000680)='\x00', &(0x7f00000006c0)='[[:(\xa8](/@#{\x00'], 0x1000) 05:43:57 executing program 3: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000100)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000012c0)={0x8, 0x0, &(0x7f0000000200)=[@acquire={0x40046302}], 0x0, 0x0, 0x0}) 05:43:57 executing program 0: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000100)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc018620c, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0}) 05:43:57 executing program 1: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x1a, &(0x7f0000000c80)=@mangle={'mangle\x00', 0x1f, 0x6, 0x3a8, 0x338, 0x338, 0x0, 0x278, 0x198, 0x420, 0x420, 0x420, 0x420, 0x420, 0x6, 0x0, {[{{@ip={@multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'rose0\x00', 'veth1\x00'}, 0x0, 0x70, 0xb0}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@multicast2}}}, {{@ip={@empty, @remote, 0x0, 0x0, 'wlan0\x00', 'macvlan1\x00'}, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@ip={@private, @loopback, 0x0, 0x0, 'wg2\x00', 'rose0\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@ip={@local, @multicast2, 0x0, 0x0, 'macvlan1\x00', 'veth1_to_hsr\x00'}, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}, {{@ip={@loopback, @remote, 0x0, 0x0, 'veth1_macvtap\x00', 'pimreg1\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@CLASSIFY={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x408) 05:43:57 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="01"], 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x50, 0x0, 0x321, 0x0, 0x0, {0x5}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x3}, {0x6}, {0x5}}]}, 0x50}}, 0x0) 05:43:57 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, 0x0, &(0x7f0000000200)) 05:43:57 executing program 0: r0 = eventfd2(0xffff, 0x80001) read$eventfd(r0, &(0x7f0000000180), 0x8) 05:43:57 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="01"], 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x50, 0x0, 0x321, 0x0, 0x0, {0x5}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x3}, {0x6}, {0x5}}]}, 0x50}}, 0x0) 05:43:57 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x4, &(0x7f0000000040)=@framed={{}, [@jmp={0x5, 0x0, 0x0, 0x0, 0x5}]}, &(0x7f00000000c0)='GPL\x00', 0x6, 0x95, &(0x7f0000000100)=""/149, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:43:57 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_buf(r0, 0x6, 0xe, &(0x7f0000000080)="40ea3026", 0x4) 05:43:57 executing program 1: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x22, &(0x7f0000000c80)=@mangle={'mangle\x00', 0x1f, 0x6, 0x3a8, 0x338, 0x338, 0x0, 0x278, 0x198, 0x420, 0x420, 0x420, 0x420, 0x420, 0x6, 0x0, {[{{@ip={@multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'rose0\x00', 'veth1\x00'}, 0x0, 0x70, 0xb0}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@multicast2}}}, {{@ip={@empty, @remote, 0x0, 0x0, 'wlan0\x00', 'macvlan1\x00'}, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@ip={@private, @loopback, 0x0, 0x0, 'wg2\x00', 'rose0\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@ip={@local, @multicast2, 0x0, 0x0, 'macvlan1\x00', 'veth1_to_hsr\x00'}, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}, {{@ip={@loopback, @remote, 0x0, 0x0, 'veth1_macvtap\x00', 'pimreg1\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@CLASSIFY={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x408) [ 303.688696][T15590] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 05:43:57 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x2, 0x80, 0x0, 0x0, 0x0, 0xee01}}, {{@in=@private}, 0x0, @in=@broadcast}}, 0xe8) 05:43:57 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f0000000000)=0x1f, 0x4) getsockopt$inet6_tcp_int(r0, 0x6, 0x7, 0x0, &(0x7f0000000100)) 05:43:57 executing program 0: openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='./binderfs/binder-control\x00', 0x0, 0x0) 05:43:57 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x1a, 0x0, &(0x7f0000000100)) 05:43:57 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="01"], 0x14}}, 0x0) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000300), r1) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x50, r2, 0x321, 0x0, 0x0, {0x5}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x3}, {0x6}, {0x5}}]}, 0x50}}, 0x0) 05:43:57 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}}, {{@in=@private}, 0x0, @in=@broadcast}}, 0xe8) 05:43:57 executing program 2: openat$binderfs(0xffffffffffffff9c, &(0x7f0000000100)='./binderfs/binder0\x00', 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder0\x00', 0x0, 0x0) 05:43:57 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0xa}}, &(0x7f00000000c0)='GPL\x00', 0x6, 0x95, &(0x7f0000000100)=""/149, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:43:57 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f0000000000)=0x1f, 0x4) getsockopt$inet6_tcp_int(r0, 0x6, 0x7, 0x0, &(0x7f0000000100)) 05:43:57 executing program 4: openat2$dir(0xffffffffffffff9c, 0x0, &(0x7f0000000400)={0x250880}, 0x18) 05:43:57 executing program 0: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x2a, &(0x7f0000000c80)=@mangle={'mangle\x00', 0x1f, 0x6, 0x3a8, 0x338, 0x338, 0x0, 0x278, 0x198, 0x420, 0x420, 0x420, 0x420, 0x420, 0x6, 0x0, {[{{@ip={@multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'rose0\x00', 'veth1\x00'}, 0x0, 0x70, 0xb0}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@multicast2}}}, {{@ip={@empty, @remote, 0x0, 0x0, 'wlan0\x00', 'macvlan1\x00'}, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@ip={@private, @loopback, 0x0, 0x0, 'wg2\x00', 'rose0\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@ip={@local, @multicast2, 0x0, 0x0, 'macvlan1\x00', 'veth1_to_hsr\x00'}, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}, {{@ip={@loopback, @remote, 0x0, 0x0, 'veth1_macvtap\x00', 'pimreg1\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@CLASSIFY={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x408) 05:43:57 executing program 1: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x29, &(0x7f0000000c80)=@mangle={'mangle\x00', 0x1f, 0x6, 0x3a8, 0x338, 0x338, 0x0, 0x278, 0x198, 0x420, 0x420, 0x420, 0x420, 0x420, 0x6, 0x0, {[{{@ip={@multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'rose0\x00', 'veth1\x00'}, 0x0, 0x70, 0xb0}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@multicast2}}}, {{@ip={@empty, @remote, 0x0, 0x0, 'wlan0\x00', 'macvlan1\x00'}, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@ip={@private, @loopback, 0x0, 0x0, 'wg2\x00', 'rose0\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@ip={@local, @multicast2, 0x0, 0x0, 'macvlan1\x00', 'veth1_to_hsr\x00'}, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}, {{@ip={@loopback, @remote, 0x0, 0x0, 'veth1_macvtap\x00', 'pimreg1\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@CLASSIFY={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x408) 05:43:57 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f00000000c0)=0x8, 0x4) 05:43:57 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="01"], 0x14}}, 0x0) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000300), r1) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x50, r2, 0x321, 0x0, 0x0, {0x5}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x3}, {0x6}, {0x5}}]}, 0x50}}, 0x0) 05:43:57 executing program 0: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x30, &(0x7f0000000c80)=@mangle={'mangle\x00', 0x1f, 0x6, 0x3a8, 0x338, 0x338, 0x0, 0x278, 0x198, 0x420, 0x420, 0x420, 0x420, 0x420, 0x6, 0x0, {[{{@ip={@multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'rose0\x00', 'veth1\x00'}, 0x0, 0x70, 0xb0}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@multicast2}}}, {{@ip={@empty, @remote, 0x0, 0x0, 'wlan0\x00', 'macvlan1\x00'}, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@ip={@private, @loopback, 0x0, 0x0, 'wg2\x00', 'rose0\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@ip={@local, @multicast2, 0x0, 0x0, 'macvlan1\x00', 'veth1_to_hsr\x00'}, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}, {{@ip={@loopback, @remote, 0x0, 0x0, 'veth1_macvtap\x00', 'pimreg1\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@CLASSIFY={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x408) 05:43:57 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f0000000000)=0x1f, 0x4) getsockopt$inet6_tcp_int(r0, 0x6, 0x7, 0x0, &(0x7f0000000100)) 05:43:57 executing program 4: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000100)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0x400c620e, &(0x7f00000012c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 05:43:57 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="01"], 0x14}}, 0x0) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000300), r1) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x50, r2, 0x321, 0x0, 0x0, {0x5}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x3}, {0x6}, {0x5}}]}, 0x50}}, 0x0) 05:43:57 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000940)=@deltfilter={0x34, 0x2d, 0x1, 0x0, 0x0, {}, [@filter_kind_options=@f_flow={{0x9}, {0x4}}]}, 0x34}}, 0x0) 05:43:57 executing program 2: bpf$PROG_LOAD_XDP(0x2, 0x0, 0x0) 05:43:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x10, 0x0, &(0x7f0000000100)) 05:43:58 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_mreqn(r0, 0x0, 0x29, 0x0, &(0x7f0000000080)) 05:43:58 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f0000000000)=0x1f, 0x4) getsockopt$inet6_tcp_int(r0, 0x6, 0x7, 0x0, &(0x7f0000000100)) 05:43:58 executing program 2: unshare(0x0) unshare(0x40000080) 05:43:58 executing program 1: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x2400, 0x0) 05:43:58 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000300), r1) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x50, r2, 0x321, 0x0, 0x0, {0x5}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x3}, {0x6}, {0x5}}]}, 0x50}}, 0x0) 05:43:58 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x4, &(0x7f0000000140)=@framed={{}, [@ldst={0x5df9b4498f0a9f0c}]}, &(0x7f0000000180)='syzkaller\x00', 0x5, 0xba, &(0x7f00000001c0)=""/186, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:43:58 executing program 4: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x24, 0x0, 0x0) 05:43:58 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000940)=@deltfilter={0x24, 0x2d, 0x1}, 0x24}}, 0x0) 05:43:58 executing program 1: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000000100)=0x3, 0x4) 05:43:58 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000300), r1) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x50, r2, 0x321, 0x0, 0x0, {0x5}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x3}, {0x6}, {0x5}}]}, 0x50}}, 0x0) [ 303.940430][ T23] audit: type=1400 audit(1677995038.025:372): avc: denied { append } for pid=15656 comm="syz-executor.1" name="ppp" dev="devtmpfs" ino=116 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 05:43:58 executing program 4: io_setup(0x4, &(0x7f0000000140)=0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000640)='/proc/timer_list\x00', 0x0, 0x0) io_submit(r0, 0x1, &(0x7f0000000280)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x8000, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 05:43:58 executing program 3: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x19, &(0x7f0000000c80)=@mangle={'mangle\x00', 0x1f, 0x6, 0x3a8, 0x338, 0x338, 0x0, 0x278, 0x198, 0x420, 0x420, 0x420, 0x420, 0x420, 0x6, 0x0, {[{{@ip={@multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'rose0\x00', 'veth1\x00'}, 0x0, 0x70, 0xb0}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@multicast2}}}, {{@ip={@empty, @remote, 0x0, 0x0, 'wlan0\x00', 'macvlan1\x00'}, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@ip={@private, @loopback, 0x0, 0x0, 'wg2\x00', 'rose0\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@ip={@local, @multicast2, 0x0, 0x0, 'macvlan1\x00', 'veth1_to_hsr\x00'}, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}, {{@ip={@loopback, @remote, 0x0, 0x0, 'veth1_macvtap\x00', 'pimreg1\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@CLASSIFY={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x408) 05:43:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=@nat={'nat\x00', 0x1b, 0x5, 0x490, 0x340, 0x0, 0xffffffff, 0x340, 0x250, 0x458, 0x458, 0xffffffff, 0x458, 0x458, 0x5, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4=@private}}}, {{@ipv6={@private0, @rand_addr=' \x01\x00', [], [], 'ip6_vti0\x00', 'bridge_slave_1\x00', {}, {}, 0x0, 0x0, 0x8}, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@mcast1, @icmp_id}}}, {{@ipv6={@dev, @local, [], [], 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x0, @ipv6=@ipv4={'\x00', '\xff\xff', @private}, @ipv6=@mcast2, @gre_key, @icmp_id}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4f0) 05:43:58 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0xfffffff9, 0x4) 05:43:58 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000280), 0x0) 05:43:58 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000300), r1) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x50, r2, 0x321, 0x0, 0x0, {0x5}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x3}, {0x6}, {0x5}}]}, 0x50}}, 0x0) 05:43:58 executing program 0: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000100)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0189436, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0}) 05:43:58 executing program 3: rt_sigaction(0x23, 0x0, 0x0, 0x8, &(0x7f0000000380)) 05:43:58 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, 0x0) 05:43:58 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="01"], 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x50, r1, 0x321, 0x0, 0x0, {0x5}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x3}, {0x6}, {0x5}}]}, 0x50}}, 0x0) 05:43:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0x894b, 0x0) 05:43:58 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB="c0000000", @ANYRES16=r1, @ANYBLOB="010000000000000000000100000008000100", @ANYBLOB="a400088078"], 0xc0}}, 0x0) 05:43:58 executing program 4: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000100)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0x40046205, 0x0) 05:43:58 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 05:43:58 executing program 0: shmget$private(0x0, 0x2000, 0x200, &(0x7f0000ffe000/0x2000)=nil) 05:43:58 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x8a941, 0x0) 05:43:58 executing program 3: io_setup(0x0, &(0x7f0000001180)=0x0) clock_gettime(0x0, &(0x7f00000002c0)) io_getevents(r0, 0x3, 0x3, &(0x7f00000001c0)=[{}, {}, {}], 0x0) io_destroy(r0) 05:43:58 executing program 4: mremap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x2000, 0x8, &(0x7f0000ffb000/0x2000)=nil) 05:43:58 executing program 1: open$dir(&(0x7f0000000000)='./file0\x00', 0xf0e9508cb796cfd0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x200, 0x0) 05:43:58 executing program 2: msgget$private(0x0, 0x3e8) 05:43:58 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="01"], 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x50, r1, 0x321, 0x0, 0x0, {0x5}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x3}, {0x6}, {0x5}}]}, 0x50}}, 0x0) 05:43:58 executing program 0: msgget$private(0x0, 0x620) 05:43:58 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$cgroup_pressure(r0, &(0x7f0000000000)='io.pressure\x00', 0x2, 0x0) 05:43:58 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, 0x0, 0x0) 05:43:58 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000a00)=@file={0x1, './file0\x00'}, 0x6e) 05:43:58 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) 05:43:58 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="01"], 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x50, r1, 0x321, 0x0, 0x0, {0x5}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x3}, {0x6}, {0x5}}]}, 0x50}}, 0x0) 05:43:58 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) connect$unix(r0, 0x0, 0x0) 05:43:58 executing program 3: open$dir(&(0x7f0000000000)='./file0\x00', 0xf0e9508cb796cfd0, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x40) 05:43:58 executing program 4: open$dir(&(0x7f0000000000)='./file0\x00', 0xf0e9508cb796cfd0, 0x0) setxattr$incfs_metadata(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, 0x0, 0x1) 05:43:58 executing program 2: open$dir(&(0x7f0000000000)='./file0\x00', 0x40, 0x10) 05:43:58 executing program 0: open$dir(&(0x7f0000000000)='./file0\x00', 0xf0e9508cb796cfd0, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x2c4082, 0x0) 05:43:58 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="01"], 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000300), r0) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x50, r1, 0x321, 0x0, 0x0, {0x5}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x3}, {0x6}, {0x5}}]}, 0x50}}, 0x0) 05:43:58 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) 05:43:58 executing program 1: r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) shmat(r0, &(0x7f0000ffd000/0x2000)=nil, 0x3000) 05:43:58 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000000)={'wg1\x00'}) 05:43:58 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000004040)=[{{&(0x7f0000000000)={0xa, 0x4e24, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c, 0x0}}], 0x1, 0x0) 05:43:58 executing program 0: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RSETATTR(r0, 0x0, 0x0) 05:43:58 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="01"], 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000300), r0) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x50, r1, 0x321, 0x0, 0x0, {0x5}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x3}, {0x6}, {0x5}}]}, 0x50}}, 0x0) 05:43:58 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, 0x0) 05:43:58 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, 0x0, 0x0) 05:43:58 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) 05:43:58 executing program 2: mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x8000, &(0x7f0000000040), 0x100000001, 0x3) 05:43:58 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="01"], 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000300), r0) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x50, r1, 0x321, 0x0, 0x0, {0x5}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x3}, {0x6}, {0x5}}]}, 0x50}}, 0x0) 05:43:58 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) setsockopt$packet_rx_ring(r0, 0x107, 0x5, 0x0, 0x0) 05:43:58 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x2000) 05:43:58 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000004600), 0x40, 0x0) 05:43:58 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, 0x0, 0x0) 05:43:58 executing program 1: sysinfo(&(0x7f0000000040)=""/4096) 05:43:58 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="01"], 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000300), r1) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x50, r2, 0x321, 0x0, 0x0, {0x5}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x3}, {0x6}, {0x5}}]}, 0x50}}, 0x0) 05:43:58 executing program 0: open$dir(&(0x7f0000000000)='./file0\x00', 0xf0e9508cb796cfd0, 0x0) lsetxattr$security_evm(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000240), 0x0, 0x0, 0x0) 05:43:58 executing program 4: open$dir(&(0x7f0000000000)='./file0\x00', 0xf0e9508cb796cfd0, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x201, 0x0) 05:43:58 executing program 2: mincore(&(0x7f0000ffb000/0x2000)=nil, 0x2000, &(0x7f0000000040)=""/116) 05:43:58 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="01"], 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000300), r1) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x50, r2, 0x321, 0x0, 0x0, {0x5}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x3}, {0x6}, {0x5}}]}, 0x50}}, 0x0) 05:43:58 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mmap$perf(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x5000001, 0x12, r0, 0x0) 05:43:58 executing program 0: uname(&(0x7f0000000300)=""/4096) 05:43:58 executing program 2: rt_sigaction(0xd, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000140)) 05:43:59 executing program 3: open$dir(&(0x7f0000000000)='./file0\x00', 0xf0e9508cb796cfd0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, 0x0, 0x0) 05:43:59 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendto$unix(r0, 0x0, 0x0, 0x11, 0x0, 0x0) 05:43:59 executing program 1: open$dir(&(0x7f0000000000)='./file0\x00', 0xf0e9508cb796cfd0, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x80, 0x40) 05:43:59 executing program 2: getrlimit(0xc, &(0x7f0000000200)) 05:43:59 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x2001, 0x0) 05:43:59 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="01"], 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000300), r1) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x50, r2, 0x321, 0x0, 0x0, {0x5}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x3}, {0x6}, {0x5}}]}, 0x50}}, 0x0) 05:43:59 executing program 2: msgget$private(0x0, 0x500) 05:43:59 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x2b032, r0, 0x0) 05:43:59 executing program 0: open$dir(&(0x7f0000000000)='./file0\x00', 0xf0e9508cb796cfd0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0), 0x0, 0x0, 0x0) 05:43:59 executing program 4: r0 = geteuid() setreuid(0x0, r0) 05:43:59 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r1, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000300), r1) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x50, r2, 0x321, 0x0, 0x0, {0x5}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x3}, {0x6}, {0x5}}]}, 0x50}}, 0x0) 05:43:59 executing program 3: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000280)={0x1}, 0x8, 0x0) msgrcv(r0, &(0x7f0000002040)={0x0, ""/4096}, 0x1008, 0x1, 0x0) 05:43:59 executing program 4: open$dir(&(0x7f0000000000)='./file0\x00', 0xf0e9508cb796cfd0, 0x0) setxattr$incfs_metadata(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000180), 0x0, 0x0, 0x0) 05:43:59 executing program 1: shmget(0x1, 0x2000, 0x200, &(0x7f0000ffa000/0x2000)=nil) 05:43:59 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0xfffffffffffffd71) 05:43:59 executing program 0: getcwd(&(0x7f0000000240)=""/76, 0x4c) 05:43:59 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r1, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000300), r1) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x50, r2, 0x321, 0x0, 0x0, {0x5}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x3}, {0x6}, {0x5}}]}, 0x50}}, 0x0) 05:43:59 executing program 4: open$dir(&(0x7f0000000000)='./file0\x00', 0x40, 0x0) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00') 05:43:59 executing program 1: open$dir(&(0x7f0000000000)='./file0\x00', 0xf0e9508cb796cfd0, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x3a) 05:43:59 executing program 3: open$dir(&(0x7f0000000000)='./file0\x00', 0xf0e9508cb796cfd0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000000c0), 0x0, 0x0, 0x0) 05:43:59 executing program 0: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000280)={0x1}, 0x8, 0x0) msgrcv(r0, &(0x7f0000002040)={0x0, ""/4096}, 0x1008, 0x1, 0x800) 05:43:59 executing program 2: open$dir(&(0x7f0000000000)='./file0\x00', 0xf0e9508cb796cfd0, 0xb) 05:43:59 executing program 4: open$dir(&(0x7f0000000000)='./file0\x00', 0xf0e9508cb796cfd0, 0x0) setxattr$incfs_metadata(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x0, 0x0, 0x0) 05:43:59 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r1, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000300), r1) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x50, r2, 0x321, 0x0, 0x0, {0x5}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x3}, {0x6}, {0x5}}]}, 0x50}}, 0x0) 05:43:59 executing program 3: r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) shmat(r0, &(0x7f0000ffb000/0x4000)=nil, 0x1000) 05:43:59 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0xc2ac0, 0x0) 05:43:59 executing program 2: r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000300)={{0x0, 0xee00, 0xee01}}) 05:43:59 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, 0x0, 0x0) 05:43:59 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000300), r1) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x50, r2, 0x321, 0x0, 0x0, {0x5}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x3}, {0x6}, {0x5}}]}, 0x50}}, 0x0) 05:43:59 executing program 4: r0 = gettid() r1 = gettid() tgkill(r1, r0, 0x0) 05:43:59 executing program 1: openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/devices/system', 0x8000, 0x20) 05:43:59 executing program 2: open$dir(&(0x7f0000000000)='./file0\x00', 0xf0e9508cb796cfd0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000240), 0x2, 0x1) 05:43:59 executing program 3: open$dir(&(0x7f0000000000)='./file0\x00', 0xf0e9508cb796cfd0, 0x0) chroot(&(0x7f0000000240)='./file0/file0\x00') 05:43:59 executing program 4: mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0xc) 05:43:59 executing program 0: mlock2(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 05:43:59 executing program 1: munlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) 05:43:59 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_buf(r0, 0x1, 0x0, &(0x7f00000000c0)=""/52, &(0x7f0000000180)=0xffffffffffffff4b) 05:43:59 executing program 2: syz_clone(0x4884000, &(0x7f0000000000)="c2ec30f376a54e711d3e5758d226f4de3eaf8f0d6447e522989a2b057d17738c1bdf8d7df2659c52f640b216cf07ce6b2ce7fbb8d2505ebb8356049b8421e88d98cafa42992477b0246af79f6f74f527f3012a62c02e5bfcb65eb72abbfc3673a1b73fdb05a3c458f96e251c32988f752625ff775ca863a8960cb7e6fb48778d896a365841adc96b083f547bc952230dd47857216af8db7adff7a8becd7ef93419684e42e20b28337ba79aacef1f6104dbc468d10544bc9adb6d58031b884c7b85e50979cd92974e34d421b28c992e872fdabe832f4b55a76f199225fa27ddd566cca9647c3f1b710c4cdc8fe6002a5b34178510b3a9f570c7c2555fbae7be0028bf02a4a01c3cdbe56972c84685ed711aa199b50b2bf9c57c7e465692ab1c80d708d349ae395e2cab018b16b1051745bd54f4d4499b3f53e5b546a43d947c11f8a284b025838fa3578639f16f666fe54fa273169fbd20e66baf6556d2cac4519eb257379e9fcfa06f1a3b92f1e43ead6da53bd1c4aaea3045670f2539b45346d3adf9277917c21beaad4f0042f92cb4adc1d6b68c86c71bd19590a427e716a5db69d97f45f7ad1396ef0d6e517bd1da1bd0bccc93fc16d1228b82a05e1153b696d369dfdf39056f8957a5ea13518562815d3d556b3b6ed6c4d5f6f529d987a5ca4991ad1097cfc156994b55cde9aa81526a69d69a0c09f5b50512bea9485c1fe5f1302149f6107d829cf462c404805b94b1edd29a4422aedfe4fc14d5864bd57a961b4589be6ab4e5b685fff6a9d77dd15e523ff0451da53ca92c1a4f12c705f033ebcb6339ec46d759b444d30d015ff7ef57fa68dea31c13e181dd2d7da731d17f96eabcee2e3e25c308387dc6a802002ec0bc7f83c2683a9a1fb8a96570598cfa232e3760fce171f77dde2c08207f2dce66cc78d7d34671ee48d4212b87c57ea80370db0437eb86c935ff191c0f09a706cc99ada1f363714e1ac86a88ee72925aacc17058550f4048a8b439ee877adb964bc58742e29c7b413ea0328ade0eccb8b67f0235a777161951bf484de65b1d226afca6ec12afb8fe5718d3c71ec4e9a1ad4ce1c340859d4fb202de0a4c37e44dc335650590ebebdaa010eb107f05409e2abb6531935783019688ad030d7aaf38194b91de66d9cd78db8027d37f3e497ac2ce7f0bb629f11839121a796dfc1c75449e7559a9b4092cb96f2b920d2a1efa93f717a4ba898585aac7621beec2d36a35a115b5b4abbc6b1a9ae39947800ad3776ef5deaf6e6ac6b0d1bdc0ab2dae81ce6cc976b4e296b79cbb72a9191822b27f8b50077a2bccaae0b83a9010d668f1bea22dfceba29aeb2007cade6eadbcfe3e6a397d42637dace00bada8355c18cd2c716b5b889a77506de2698c355a27d5bdc4dc4a5dcd4acb42819a5e3e8ccfa36e4305c950780ca6be78a75ef3c2c4f6a1b0f353ffa99ec66ca994a5a23994a56e4049f79462111ff0101332c1e30b4d2da26f6a741a4390c4b361707200637ef395f6d407582d79f7c06234a8d8c341e62ae2609fbc7319cda969d155d2a8b3505ddb89016b2f04d7e25a779952ee4c968d9585d72b50fd8f7e73abeea2db0ccd2d3c3953996d82997f4daef06959eeb0be60806a9962426b1143bb1618de5d1367b31283ec1796e100e485c69b61994c32a6b6bd8c3b4afb6fc87408110779ace769f4238e0d4e880d35e2c2e256fedc7a915c3a1066a2239ece73e06edb7cbabdedfbe67cfd9d658a701d02c2563bfc63d1683cf992f52e99ea890c63298da2359bb091cfbb929f63ad2124bc34d2134a483cb4d64241a5d895b7689bc991904f51e7b671f7b88fd731831834944166de999f07d5aab9d42aff9aac9c795612b5e55207ef5c8231f73e407f3fb81afef5cb9d4b1d717e393f0e488fc6fb2e3d8c17f50f58bacb32a17187953e74560032201b0e9ebbe106b6eda7af7ea0b182fb922670c206f00e7b8ff3b12f4005c7325ed091d69a040b47835b289fa27339419dc65937123ec292e5c3f96093a12c9273693c750550a8fb7a5182e310a538c18b4f6ac6b9f5b92702d69e26", 0x5c0, 0x0, 0x0, &(0x7f0000001140)) 05:43:59 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000300), r1) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x50, r2, 0x321, 0x0, 0x0, {0x5}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x3}, {0x6}, {0x5}}]}, 0x50}}, 0x0) 05:43:59 executing program 4: r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000300)={{0x2, 0xee01, 0xee00}}) 05:43:59 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) listen(r0, 0x20000001) 05:43:59 executing program 3: syz_clone(0x40000080, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0) 05:43:59 executing program 0: syz_clone(0x40000080, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:43:59 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000300), r1) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x50, r2, 0x321, 0x0, 0x0, {0x5}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x3}, {0x6}, {0x5}}]}, 0x50}}, 0x0) 05:43:59 executing program 4: syz_clone(0xa0084000, 0x0, 0x0, 0x0, 0x0, 0x0) 05:43:59 executing program 1: getresuid(&(0x7f0000001b40), &(0x7f0000001b80), &(0x7f0000001bc0)) 05:43:59 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000300), r1) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x50, r2, 0x321, 0x0, 0x0, {0x5}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x3}, {0x6}, {0x5}}]}, 0x50}}, 0x0) 05:43:59 executing program 1: syz_clone(0x40909000, &(0x7f0000001100), 0x0, 0x0, 0x0, &(0x7f0000001200)='s') 05:43:59 executing program 1: mlock2(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1) 05:44:00 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xace2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) close(r0) close(r1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x74, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x7ffff000}], 0x1, 0x0, 0x0, 0x2000000}, 0x0) 05:44:00 executing program 2: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'pimreg\x00', 0x1}) socketpair(0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) close(r0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) close(r1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, r1, 0xa) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)) perf_event_open(&(0x7f0000001300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x74, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffff, 0x1}, 0x40, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = getpid() perf_event_open(&(0x7f0000000080)={0x4, 0x80, 0xf7, 0x1f, 0xdb, 0x1, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000040), 0x2}, 0x404, 0x8001, 0x8, 0x7, 0x8000, 0x7, 0x1, 0x0, 0x7c, 0x0, 0x7}, r3, 0x1, r2, 0x1) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x7ffff000}], 0x1, 0x0, 0x0, 0x2000000}, 0x0) 05:44:00 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000300), r1) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x50, r2, 0x321, 0x0, 0x0, {0x5}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x3}, {0x6}, {0x5}}]}, 0x50}}, 0x0) 05:44:00 executing program 0: r0 = perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) close(r0) close(r1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x74, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x7ffff000}], 0x1, 0x0, 0x0, 0x2000000}, 0x0) 05:44:00 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xace2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) close(r0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) close(r1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x74, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffff}, 0x40, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x7ffff000}], 0x1, 0x0, 0x0, 0x2000000}, 0x0) 05:44:00 executing program 4: bpf$MAP_LOOKUP_BATCH(0x18, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xace2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) close(r0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) close(r1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x3) perf_event_open(&(0x7f0000001300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x74, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = getpid() perf_event_open(&(0x7f0000000080)={0x4, 0x80, 0xf7, 0x1f, 0xdb, 0x1, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000040), 0x2}, 0x404, 0x8001, 0x8, 0x7, 0x8000, 0x7, 0x1, 0x0, 0x7c, 0x0, 0x7}, r3, 0x1, r2, 0x1) perf_event_open(&(0x7f0000000340)={0x5, 0x80, 0x3f, 0x0, 0x89, 0xfd, 0x0, 0x1, 0x1500c, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f00000002c0)}, 0x0, 0x3, 0xffff6962, 0x0, 0x8, 0x3, 0x1, 0x0, 0xff, 0x0, 0x3ff}, 0x0, 0x6, r2, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x7ffff000}], 0x1, 0x0, 0x0, 0x2000000}, 0x0) 05:44:00 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000300), r1) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x50, r2, 0x321, 0x0, 0x0, {0x5}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x3}, {0x6}, {0x5}}]}, 0x50}}, 0x0) [ 306.012947][ T23] audit: type=1400 audit(1677995040.095:373): avc: denied { open } for pid=15894 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 306.032638][ T23] audit: type=1400 audit(1677995040.095:374): avc: denied { kernel } for pid=15894 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 05:44:00 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000", @ANYRES16], 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000300), r1) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x50, r2, 0x321, 0x0, 0x0, {0x5}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x3}, {0x6}, {0x5}}]}, 0x50}}, 0x0) 05:44:00 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000", @ANYRES16], 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000300), r1) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x50, r2, 0x321, 0x0, 0x0, {0x5}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x3}, {0x6}, {0x5}}]}, 0x50}}, 0x0) 05:44:00 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000", @ANYRES16], 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000300), r1) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x50, r2, 0x321, 0x0, 0x0, {0x5}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x3}, {0x6}, {0x5}}]}, 0x50}}, 0x0) 05:44:00 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB], 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000300), r1) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x50, r2, 0x321, 0x0, 0x0, {0x5}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x3}, {0x6}, {0x5}}]}, 0x50}}, 0x0) 05:44:00 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB], 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000300), r1) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x50, r2, 0x321, 0x0, 0x0, {0x5}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x3}, {0x6}, {0x5}}]}, 0x50}}, 0x0) 05:44:00 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x138}, 0x40010082) 05:44:01 executing program 0: syz_clone(0x40000080, &(0x7f0000000000)="9b2e6c9dfce101203828dd8f165650ed2fce734d717289db0ba9e5c0686c136c59272886855a7dfad495b57441069d29d9be4508c3a4c5eeca4f75cf9a1791d1c26d506d", 0x44, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="5493acb184fccb65815c43ced4d34e30e914364544f70b2da0120cdc52cdb9a93ed689eb1b4dd45c53553afe1094280adfcce69e3f669438f910f0f6b5a08f85c4a27002809844") 05:44:01 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x4, &(0x7f0000000000)=@raw=[@ldst={0x0, 0x1, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}, @generic={0xff, 0x2, 0x6, 0xe249, 0x81}, @exit], &(0x7f0000000540)='GPL\x00', 0x401, 0x6, &(0x7f0000000080)=""/6, 0x40f00, 0xe, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000040)={0x1, 0x5, 0x7860, 0x80000000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000300)}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) 05:44:01 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB], 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000300), r1) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x50, r2, 0x321, 0x0, 0x0, {0x5}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x3}, {0x6}, {0x5}}]}, 0x50}}, 0x0) 05:44:01 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000640)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f00000009c0)={&(0x7f0000000000)=@name, 0x10, &(0x7f0000000840)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 05:44:01 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000036c0)=@base={0x11}, 0x48) 05:44:01 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000", @ANYBLOB="01"], 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000300), r1) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x50, r2, 0x321, 0x0, 0x0, {0x5}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x3}, {0x6}, {0x5}}]}, 0x50}}, 0x0) 05:44:01 executing program 3: bpf$OBJ_GET_MAP(0x7, &(0x7f0000001600)={&(0x7f0000001640)='./file0/file0\x00'}, 0x10) 05:44:01 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x400000001, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) 05:44:01 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'wg1\x00', 0x3}) 05:44:01 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000", @ANYBLOB="01"], 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000300), r1) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x50, r2, 0x321, 0x0, 0x0, {0x5}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x3}, {0x6}, {0x5}}]}, 0x50}}, 0x0) 05:44:01 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}}, &(0x7f0000000040)='syzkaller\x00', 0x4, 0xae, &(0x7f00000000c0)=""/174, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:44:01 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x8, 0x3, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}}, &(0x7f0000000080)='syzkaller\x00', 0x3, 0xae, &(0x7f00000000c0)=""/174, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:44:01 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000", @ANYBLOB="01"], 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000300), r1) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x50, r2, 0x321, 0x0, 0x0, {0x5}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x3}, {0x6}, {0x5}}]}, 0x50}}, 0x0) 05:44:01 executing program 3: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) 05:44:01 executing program 2: bpf$MAP_CREATE(0x5, &(0x7f00000036c0), 0x48) 05:44:01 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0xf, 0x3, &(0x7f0000000280)=@framed={{}, [], {0x95, 0x0, 0x0, 0x55010000}}, &(0x7f0000000080)='syzkaller\x00', 0x3, 0xae, &(0x7f00000000c0)=""/174, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:44:01 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x18, 0x2, &(0x7f0000000000)=@raw=[@map_val], &(0x7f0000000080)='syzkaller\x00', 0x3, 0xae, &(0x7f00000000c0)=""/174, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:44:01 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000000)) socketpair(0x1d, 0x0, 0x0, &(0x7f0000001840)) 05:44:01 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x18, 0x7, &(0x7f0000000000)=@raw=[@jmp, @cb_func, @map_val, @map_idx_val], &(0x7f0000000080)='syzkaller\x00', 0x3, 0xae, &(0x7f00000000c0)=""/174, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000340), 0x10}, 0x80) 05:44:01 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYRES16, @ANYBLOB="01"], 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000300), r1) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x50, r2, 0x321, 0x0, 0x0, {0x5}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x3}, {0x6}, {0x5}}]}, 0x50}}, 0x0) 05:44:01 executing program 0: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000001c0)={@map=0x1, 0xffffffffffffffff, 0xf}, 0x10) 05:44:01 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000300)={0x2, 0x0, @local}, 0x10, &(0x7f00000008c0)=[{&(0x7f0000000340)="a9", 0x1}], 0x1}, 0x0) 05:44:01 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0xd, 0x3, &(0x7f0000000280)=@framed={{}, [], {0x95, 0x0, 0x0, 0x55010000}}, &(0x7f0000000080)='syzkaller\x00', 0x3, 0xae, &(0x7f00000000c0)=""/174, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:44:01 executing program 0: socketpair(0x9, 0x0, 0x0, &(0x7f0000000180)) 05:44:01 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYRES16, @ANYBLOB="01"], 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000300), r1) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x50, r2, 0x321, 0x0, 0x0, {0x5}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x3}, {0x6}, {0x5}}]}, 0x50}}, 0x0) 05:44:01 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000440)={'pim6reg\x00', 0x200}) 05:44:01 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x5, 0x2, 0x3f, 0x24f, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) 05:44:01 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000012c0)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x3}}, @ptr={0x3}]}, {0x0, [0x0, 0x0]}}, &(0x7f00000002c0)=""/4096, 0x40, 0x1000, 0x1}, 0x20) 05:44:01 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000020c0)={0xffffffffffffffff}) close(r0) 05:44:01 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000300)={0x2, 0x0, @local}, 0x10, &(0x7f00000008c0)=[{&(0x7f0000000340)="a9", 0x1}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 05:44:01 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x0, 0x0, 0x0, 0x0, 0x18}, 0x48) 05:44:01 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000018c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x0) [ 307.836392][T15962] can: request_module (can-proto-0) failed. 05:44:01 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYRES16, @ANYBLOB="01"], 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000300), r1) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x50, r2, 0x321, 0x0, 0x0, {0x5}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x3}, {0x6}, {0x5}}]}, 0x50}}, 0x0) 05:44:02 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0x40082406, &(0x7f0000000200)=ANY=[]) 05:44:02 executing program 2: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={@cgroup, 0xffffffffffffffff, 0x14}, 0x10) 05:44:02 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f00000005c0), 0x101002, 0x0) 05:44:02 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000001800)={0x0, 0x0, &(0x7f0000001440)=[{0x0}, {0x0}, {&(0x7f0000000180)="01", 0x1}], 0x3}, 0x0) 05:44:02 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@restrict, @fwd]}}, 0x0, 0x32}, 0x20) 05:44:02 executing program 4: r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40042408, 0x0) 05:44:02 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB, @ANYRES16, @ANYBLOB="01"], 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000300), r1) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x50, r2, 0x321, 0x0, 0x0, {0x5}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x3}, {0x6}, {0x5}}]}, 0x50}}, 0x0) 05:44:02 executing program 1: r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x2400, 0x0) 05:44:02 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 307.946730][ T23] audit: type=1400 audit(1677995042.025:375): avc: denied { write } for pid=15990 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 05:44:02 executing program 0: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00'}, 0x10) bpf$BPF_PROG_DETACH(0x4, &(0x7f0000000000)={@map}, 0x48) 05:44:02 executing program 3: r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x5451, 0x0) 05:44:02 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB, @ANYRES16, @ANYBLOB="01"], 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000300), r1) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x50, r2, 0x321, 0x0, 0x0, {0x5}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x3}, {0x6}, {0x5}}]}, 0x50}}, 0x0) 05:44:02 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x17, 0x0, 0x1d00, 0x9}, 0x48) 05:44:02 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000580)={&(0x7f0000000040)={0x2, 0x0, @remote}, 0x10, 0x0}, 0x8044) 05:44:02 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:44:02 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xdc00000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:44:02 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001180)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0xe}]}}, &(0x7f0000000180)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 05:44:02 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB, @ANYRES16, @ANYBLOB="01"], 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000300), r1) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x50, r2, 0x321, 0x0, 0x0, {0x5}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x3}, {0x6}, {0x5}}]}, 0x50}}, 0x0) 05:44:02 executing program 1: r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x0) 05:44:02 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xd2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:44:02 executing program 2: r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc0189436, 0x0) 05:44:02 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000a00), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f00000000c0)={'vlan0\x00'}) 05:44:02 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="1400", @ANYRES16, @ANYBLOB="01"], 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000300), r1) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x50, r2, 0x321, 0x0, 0x0, {0x5}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x3}, {0x6}, {0x5}}]}, 0x50}}, 0x0) 05:44:02 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 05:44:02 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict]}}, 0x0, 0x26}, 0x20) 05:44:02 executing program 4: r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) 05:44:02 executing program 3: r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x541b, 0x0) 05:44:02 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001180)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000180)=""/4096, 0x26, 0x1000, 0x1}, 0x20) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000140)={0x7}, 0x8) 05:44:02 executing program 0: perf_event_open(&(0x7f00000000c0)={0x7, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:44:02 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="1400", @ANYRES16, @ANYBLOB="01"], 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000300), r1) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x50, r2, 0x321, 0x0, 0x0, {0x5}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x3}, {0x6}, {0x5}}]}, 0x50}}, 0x0) 05:44:02 executing program 1: r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 05:44:02 executing program 2: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00'}, 0x10) bpf$BPF_PROG_DETACH(0x1c, &(0x7f0000000000)={@map}, 0x48) 05:44:02 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=@base={0x12, 0x0, 0x0, 0x10}, 0x48) 05:44:02 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x3}, {}]}]}}, &(0x7f0000000140)=""/4096, 0x36, 0x1000, 0x1}, 0x20) 05:44:02 executing program 3: bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000180)={@map=0x1, 0xffffffffffffffff, 0x5}, 0x10) 05:44:02 executing program 1: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00'}, 0x10) bpf$BPF_PROG_DETACH(0x11, &(0x7f0000000000)={@map}, 0x48) 05:44:02 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="1400", @ANYRES16, @ANYBLOB="01"], 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000300), r1) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x50, r2, 0x321, 0x0, 0x0, {0x5}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x3}, {0x6}, {0x5}}]}, 0x50}}, 0x0) 05:44:02 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:44:02 executing program 3: bpf$BPF_PROG_DETACH(0x1e, &(0x7f0000000500), 0x10) 05:44:02 executing program 0: bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={@cgroup, 0xffffffffffffffff, 0xd}, 0x10) 05:44:02 executing program 2: r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x2405, 0x0) 05:44:02 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 05:44:02 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000", @ANYRES16, @ANYBLOB="01"], 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000300), r1) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x50, r2, 0x321, 0x0, 0x0, {0x5}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x3}, {0x6}, {0x5}}]}, 0x50}}, 0x0) 05:44:02 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x17, 0x0, 0x40, 0x9, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) 05:44:02 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=@base={0x10, 0x0, 0x0, 0x7fff}, 0x48) 05:44:02 executing program 4: r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x2403, 0x0) 05:44:02 executing program 2: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00'}, 0x10) bpf$BPF_PROG_DETACH(0x12, &(0x7f0000000000)={@map}, 0x48) 05:44:02 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000", @ANYRES16, @ANYBLOB="01"], 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000300), r1) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x50, r2, 0x321, 0x0, 0x0, {0x5}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x3}, {0x6}, {0x5}}]}, 0x50}}, 0x0) 05:44:02 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000740)={&(0x7f0000000080)=@name={0x1e, 0x2, 0x0, {{}, 0x3}}, 0x10, 0x0}, 0x0) 05:44:02 executing program 1: r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x801c581f, 0x0) 05:44:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001180)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000180)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 05:44:02 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}]}}, &(0x7f0000000140)=""/4096, 0x3e, 0x1000, 0x1}, 0x20) 05:44:02 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000", @ANYRES16, @ANYBLOB="01"], 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000300), r1) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x50, r2, 0x321, 0x0, 0x0, {0x5}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x3}, {0x6}, {0x5}}]}, 0x50}}, 0x0) 05:44:02 executing program 4: bpf$BPF_PROG_DETACH(0x21, &(0x7f0000000500), 0x10) 05:44:02 executing program 1: r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40049409, 0x0) 05:44:02 executing program 3: bpf$BPF_PROG_DETACH(0x10, &(0x7f0000000500)={@cgroup, 0xffffffffffffffff, 0xd}, 0x10) 05:44:02 executing program 0: r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x5450, 0x0) 05:44:02 executing program 2: r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) 05:44:02 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="01"], 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(0x0, r1) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000300), r1) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x50, r2, 0x321, 0x0, 0x0, {0x5}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x3}, {0x6}, {0x5}}]}, 0x50}}, 0x0) 05:44:02 executing program 4: r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0x40082406, &(0x7f0000000200)=ANY=[@ANYBLOB='Z']) 05:44:02 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001180)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa, 0xc, 0x2, [@struct]}}, &(0x7f0000000180)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 05:44:02 executing program 0: r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4008240b, 0x0) 05:44:02 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x110) 05:44:02 executing program 1: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/pm_print_times', 0x0, 0x0) r0 = socket(0xa, 0x2, 0x3a) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000240)={&(0x7f0000000000)={0xa}, 0x1c, &(0x7f0000000200)={&(0x7f0000001340)={0x80, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_STA_SUPPORT_P2P_PS={0x5}, @NL80211_ATTR_STA_SUPPORTED_OPER_CLASSES={0x0, 0xbe, "6e8d7fc8deae9e02c5cb0a1b1571354c8e72c6ffdca1ec25106bc4bad6e05cbea7ce"}, @NL80211_ATTR_STA_LISTEN_INTERVAL={0xffffffffffffff3a}, @NL80211_ATTR_REASON_CODE, @NL80211_ATTR_STA_FLAGS={0x24, 0x11, 0x0, 0x1, [@NL80211_STA_FLAG_MFP={0x4}, @NL80211_STA_FLAG_MFP={0x4}, @NL80211_STA_FLAG_WME, @NL80211_STA_FLAG_AUTHORIZED={0x4}, @NL80211_STA_FLAG_SHORT_PREAMBLE={0x4}, @NL80211_STA_FLAG_MFP]}, @NL80211_ATTR_STA_TX_POWER={0x6}, @NL80211_ATTR_REASON_CODE={0x6}, @NL80211_ATTR_OPMODE_NOTIF={0x5}]}, 0xffd8}}, 0x0) 05:44:02 executing program 2: timerfd_create(0x7, 0x0) eventfd2(0x0, 0x0) 05:44:02 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@local, @dev, @void, {@ipv4={0x800, @tipc={{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @dev, @remote}, @payload_named={{{{{0x28, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x10000000}, 0x20020001}}}}}}}}, 0x0) 05:44:02 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000980), 0x282000, 0x0) 05:44:02 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x300000f, 0x12, r0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 05:44:02 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="01"], 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(0x0, r1) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000300), r1) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x50, r2, 0x321, 0x0, 0x0, {0x5}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x3}, {0x6}, {0x5}}]}, 0x50}}, 0x0) 05:44:02 executing program 1: timer_create(0xfeffffff, 0x0, &(0x7f0000000040)) 05:44:02 executing program 0: sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0xce) r0 = eventfd2(0x0, 0x0) read$eventfd(r0, &(0x7f00000000c0), 0x8) write$eventfd(r0, &(0x7f0000000000), 0x8) 05:44:02 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x540, 0x4) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000400)={0x2, 0x4e22, @multicast1}, 0x10) ppoll(&(0x7f0000000240)=[{r1}, {r0}], 0x2, 0x0, 0x0, 0x0) 05:44:02 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="01"], 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(0x0, r1) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000300), r1) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x50, r2, 0x321, 0x0, 0x0, {0x5}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x3}, {0x6}, {0x5}}]}, 0x50}}, 0x0) 05:44:02 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) [ 308.461862][ T23] audit: type=1400 audit(1677995042.545:376): avc: denied { write } for pid=16116 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 05:44:02 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)='GPL\x00', 0x0, 0xbf, &(0x7f0000000400)=""/191, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0x8, 0x10, &(0x7f0000000200), 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0xdd) 05:44:02 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="01"], 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000300), r1) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x50, r2, 0x321, 0x0, 0x0, {0x5}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x3}, {0x6}, {0x5}}]}, 0x50}}, 0x0) 05:44:02 executing program 2: r0 = open(&(0x7f0000000780)='./bus\x00', 0x14507e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4002011, r0, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f8) sendfile(r0, r0, 0x0, 0x100000000) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x208e24b) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = getpid() process_vm_readv(r1, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0) ioprio_set$uid(0x0, 0x0, 0x4004) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, &(0x7f00000025c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0, 0x80000001, 0x8) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000480)=ANY=[], 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) 05:44:02 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x30, 0x0, &(0x7f0000000600)) 05:44:02 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@func={0x6}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/171, 0x2b, 0xab, 0x1}, 0x20) 05:44:02 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8914, &(0x7f0000000240)={'ip6gre0\x00', 0x0}) 05:44:02 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@ipv6_getroute={0x24, 0x1a, 0x1, 0x0, 0x0, {0x2}, [@RTA_UID={0x8, 0x19, 0xffffffffffffffff}]}, 0x24}}, 0x0) 05:44:02 executing program 3: setsockopt$MRT_DEL_VIF(0xffffffffffffffff, 0x0, 0xcb, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0xf9, 0x80, @vifc_lcl_ifindex, @remote}, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080), 0xffffffffffffffff) [ 308.721666][T16145] Page cache invalidation failure on direct I/O. Possible data corruption due to collision with buffered I/O! [ 308.733522][T16145] File: /root/syzkaller-testdir3643837877/syzkaller.5LobnA/1038/bus PID: 16145 Comm: syz-executor.2 05:44:03 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000001640)=[{{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c, 0x0}}, {{&(0x7f00000002c0)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c, 0x0, 0x40000000, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0x140}}], 0x2, 0x0) 05:44:03 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="01"], 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000300), r1) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x50, r2, 0x321, 0x0, 0x0, {0x5}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x3}, {0x6}, {0x5}}]}, 0x50}}, 0x0) 05:44:03 executing program 1: syz_genetlink_get_family_id$nl80211(&(0x7f0000002a40), 0xffffffffffffffff) 05:44:03 executing program 3: clock_nanosleep(0x0, 0x1, &(0x7f0000001240), 0x0) 05:44:03 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x40) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x19, &(0x7f0000000080)=@mangle={'mangle\x00', 0x1f, 0x6, 0x500, 0x450, 0x520, 0x350, 0x450, 0xf0, 0x520, 0x520, 0x520, 0x520, 0x520, 0x6, 0x0, {[{{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'vcan0\x00', 'veth1_macvtap\x00'}, 0x0, 0xa8, 0xf0}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv4=@private, @ipv6=@mcast2}}}, {{@ipv6={@loopback, @private1, [], [], 'veth0_vlan\x00', 'dummy0\x00'}, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@empty, @private0, [], [], 'lo\x00', 'pim6reg1\x00'}, 0x0, 0xa8, 0xd0}, @HL={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @broadcast}, @remote, [], [], 'ip6erspan0\x00', 'macvlan1\x00'}, 0x0, 0xa8, 0xd0}, @inet=@TOS={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x560) 05:44:03 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000008c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000180)=""/135, 0x2e, 0x87, 0x1}, 0x20) 05:44:03 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x4b, 0x0, &(0x7f0000000600)) 05:44:03 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000008c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xe, 0x1}]}]}}, &(0x7f0000000180)=""/135, 0x2e, 0x87, 0x1}, 0x20) 05:44:03 executing program 2: memfd_create(&(0x7f0000000880)='@(%(\x00', 0x2) 05:44:03 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) 05:44:03 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="01"], 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000300), r1) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x50, r2, 0x321, 0x0, 0x0, {0x5}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x3}, {0x6}, {0x5}}]}, 0x50}}, 0x0) 05:44:03 executing program 0: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0182101, 0x0) 05:44:03 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="01"], 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) r2 = syz_genetlink_get_family_id$devlink(0x0, r1) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x50, r2, 0x321, 0x0, 0x0, {0x5}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x3}, {0x6}, {0x5}}]}, 0x50}}, 0x0) 05:44:03 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x40) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=@mangle={'mangle\x00', 0x1f, 0x7fffffe, 0x500, 0x450, 0x520, 0x350, 0x450, 0xf0, 0x520, 0x520, 0x520, 0x520, 0x520, 0x6, 0x0, {[{{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0x0, 0x0, 0x0, 0xff], [0x0, 0xffffffff], 'vcan0\x00', 'veth1_macvtap\x00', {}, {}, 0x0, 0x0, 0x2}, 0x0, 0xa8, 0xf0}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv4=@private=0xa010102, @ipv6=@mcast2}}}, {{@ipv6={@loopback, @private1, [], [], 'veth0_vlan\x00', 'dummy0\x00', {}, {}, 0x0, 0x0, 0x4}, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@empty, @private0, [], [], 'lo\x00', 'pim6reg1\x00', {}, {}, 0x0, 0x0, 0x5}, 0x0, 0xa8, 0xd0}, @HL={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @broadcast}, @remote, [], [], 'ip6erspan0\x00', 'macvlan1\x00'}, 0x0, 0xa8, 0xd0}, @inet=@TOS={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x560) 05:44:03 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='fd\x00') fchmodat(r0, &(0x7f0000000080)='./file0\x00', 0x0) 05:44:03 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x49, 0x0, &(0x7f0000000600)) 05:44:03 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="01"], 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) r2 = syz_genetlink_get_family_id$devlink(0x0, r1) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x50, r2, 0x321, 0x0, 0x0, {0x5}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x3}, {0x6}, {0x5}}]}, 0x50}}, 0x0) 05:44:03 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000001640)=[{{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c, 0x0}}, {{&(0x7f00000002c0)={0xa, 0x4e22, 0x0, @rand_addr=' \x01\x00'}, 0x1c, 0x0, 0x0, &(0x7f0000001500)=ANY=[@ANYBLOB="400000000000000029000000360000006704000000000000c204000000020102000007180000000004c402000800000000000000ff7fffffffffffff00010000e80000000000000029000000370000002c19000000000000c20400000002084a4a998da95e7694c5c0d8c5d80f24e9e969f44f701339314ce8c0b17f32fd39d5a2d27d6c4318442934d1cbf6dc9e8623697c6ec64a2c1dcdd10d7ded47dab2180c8b350251b22c2dd3cc0646632d1dc256cbb6cf7e0dc961cd73a27cf83c06558ceaa4283af34c9ad6eee86113c6ccc7e3d34ba258c8b5c105ecbf054d5f3ede59078d5994241933ff074757c23dd07cc3c600010005020fff04019907162812fbcec11659cf892e404f527ded8812705470336e010700000000000000000100050200010000000014"], 0x140}}], 0x2, 0x0) 05:44:03 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000008c0)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union]}}, &(0x7f0000000300)=""/148, 0x26, 0x94, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={r0, 0x20, &(0x7f0000000140)={0x0, 0x0, 0x0, &(0x7f0000000240)=""/73, 0x49}}, 0x10) 05:44:03 executing program 2: madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1) 05:44:03 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="01"], 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) r2 = syz_genetlink_get_family_id$devlink(0x0, r1) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x50, r2, 0x321, 0x0, 0x0, {0x5}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x3}, {0x6}, {0x5}}]}, 0x50}}, 0x0) [ 309.443433][ T23] audit: type=1326 audit(1677995043.525:377): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16181 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fe6bb95d0f9 code=0x0 05:44:03 executing program 3: openat$tcp_congestion(0xffffffffffffff9c, &(0x7f000000a040), 0x1, 0x0) 05:44:03 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x4d, 0x0, &(0x7f0000000600)) 05:44:04 executing program 0: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000004c0)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000740)={0xc, 0x0, &(0x7f0000000640)=[@dead_binder_done], 0x0, 0x0, 0x0}) 05:44:04 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000002d80), 0x0, 0x0) ioctl$BLKPBSZGET(r0, 0x4020940d, &(0x7f0000000040)) 05:44:04 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) select(0x40, &(0x7f0000000000)={0x9}, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x77359400}) 05:44:04 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="01"], 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x50, r2, 0x321, 0x0, 0x0, {0x5}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x3}, {0x6}, {0x5}}]}, 0x50}}, 0x0) 05:44:04 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x40) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x42, &(0x7f0000000080)=@mangle={'mangle\x00', 0x1f, 0x6, 0x500, 0x450, 0x520, 0x350, 0x450, 0xf0, 0x520, 0x520, 0x520, 0x520, 0x520, 0x6, 0x0, {[{{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'vcan0\x00', 'veth1_macvtap\x00'}, 0x0, 0xa8, 0xf0}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv4=@private, @ipv6=@mcast2}}}, {{@ipv6={@loopback, @private1, [], [], 'veth0_vlan\x00', 'dummy0\x00'}, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@empty, @private0, [], [], 'lo\x00', 'pim6reg1\x00'}, 0x0, 0xa8, 0xd0}, @HL={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @broadcast}, @remote, [], [], 'ip6erspan0\x00', 'macvlan1\x00'}, 0x0, 0xa8, 0xd0}, @inet=@TOS={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x560) 05:44:04 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) select(0x40, &(0x7f0000000000)={0x9}, 0x0, 0x0, 0x0) 05:44:04 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="01"], 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x50, r2, 0x321, 0x0, 0x0, {0x5}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x3}, {0x6}, {0x5}}]}, 0x50}}, 0x0) 05:44:04 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd\x00') openat$incfs(r0, &(0x7f0000000040)='.log\x00', 0x10040, 0x0) [ 310.287654][ T23] audit: type=1326 audit(1677995044.365:378): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16207 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fb0995570f9 code=0x0 05:44:04 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 05:44:04 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8927, &(0x7f0000000380)={'ip6_vti0\x00', 0x0}) 05:44:04 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="01"], 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x50, r2, 0x321, 0x0, 0x0, {0x5}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x3}, {0x6}, {0x5}}]}, 0x50}}, 0x0) 05:44:04 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000000c0)={'syztnl0\x00', &(0x7f0000000040)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, @empty, @mcast1}}) 05:44:04 executing program 1: openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/devices\x00', 0x0, 0x0) io_setup(0x10000, &(0x7f0000000000)) io_setup(0x3f, 0x0) io_setup(0x0, &(0x7f0000000140)) io_setup(0x1000, &(0x7f0000000940)) socket$nl_generic(0x10, 0x3, 0x10) [ 310.316187][ T23] audit: type=1326 audit(1677995044.405:379): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16212 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fccb18ad0f9 code=0x0 05:44:04 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x88, 0x64, 0x0, &(0x7f0000000600)) 05:44:05 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x4, 0x0, 0x0, 0x200}, {0x6}]}) 05:44:05 executing program 3: setresuid(0x0, 0xee00, 0x0) r0 = geteuid() r1 = geteuid() setresuid(r0, 0xee00, r1) setresuid(0x0, 0x0, 0x0) 05:44:05 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="01"], 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000300), r0) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x50, r1, 0x321, 0x0, 0x0, {0x5}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x3}, {0x6}, {0x5}}]}, 0x50}}, 0x0) 05:44:05 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000008c0)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union]}}, &(0x7f0000000300)=""/148, 0x26, 0x94, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={r0, 0x0, 0x0}, 0x10) 05:44:05 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0xb, 0x0, &(0x7f0000000600)) 05:44:05 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000002d80), 0x0, 0x0) ioctl$BLKPBSZGET(r0, 0x40081271, &(0x7f0000000040)) 05:44:05 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="01"], 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000300), r0) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x50, r1, 0x321, 0x0, 0x0, {0x5}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x3}, {0x6}, {0x5}}]}, 0x50}}, 0x0) 05:44:05 executing program 3: prctl$PR_SET_NAME(0xf, &(0x7f0000000080)='/,@/$[-$\x00') 05:44:05 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x40) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1d, &(0x7f0000000080)=@mangle={'mangle\x00', 0x1f, 0x6, 0x500, 0x450, 0x520, 0x350, 0x450, 0xf0, 0x520, 0x520, 0x520, 0x520, 0x520, 0x6, 0x0, {[{{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'vcan0\x00', 'veth1_macvtap\x00'}, 0x0, 0xa8, 0xf0}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv4=@private, @ipv6=@mcast2}}}, {{@ipv6={@loopback, @private1, [], [], 'veth0_vlan\x00', 'dummy0\x00'}, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@empty, @private0, [], [], 'lo\x00', 'pim6reg1\x00'}, 0x0, 0xa8, 0xd0}, @HL={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @broadcast}, @remote, [], [], 'ip6erspan0\x00', 'macvlan1\x00'}, 0x0, 0xa8, 0xd0}, @inet=@TOS={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x560) 05:44:05 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000001200), 0x802, 0x0) write$UHID_CREATE2(r0, &(0x7f0000001240)={0xb, {'syz0\x00', 'syz1\x00', 'syz1\x00', 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '>'}}, 0x119) [ 311.129500][ T23] audit: type=1326 audit(1677995045.215:380): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16237 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fe6bb95d0f9 code=0x0 05:44:05 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000002d80), 0x0, 0x0) ioctl$BLKPBSZGET(r0, 0x1268, &(0x7f0000000040)) 05:44:05 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="01"], 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000300), r0) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x50, r1, 0x321, 0x0, 0x0, {0x5}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x3}, {0x6}, {0x5}}]}, 0x50}}, 0x0) 05:44:05 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000002d80), 0x0, 0x0) ioctl$BLKPBSZGET(r0, 0x125d, &(0x7f0000000040)) 05:44:05 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000002d80), 0x0, 0x0) ioctl$BLKPBSZGET(r0, 0xc0101282, 0x0) 05:44:05 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000002d80), 0x0, 0x0) ioctl$BLKPBSZGET(r0, 0x1268, &(0x7f0000000040)) 05:44:05 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000008c0)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union]}}, &(0x7f0000000300)=""/148, 0x26, 0x94, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={r0, 0x20, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0}}, 0x10) 05:44:05 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000004000)=[{{&(0x7f0000000000)={0xa, 0x4e22, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000001080)=[@hopopts={{0x18}}], 0x18}}], 0x1, 0x0) 05:44:05 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="01"], 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) syz_genetlink_get_family_id$devlink(&(0x7f0000000300), r1) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, 0x0, 0x0) 05:44:05 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000002d80), 0x0, 0x0) ioctl$BLKPBSZGET(r0, 0x4c08, 0x0) 05:44:05 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000007780)=[{{&(0x7f0000000000)={0xa, 0x4e22, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000001700)=[@dontfrag={{0x14}}], 0x18}}], 0x1, 0x0) [ 311.220333][ T3228] hid-generic 0000:0000:0000.0002: item fetching failed at offset 0/1 [ 311.228644][ T3228] hid-generic: probe of 0000:0000:0000.0002 failed with error -22 05:44:05 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x91) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000000)={{{@in6=@loopback, @in6=@private2, 0x0, 0x0, 0x0, 0x0, 0xa, 0xa0, 0x0, 0x0, 0x0, 0xee01}}, {{@in6=@remote}, 0x0, @in=@multicast1}}, 0xe8) 05:44:05 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000002d80), 0x0, 0x0) ioctl$BLKPBSZGET(r0, 0x1268, &(0x7f0000000040)) 05:44:05 executing program 3: keyctl$set_reqkey_keyring(0xe, 0xffffffff00000002) 05:44:05 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000001640)=[{{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c, 0x0}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x140}}], 0x2, 0x0) 05:44:05 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_STATION(r0, &(0x7f00000028c0)={&(0x7f00000027c0)={0x10, 0x0, 0x0, 0x840000}, 0xc, &(0x7f0000002880)={&(0x7f0000002800)={0x28, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) 05:44:05 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="01"], 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) syz_genetlink_get_family_id$devlink(&(0x7f0000000300), r1) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, 0x0, 0x0) 05:44:05 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000002d80), 0x0, 0x0) ioctl$BLKPBSZGET(r0, 0x1268, &(0x7f0000000040)) 05:44:05 executing program 1: get_robust_list(0x0, &(0x7f0000000640)=0x0, &(0x7f0000000680)) 05:44:05 executing program 4: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000004c0)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000740)={0x8, 0x0, &(0x7f0000000640)=[@release], 0x0, 0x0, 0x0}) 05:44:05 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x40) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0xb, &(0x7f0000000080)=@mangle={'mangle\x00', 0x1f, 0x6, 0x500, 0x450, 0x520, 0x350, 0x450, 0xf0, 0x520, 0x520, 0x520, 0x520, 0x520, 0x6, 0x0, {[{{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'vcan0\x00', 'veth1_macvtap\x00'}, 0x0, 0xa8, 0xf0}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv4=@private, @ipv6=@mcast2}}}, {{@ipv6={@loopback, @private1, [], [], 'veth0_vlan\x00', 'dummy0\x00'}, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@empty, @private0, [], [], 'lo\x00', 'pim6reg1\x00'}, 0x0, 0xa8, 0xd0}, @HL={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @broadcast}, @remote, [], [], 'ip6erspan0\x00', 'macvlan1\x00'}, 0x0, 0xa8, 0xd0}, @inet=@TOS={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x560) 05:44:05 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x40) getsockopt$inet6_buf(r0, 0x29, 0x3d, &(0x7f0000000000)=""/85, &(0x7f0000000600)=0x55) 05:44:05 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="01"], 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) syz_genetlink_get_family_id$devlink(&(0x7f0000000300), r1) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, 0x0, 0x0) 05:44:05 executing program 1: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000004c0)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000740)={0x4c, 0x0, &(0x7f0000000640)=[@reply_sg={0x40486312, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 05:44:05 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000001c0), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000000)={'wg0\x00', 0x0}) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)={0x50, r1, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_IFINDEX={0x8, 0x1, r2}, @WGDEVICE_A_PEERS={0x34, 0x8, 0x0, 0x1, [{0x30, 0x0, 0x0, 0x1, [@WGPEER_A_FLAGS={0x8, 0x3, 0x2}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @b_g}]}]}]}, 0x50}}, 0x0) 05:44:05 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x40) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x7, &(0x7f0000000080)=@mangle={'mangle\x00', 0x1f, 0x6, 0x500, 0x450, 0x520, 0x350, 0x450, 0xf0, 0x520, 0x520, 0x520, 0x520, 0x520, 0x6, 0x0, {[{{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'vcan0\x00', 'veth1_macvtap\x00'}, 0x0, 0xa8, 0xf0}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv4=@private, @ipv6=@mcast2}}}, {{@ipv6={@loopback, @private1, [], [], 'veth0_vlan\x00', 'dummy0\x00'}, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@empty, @private0, [], [], 'lo\x00', 'pim6reg1\x00'}, 0x0, 0xa8, 0xd0}, @HL={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @broadcast}, @remote, [], [], 'ip6erspan0\x00', 'macvlan1\x00'}, 0x0, 0xa8, 0xd0}, @inet=@TOS={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x560) 05:44:05 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'ip6_vti0\x00', {0x2, 0x0, @empty}}) 05:44:05 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000000100)="02108c10424d818b", 0x8, 0x0, 0x0, 0x0) 05:44:05 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) poll(&(0x7f0000002840)=[{r0, 0x2224}], 0x1, 0x0) 05:44:05 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x13, r0, 0x0) madvise(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) 05:44:05 executing program 3: syz_io_uring_setup(0x0, &(0x7f00000000c0), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000fee000/0x12000)=nil, &(0x7f0000000140), 0xfffffffffffffffc) 05:44:05 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="01"], 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) syz_genetlink_get_family_id$devlink(&(0x7f0000000300), r1) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) 05:44:05 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000002d80), 0x0, 0x0) ioctl$BLKPBSZGET(r0, 0x5421, &(0x7f0000000040)) 05:44:05 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_int(r0, 0xffff, 0x1019, &(0x7f0000000040), &(0x7f0000000080)=0x4) 05:44:05 executing program 2: setrlimit(0x7, &(0x7f0000000000)={0x8, 0xffffffffffffdffb}) 05:44:05 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="01"], 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) syz_genetlink_get_family_id$devlink(&(0x7f0000000300), r1) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) 05:44:05 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0xffff, 0x1001, &(0x7f0000000080)=0x1ff, 0x4) 05:44:05 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000100), &(0x7f0000000140)=0x4) 05:44:05 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x81, 0x4) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) recvfrom$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000001e00)="e4da5ec4c254443124148e0489625adc6780805476fe8a65a4a35208f4037008ef2a268ccec9053587458ada35a489234f8a3ecb80d56d2c5569e657028e4969f5c24fc7f3d03a692df9be4aad532e652a585c367e5e52d8cf7e9daa4a65531e6c93dea4e453d1d6e2f15923f39d88665f4f7db7ef93a230e1240fc0debc47b767e78c905865c66a9ce7551f15c1d50ffc6310dea15a8b0bcf5a8de45519d9d5c00f741cd0483b3907158a6bc0c90431b60f0161a8cc602f7478e0df054a694469b18dd96f36f0b6e6c85c", 0xcb, 0x404c004, &(0x7f00000003c0)={0x2, 0x4e21, @multicast1}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x12, &(0x7f0000000740)=0x205, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e21, @local}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x4000000, 0x0, 0x0) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000300), &(0x7f0000000340)=0x30) sendto$inet(r0, 0x0, 0x0, 0x8000, &(0x7f0000000040)={0x2, 0x4e22, @remote}, 0x10) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) accept4$inet(r2, &(0x7f0000000280)={0x2, 0x0, @dev}, &(0x7f00000002c0)=0x10, 0x80000) sendto$inet(r0, &(0x7f00000001c0)="6bae483ac243e7d3db0b924da3dbba756c3b614f66d9541bfe25e122694581a544aa", 0x22, 0x2004c850, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) sendto$inet(r0, &(0x7f0000000480)="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", 0xfffffea5, 0xc000, 0x0, 0xfffffcef) 05:44:05 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$BTRFS_IOC_QUOTA_CTL(r0, 0xc0109428, &(0x7f0000000100)={0x1}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000780)={0x1}) r2 = socket$netlink(0x10, 0x3, 0x4) getpeername$netlink(r2, &(0x7f0000001000), &(0x7f0000001040)=0xc) r3 = dup(r1) setsockopt$sock_int(r1, 0x1, 0x21, &(0x7f0000000040)=0x4, 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0x4, &(0x7f0000000140)=0x5, 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0x3, &(0x7f0000000440)=0x80, 0x4) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e21, @local}, 0x10) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) poll(&(0x7f0000000900)=[{0xffffffffffffffff, 0x9048}, {0xffffffffffffffff, 0x8000}, {0xffffffffffffffff, 0x8076}, {}, {0xffffffffffffffff, 0x10}, {0xffffffffffffffff, 0x1002}, {0xffffffffffffffff, 0x4008}], 0x7, 0x3) recvmmsg(r1, &(0x7f0000000840)=[{{&(0x7f00000001c0)=@can, 0x80, &(0x7f0000000300)=[{&(0x7f000001bd00)=""/102400, 0x19000}, {0x0}], 0x2}}], 0x1, 0x100, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = epoll_create1(0x0) r5 = socket$unix(0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(r3, 0x406, r5) r6 = epoll_create1(0x0) epoll_pwait2(r6, &(0x7f0000000000)=[{}], 0x1, &(0x7f0000000040), 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r4, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fsetxattr(r5, &(0x7f0000000080)=@known='com.apple.system.Security\x00', &(0x7f0000000240)='!*\x00', 0x3, 0x1) socketpair$nbd(0x1, 0x1, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendto$inet(r1, &(0x7f0000000480)="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", 0xfffffea5, 0xc000, 0x0, 0xfffffcef) [ 311.432416][ T23] audit: type=1400 audit(1677995045.515:381): avc: denied { map } for pid=16311 comm="syz-executor.1" path="socket:[58675]" dev="sockfs" ino=58675 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 05:44:05 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) shutdown(r0, 0x0) 05:44:05 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="01"], 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) syz_genetlink_get_family_id$devlink(&(0x7f0000000300), r1) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) 05:44:05 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000040)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f00000003c0), 0x98) 05:44:05 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000140)={0x1c, 0x1c, 0x1}, 0x1c) 05:44:05 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000018c0), &(0x7f0000001900)=0x4) 05:44:05 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="01"], 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) syz_genetlink_get_family_id$devlink(&(0x7f0000000300), r1) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 05:44:05 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_mreq(r0, 0x0, 0x24, &(0x7f0000000140), 0x8) 05:44:05 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 05:44:05 executing program 0: syz_emit_ethernet(0x36, &(0x7f00000000c0)={@local, @random="0ad9e3c4cd24", @val, {@ipv4}}, 0x0) 05:44:05 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="01"], 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) syz_genetlink_get_family_id$devlink(&(0x7f0000000300), r1) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 05:44:06 executing program 1: pipe2(0x0, 0x0) mincore(&(0x7f0000400000/0xc00000)=nil, 0xc00000, &(0x7f00000000c0)=""/92) 05:44:06 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockname(r0, 0x0, &(0x7f0000000040)) 05:44:06 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x46, 0x0, 0x0) 05:44:06 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) bind(r0, &(0x7f0000000200)=@un=@abs={0x8}, 0x8) 05:44:06 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="01"], 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) syz_genetlink_get_family_id$devlink(&(0x7f0000000300), r1) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 05:44:06 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$BTRFS_IOC_QUOTA_CTL(r0, 0xc0109428, &(0x7f0000000100)={0x1}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000780)={0x1}) r2 = socket$netlink(0x10, 0x3, 0x4) getpeername$netlink(r2, &(0x7f0000001000), &(0x7f0000001040)=0xc) r3 = dup(r1) setsockopt$sock_int(r1, 0x1, 0x21, &(0x7f0000000040)=0x4, 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0x4, &(0x7f0000000140)=0x5, 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0x3, &(0x7f0000000440)=0x80, 0x4) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e21, @local}, 0x10) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) poll(&(0x7f0000000900)=[{0xffffffffffffffff, 0x9048}, {0xffffffffffffffff, 0x8000}, {0xffffffffffffffff, 0x8076}, {}, {0xffffffffffffffff, 0x10}, {0xffffffffffffffff, 0x1002}, {0xffffffffffffffff, 0x4008}], 0x7, 0x3) recvmmsg(r1, &(0x7f0000000840)=[{{&(0x7f00000001c0)=@can, 0x80, &(0x7f0000000300)=[{&(0x7f000001bd00)=""/102400, 0x19000}, {0x0}], 0x2}}], 0x1, 0x100, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = epoll_create1(0x0) r5 = socket$unix(0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(r3, 0x406, r5) r6 = epoll_create1(0x0) epoll_pwait2(r6, &(0x7f0000000000)=[{}], 0x1, &(0x7f0000000040), 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r4, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fsetxattr(r5, &(0x7f0000000080)=@known='com.apple.system.Security\x00', &(0x7f0000000240)='!*\x00', 0x3, 0x1) socketpair$nbd(0x1, 0x1, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendto$inet(r1, &(0x7f0000000480)="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", 0xfffffea5, 0xc000, 0x0, 0xfffffcef) 05:44:06 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f00000003c0)={0x0, @in, 0x0, 0x8d6, 0x111}, 0x98) 05:44:06 executing program 1: setrlimit(0x8, &(0x7f0000000000)={0x100820, 0x100820}) 05:44:06 executing program 0: syz_emit_ethernet(0xd2, &(0x7f0000000140)={@broadcast, @random="5292e0866add", @val, {@ipv6}}, 0x0) 05:44:06 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="01"], 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) syz_genetlink_get_family_id$devlink(&(0x7f0000000300), r1) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x50, 0x0, 0x321, 0x0, 0x0, {0x5}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x3}, {0x6}, {0x5}}]}, 0x50}}, 0x0) 05:44:06 executing program 4: syz_emit_ethernet(0x66, &(0x7f00000000c0)={@random="0dcff408ceb9", @empty, @val, {@ipv6}}, 0x0) 05:44:06 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000140)={0x0, @in, 0x3, 0x0, 0x9, 0x0, 0x1ff}, 0x98) 05:44:06 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto(r0, &(0x7f0000000000)="e7", 0x1, 0x84, &(0x7f0000000100)=@in6={0x1c, 0x1c, 0x1}, 0x1c) 05:44:06 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="01"], 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) syz_genetlink_get_family_id$devlink(&(0x7f0000000300), r1) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x50, 0x0, 0x321, 0x0, 0x0, {0x5}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x3}, {0x6}, {0x5}}]}, 0x50}}, 0x0) 05:44:06 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000040)={0x10, 0x2}, 0x10) 05:44:06 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect(r0, &(0x7f0000000040)=@in={0x10, 0x2}, 0x10) 05:44:06 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="01"], 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) syz_genetlink_get_family_id$devlink(&(0x7f0000000300), r1) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x50, 0x0, 0x321, 0x0, 0x0, {0x5}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x3}, {0x6}, {0x5}}]}, 0x50}}, 0x0) 05:44:07 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$BTRFS_IOC_QUOTA_CTL(r0, 0xc0109428, &(0x7f0000000100)={0x1}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000780)={0x1}) r2 = socket$netlink(0x10, 0x3, 0x4) getpeername$netlink(r2, &(0x7f0000001000), &(0x7f0000001040)=0xc) r3 = dup(r1) setsockopt$sock_int(r1, 0x1, 0x21, &(0x7f0000000040)=0x4, 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0x4, &(0x7f0000000140)=0x5, 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0x3, &(0x7f0000000440)=0x80, 0x4) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e21, @local}, 0x10) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) poll(&(0x7f0000000900)=[{0xffffffffffffffff, 0x9048}, {0xffffffffffffffff, 0x8000}, {0xffffffffffffffff, 0x8076}, {}, {0xffffffffffffffff, 0x10}, {0xffffffffffffffff, 0x1002}, {0xffffffffffffffff, 0x4008}], 0x7, 0x3) recvmmsg(r1, &(0x7f0000000840)=[{{&(0x7f00000001c0)=@can, 0x80, &(0x7f0000000300)=[{&(0x7f000001bd00)=""/102400, 0x19000}, {0x0}], 0x2}}], 0x1, 0x100, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = epoll_create1(0x0) r5 = socket$unix(0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(r3, 0x406, r5) r6 = epoll_create1(0x0) epoll_pwait2(r6, &(0x7f0000000000)=[{}], 0x1, &(0x7f0000000040), 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r4, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fsetxattr(r5, &(0x7f0000000080)=@known='com.apple.system.Security\x00', &(0x7f0000000240)='!*\x00', 0x3, 0x1) socketpair$nbd(0x1, 0x1, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendto$inet(r1, &(0x7f0000000480)="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", 0xfffffea5, 0xc000, 0x0, 0xfffffcef) 05:44:07 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r0, &(0x7f0000000040)="bda45cf10a93169c753c2544e51003afcd940b7e4400b8adc00e837f99aebf5e5937bec921a5fc4ce58bc25fa8844c4d7cc29a536073cd5e5aeaa7b09b90ccb7d556361d659881b121", 0x49, 0x0, &(0x7f0000000140)={0x10, 0x2}, 0x10) 05:44:07 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r0, &(0x7f0000000040)="2e7c711d8d12e33ccff1e218604e52106e036efd8b6f83276e885b437bcbb391c614779f7fecd538373f8ab751e6709cd06a9ad90ba7e0a1ff6124026cc7239c38fe31cacffdcedb927d3f62e1342332176762e3a274dc8dd2fe1e25879966", 0x5f, 0x1, &(0x7f0000000100)={0x10, 0x2}, 0x10) 05:44:07 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind(r0, &(0x7f0000000000)=@un=@file={0xa}, 0xa) 05:44:07 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x46, &(0x7f0000000040), 0xc) 05:44:07 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="01"], 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000300), r1) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x50, r2, 0x0, 0x0, 0x0, {0x5}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x3}, {0x6}, {0x5}}]}, 0x50}}, 0x0) 05:44:07 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3}, 0x10) 05:44:07 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="01"], 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000300), r1) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x50, r2, 0x0, 0x0, 0x0, {0x5}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x3}, {0x6}, {0x5}}]}, 0x50}}, 0x0) 05:44:07 executing program 0: syz_emit_ethernet(0x9f, &(0x7f0000000180)={@local, @random="77e8f67e93a1", @val, {@ipv6}}, 0x0) 05:44:07 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000000), &(0x7f00000000c0)=0x98) 05:44:07 executing program 1: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) fcntl$lock(r0, 0x6, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) 05:44:07 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000001a80)={0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)=[@sndrcv={0x2c}], 0x2c}, 0x0) [ 313.312525][ T23] audit: type=1400 audit(1677995047.395:382): avc: denied { name_bind } for pid=16405 comm="syz-executor.4" src=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=sctp_socket permissive=1 05:44:08 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) rename(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0/../file0\x00') 05:44:08 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) bind$inet(r0, &(0x7f0000000080)={0x10, 0x2}, 0x10) 05:44:08 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$BTRFS_IOC_QUOTA_CTL(r0, 0xc0109428, &(0x7f0000000100)={0x1}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000780)={0x1}) r2 = socket$netlink(0x10, 0x3, 0x4) getpeername$netlink(r2, &(0x7f0000001000), &(0x7f0000001040)=0xc) r3 = dup(r1) setsockopt$sock_int(r1, 0x1, 0x21, &(0x7f0000000040)=0x4, 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0x4, &(0x7f0000000140)=0x5, 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0x3, &(0x7f0000000440)=0x80, 0x4) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e21, @local}, 0x10) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) poll(&(0x7f0000000900)=[{0xffffffffffffffff, 0x9048}, {0xffffffffffffffff, 0x8000}, {0xffffffffffffffff, 0x8076}, {}, {0xffffffffffffffff, 0x10}, {0xffffffffffffffff, 0x1002}, {0xffffffffffffffff, 0x4008}], 0x7, 0x3) recvmmsg(r1, &(0x7f0000000840)=[{{&(0x7f00000001c0)=@can, 0x80, &(0x7f0000000300)=[{&(0x7f000001bd00)=""/102400, 0x19000}, {0x0}], 0x2}}], 0x1, 0x100, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = epoll_create1(0x0) r5 = socket$unix(0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(r3, 0x406, r5) r6 = epoll_create1(0x0) epoll_pwait2(r6, &(0x7f0000000000)=[{}], 0x1, &(0x7f0000000040), 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r4, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fsetxattr(r5, &(0x7f0000000080)=@known='com.apple.system.Security\x00', &(0x7f0000000240)='!*\x00', 0x3, 0x1) socketpair$nbd(0x1, 0x1, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendto$inet(r1, &(0x7f0000000480)="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", 0xfffffea5, 0xc000, 0x0, 0xfffffcef) 05:44:08 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="01"], 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000300), r1) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x50, r2, 0x0, 0x0, 0x0, {0x5}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x3}, {0x6}, {0x5}}]}, 0x50}}, 0x0) 05:44:08 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r0, 0xffff, 0x10, &(0x7f0000000040)=0x2, 0x4) 05:44:08 executing program 4: setrlimit(0x3, &(0x7f0000000000)={0x100820, 0x100820}) 05:44:08 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto(r0, &(0x7f0000000000)="e7", 0x1, 0x0, &(0x7f0000000100)=@in6={0x1c, 0x1c, 0x1}, 0x1c) 05:44:08 executing program 4: open(&(0x7f00000032c0)='./file0\x00', 0x200, 0x0) 05:44:08 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, 0xffffffffffffffff, &(0x7f00000004c0)) 05:44:08 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="01"], 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000300), r1) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x14, r2, 0x321, 0x0, 0x0, {0x5}}, 0x14}}, 0x0) 05:44:08 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000040)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f00000003c0)={0x0, @in, 0x0, 0x0, 0x111}, 0x98) 05:44:08 executing program 4: setrlimit(0x7, &(0x7f00000000c0)={0x10000, 0x8000}) 05:44:08 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000040)={0x10, 0x2}, 0x10) read(r0, &(0x7f00000004c0)=""/16, 0x10) 05:44:09 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) read(r0, &(0x7f00000004c0)=""/16, 0x10) 05:44:09 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="01"], 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000300), r1) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x14, r2, 0x321, 0x0, 0x0, {0x5}}, 0x14}}, 0x0) 05:44:09 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) 05:44:09 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_int(r0, 0xffff, 0x400, &(0x7f0000000000), &(0x7f0000000040)=0x4) 05:44:09 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000040)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f00000003c0)={0x0, @in, 0x0, 0x0, 0x111}, 0x98) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000140)={0x0, @in, 0x0, 0x0, 0xc}, 0x98) 05:44:09 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000140)={0x1c, 0x1c, 0x1}, 0x1c) 05:44:09 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000040)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000140)={0x0, @in, 0x0, 0x0, 0xc}, 0x98) 05:44:09 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000001a80)={&(0x7f0000000500)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) 05:44:09 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000200)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000040)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000001a00)={0x0, 0x0, &(0x7f0000001900)=[{&(0x7f0000000640)="d9", 0x1}], 0x1}, 0x0) 05:44:09 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="01"], 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000300), r1) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x14, r2, 0x321, 0x0, 0x0, {0x5}}, 0x14}}, 0x0) 05:44:09 executing program 1: linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) 05:44:09 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto$inet6(r0, &(0x7f00000004c0)='p', 0x1, 0x0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) 05:44:09 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89b1, &(0x7f0000000240)={'ip6gre0\x00', 0x0}) 05:44:09 executing program 0: r0 = socket(0x1c, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x1}, 0x1c) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)=@in={0x10, 0x2}, 0x10) 05:44:09 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x23, &(0x7f0000000100), &(0x7f00000001c0)=0x90) 05:44:09 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x901, &(0x7f0000001bc0), 0x8) 05:44:09 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind(r0, &(0x7f0000000140)=@in={0x10, 0x2}, 0x10) 05:44:09 executing program 5: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @random="b459b2fdd2a2", @val, {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x1, @empty, @loopback}}}}, 0x0) 05:44:09 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000400), 0x4) 05:44:09 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, 0x0, 0x0) 05:44:09 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$sock_timeval(r0, 0xffff, 0x1006, &(0x7f0000000040), 0x10) 05:44:09 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000140)={0x0, @in, 0x0, 0x0, 0xc}, 0x98) 05:44:09 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r0, &(0x7f0000000000)="ac", 0x1, 0x0, &(0x7f0000000080), 0x10) 05:44:09 executing program 4: mincore(&(0x7f0000ffd000/0x2000)=nil, 0x2000, &(0x7f0000000000)=""/253) 05:44:09 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000000)={0x1}, 0x88) 05:44:09 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_buf(r0, 0x0, 0x14, 0x0, 0x0) 05:44:09 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000140), 0x4) 05:44:09 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000001640)=@un=@abs={0x8}, 0x8) 05:44:09 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) chown(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) rename(&(0x7f0000000040)='.\x00', 0x0) rename(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') 05:44:09 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) sendto$inet6(r0, 0x0, 0x0, 0x20100, &(0x7f0000000180)={0x1c, 0x1c, 0x3}, 0x1c) 05:44:09 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000100), &(0x7f0000000140)=0x4) 05:44:09 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x3, &(0x7f0000000180)={0x1}, 0x8) 05:44:09 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) 05:44:09 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)=@in6={0x1c, 0x1c, 0x1}, 0x1c) 05:44:09 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000140)={0x1c, 0x1c, 0x1}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000003ac0)={0x1c, 0x1c, 0x3}, 0x1c) 05:44:09 executing program 3: shmget(0x1, 0x4000, 0x791, &(0x7f0000ffb000/0x4000)=nil) 05:44:09 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) rename(&(0x7f0000000040)='.\x00', &(0x7f0000000080)='.\x00') 05:44:09 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r0, r1) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0x24, &(0x7f0000000040), &(0x7f0000000180)=0x98) 05:44:09 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000300), 0x88) 05:44:09 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x10, 0x2}, 0x10) 05:44:09 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r0, &(0x7f0000000100)='\"', 0x1, 0x0, &(0x7f0000000180), 0x10) 05:44:09 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_linger(r0, 0xffff, 0x80, 0x0, 0x0) 05:44:09 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000f80)={0x1c, 0x1c, 0x3}, 0x1c) 05:44:09 executing program 5: pipe2(&(0x7f0000001a00), 0x0) 05:44:09 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000040)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) 05:44:09 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x28, &(0x7f0000000280)=ANY=[@ANYBLOB="02"], &(0x7f00000002c0)=0x8) 05:44:09 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r0, &(0x7f0000000040)="bda45cf10a93169c753c2544e51003afcd940b7e4400b8adc00e837f99aebf5e5937bec921a5fc4ce58bc25fa8844c4d7cc29a536073cd5e5aeaa7b09b90ccb7d556361d659881b1218ad78a788208b4501bf6285d41121ab0e5f746fc88150a64ab5cd6", 0x64, 0x0, &(0x7f0000000140)={0x10, 0x2}, 0x10) 05:44:09 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockname(r0, 0x0, &(0x7f0000000040)) 05:44:09 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000001880)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[{0x108, 0x0, 0x0, "5e6552d8a40698ccea8689bf7e2a259f8df80bcdbb65392edd5151a2a7be2ac2486ff47c9de1cebaf7fbc8d917d503c5dee9c37a587ab31ac0cdc3765aedea20121a55a682d20404f7d8cbffb3c052117679cdb174fabe45aeefd7948a5f74ab188704bce80f97c121d722f539c20128288aed4ca8d41e0644d62a8421e4e2fe05a0e1e701c3d9f11104275e32dc6289865438fee5341e2a5de029aefc047bbdc2ff2ea84c7b81731d0375ef0478f43d93833cf8019ff637a72f84c471c35f326a91e37ea03bcf8113955abe27b968dd704c81053c7a6f4c32c09916dd353834fd4d1173a1990f98e0215b185d54bfcdc2"}, {0x58, 0x0, 0x0, "131785a1d35b7dd888c9eb247edc11f1169d7f7fe24ddc950fec42ebcd071407461752db4121fb543f3ced92568809ea4584de539a52f3c585b714d9233e9b62c6"}, {0x6a8, 0x0, 0x0, "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"}], 0x808}, 0x0) 05:44:09 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000200)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000040)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000b00)="9e", 0x1}], 0x1}, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000001a00)={0x0, 0x0, &(0x7f0000001900)=[{&(0x7f0000000640)="d9", 0x1}], 0x1}, 0x0) 05:44:09 executing program 4: sendmsg(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f00000001c0)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f00000003c0)=[{0x108, 0x0, 0x0, "5e6552d8a40698ccea8689bf7e2a259f8df80bcdbb65392edd5151a2a7be2ac2486ff47c9de1cebaf7fbc8d917d503c5dee9c37a587ab31ac0cdc3765aedea20121a55a682d20404f7d8cbffb3c052117679cdb174fabe45aeefd7948a5f74ab188704bce80f97c121d722f539c20128288aed4ca8d41e0644d62a8421e4e2fe05a0e1e701c3d9f11104275e32dc6289865438fee5341e2a5de029aefc047bbdc2ff2ea84c7b81731d0375ef0478f43d93833cf8019ff637a72f84c471c35f326a91e37ea03bcf8113955abe27b968dd704c81053c7a6f4c32c09916dd353834fd4d1173a1990f98e0215b185d54bfcdc2"}, {0x58, 0x0, 0x0, "131785a1d35b7dd888c9eb247edc11f1169d7f7fe24ddc950fec42ebcd071407461752db4121fb543f3ced92568809ea4584de539a52f3c585b714d9233e9b62c6"}, {0x6a8, 0x0, 0x0, "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"}], 0x808}, 0x0) 05:44:09 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x46, &(0x7f0000000000)={@multicast2, @broadcast, @local={0xac, 0x14, 0x0}}, 0xc) 05:44:09 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f00000003c0)={0x0, @in, 0x0, 0x0, 0x111}, 0x98) 05:44:09 executing program 2: syz_emit_ethernet(0x76, &(0x7f0000000140)={@local, @random="cfd3f1e404dc", @val, {@ipv6}}, 0x0) 05:44:09 executing program 0: shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000800)={{0x0, 0x0, 0xffffffffffffffff}}) 05:44:09 executing program 1: r0 = socket(0x29, 0x2, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x14}, 0x14}}, 0x40014) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x2c}}, 0x0) 05:44:09 executing program 4: syz_emit_ethernet(0x165, &(0x7f0000000000)=ANY=[@ANYBLOB="bbbbbbbbbbbbffffffffffff86dd63"], 0x0) 05:44:09 executing program 5: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect={0x0, 0x5517, 0x48000000}) ioctl$USBDEVFS_IOCTL(r0, 0xc00c5512, &(0x7f0000000380)) syz_genetlink_get_family_id$nl80211(&(0x7f00000005c0), 0xffffffffffffffff) 05:44:09 executing program 2: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000e40), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x2}}) 05:44:09 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000001a80)={&(0x7f0000000500)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f00000019c0)=[@sndrcv={0x2c}, @sndrcv={0x2c}], 0x58}, 0x0) 05:44:09 executing program 4: sigaltstack(&(0x7f0000ffc000), 0x0) mincore(&(0x7f0000ffa000/0x3000)=nil, 0x3000, &(0x7f0000000540)=""/127) 05:44:09 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="050000130000000000000600000008000300", @ANYRES32=r2, @ANYBLOB="0800050009"], 0x24}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f00000022c0), 0xffffffffffffffff) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_TRIGGER_SCAN(r4, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000100)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="050000000000000000002100000008000300", @ANYRES32=r6], 0x40}}, 0x0) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x2c, r3, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r6}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x15cc}], @NL80211_ATTR_DURATION={0x8, 0x57, 0x80}]}, 0x2c}}, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), 0xffffffffffffffff) r9 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r9, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_FRAME(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000fc0)={&(0x7f00000006c0)={0x38, r8, 0x1, 0x0, 0x0, {{0x2}, {@val={0x8, 0x3, r10}, @val={0xc}}}, [@chandef_params=[@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x2}], @chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @default=0x9b4}]]}, 0x38}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 05:44:09 executing program 0: mknod(&(0x7f00000000c0)='./file1\x00', 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) rename(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='./file0\x00') 05:44:09 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000080)=0x16, 0x4) 05:44:09 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0xa, 0x2, 0x5, 0x4100}, 0x48) 05:44:09 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000080)) select(0x40, &(0x7f0000000100), 0x0, &(0x7f0000000180)={0x9}, &(0x7f0000000200)) 05:44:09 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001240)={0x9, 0x2403, &(0x7f00000000c0)=@raw=[@exit], &(0x7f0000000140)='syzkaller\x00', 0x2, 0x1000, &(0x7f0000000180)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:44:09 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000000)) 05:44:09 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000000)=""/68) 05:44:09 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x20, 0x0, 0x8, 0x801, 0x0, 0x0, {}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x20}}, 0x0) 05:44:09 executing program 0: r0 = socket(0xa, 0x80806, 0x0) setsockopt$WPAN_SECURITY_LEVEL(r0, 0x0, 0x2, 0x0, 0x0) 05:44:09 executing program 2: syz_genetlink_get_family_id$nl802154(&(0x7f00000002c0), 0xffffffffffffffff) 05:44:09 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000000)=""/68) [ 315.627858][T16579] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.3'. 05:44:09 executing program 3: unshare(0x400) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000100)='.\x00', 0x2000a11) 05:44:09 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') readv(r0, &(0x7f0000000480)=[{&(0x7f0000000000)=""/231, 0xe7}], 0x1) r1 = open(&(0x7f0000000a40)='./bus\x00', 0x141a42, 0x0) sendfile(r1, r0, 0x0, 0x800000080000016) 05:44:09 executing program 0: syz_emit_ethernet(0x50, &(0x7f0000000500)={@local, @local, @val, {@ipv4}}, 0x0) 05:44:10 executing program 4: setsockopt$MRT_PIM(0xffffffffffffffff, 0x0, 0xcf, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000004c0), 0xffffffffffffffff) 05:44:10 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x4, 0x1}, 0x48) 05:44:10 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000000)=""/68) 05:44:10 executing program 0: syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x4040) sendmsg$WG_CMD_SET_DEVICE(0xffffffffffffffff, 0x0, 0x240000d1) eventfd2(0x8001, 0x81001) 05:44:10 executing program 1: open(&(0x7f00000000c0)='./bus\x00', 0x48a42, 0x182) open(0x0, 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./bus\x00', 0x143342, 0x0) open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x182) open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x42102, 0x0) r2 = open(&(0x7f00000000c0)='./file2\x00', 0x143042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r1, r2, 0x0, 0x1000000201005) setxattr$trusted_overlay_origin(0x0, 0x0, 0x0, 0x0, 0x0) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000400)=ANY=[], 0xdf) sendfile(r3, r3, &(0x7f0000000240), 0x7ffc) openat(r3, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r0, 0xf501, 0x0) 05:44:10 executing program 3: socket$igmp(0x2, 0x3, 0x2) getsockopt$MRT(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 05:44:10 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) fchownat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) 05:44:10 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000008c0)={&(0x7f0000006f80)=@dellinkprop={0x28, 0x12, 0x201, 0x0, 0x0, {}, [@IFLA_EXT_MASK={0x8, 0x1d, 0x52d}]}, 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000006d80)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x6, 0x0, 0x0) 05:44:10 executing program 2: openat$vsock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_BEACON(r0, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)=ANY=[@ANYBLOB="90000000", @ANYRES16=r1, @ANYBLOB="2b0300000000000000000500000008000300", @ANYRES32=0x0, @ANYBLOB="72000e"], 0x90}}, 0x0) 05:44:10 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000000)=""/68) 05:44:10 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000001000)={0x0, 0x0, 0x0, &(0x7f0000000c80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) 05:44:10 executing program 4: r0 = syz_open_dev$sg(&(0x7f00000000c0), 0x0, 0x0) ioctl$SG_GET_SG_TABLESIZE(r0, 0x227f, &(0x7f0000000080)) 05:44:10 executing program 0: r0 = syz_open_dev$sg(&(0x7f00000000c0), 0x0, 0x0) ioctl$SG_GET_SG_TABLESIZE(r0, 0x2282, 0x0) 05:44:10 executing program 2: bpf$PROG_LOAD(0x8, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:44:10 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x0, 0x0) mmap$usbfs(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000001, 0x10, r0, 0x0) 05:44:10 executing program 3: mount_setattr(0xffffffffffffffff, 0x0, 0x9000, &(0x7f0000000100)={0x0, 0x0, 0x180000}, 0x20) 05:44:11 executing program 1: r0 = syz_open_dev$vcsn(&(0x7f0000000180), 0x1, 0x0) read$msr(r0, &(0x7f0000000a40)=""/4096, 0x1016) 05:44:11 executing program 0: bpf$PROG_LOAD(0x3, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:44:11 executing program 4: r0 = syz_open_dev$sg(&(0x7f00000000c0), 0x0, 0x0) ioctl$SG_GET_SG_TABLESIZE(r0, 0x227f, &(0x7f0000000080)) 05:44:11 executing program 5: r0 = socket(0x40000000015, 0x5, 0x0) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) 05:44:11 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x3d993700921f1a5b}, 0x48) 05:44:11 executing program 3: r0 = socket(0x21, 0x2, 0x2) getsockopt$inet6_dccp_buf(r0, 0x21, 0x0, 0x0, 0x0) 05:44:11 executing program 0: r0 = syz_open_dev$sg(&(0x7f00000000c0), 0x0, 0x0) ioctl$SG_GET_SG_TABLESIZE(r0, 0x2205, 0x0) 05:44:11 executing program 2: r0 = socket(0x18, 0x0, 0x2) syz_genetlink_get_family_id$wireguard(&(0x7f00000001c0), r0) 05:44:11 executing program 5: bpf$PROG_LOAD(0x6, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:44:11 executing program 4: r0 = syz_open_dev$sg(&(0x7f00000000c0), 0x0, 0x0) ioctl$SG_GET_SG_TABLESIZE(r0, 0x227f, &(0x7f0000000080)) 05:44:11 executing program 3: syz_clone(0x80001400, 0x0, 0x0, 0x0, 0x0, 0x0) 05:44:11 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0), 0x0, 0x0) ioctl$SG_GET_SG_TABLESIZE(r0, 0x1275, 0x0) [ 317.180783][ T23] audit: type=1400 audit(1677995051.265:383): avc: denied { getopt } for pid=16657 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 05:44:11 executing program 1: r0 = socket(0x1d, 0x3, 0x1) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x1d5c}}, 0x0) 05:44:11 executing program 4: r0 = syz_open_dev$sg(&(0x7f00000000c0), 0x0, 0x0) ioctl$SG_GET_SG_TABLESIZE(r0, 0x227f, &(0x7f0000000080)) 05:44:11 executing program 0: bpf$PROG_LOAD(0x4, 0x0, 0x1d) 05:44:11 executing program 5: r0 = socket(0x18, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x40047452, 0x0) 05:44:11 executing program 2: r0 = socket(0x18, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x40047459, 0x0) 05:44:11 executing program 3: bpf$PROG_LOAD(0x1b, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:44:11 executing program 0: r0 = socket(0x1d, 0x3, 0x1) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, 0x0) 05:44:11 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0), 0x0, 0x0) ioctl$SG_GET_SG_TABLESIZE(r0, 0x5386, 0x0) 05:44:11 executing program 4: ioctl$SG_GET_SG_TABLESIZE(0xffffffffffffffff, 0x227f, &(0x7f0000000080)) 05:44:11 executing program 5: r0 = socket(0x18, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, 0x0) 05:44:11 executing program 3: r0 = socket(0x18, 0x0, 0x2) connect$inet(r0, 0x0, 0x0) 05:44:11 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0), 0x0, 0x0) ioctl$SG_GET_SG_TABLESIZE(r0, 0x2271, 0x0) 05:44:11 executing program 1: syz_clone(0x4880280, 0x0, 0x0, 0x0, 0x0, 0x0) 05:44:11 executing program 2: bpf$PROG_LOAD(0x2, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:44:11 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x1, 0x3, &(0x7f00000001c0)=@framed, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:44:11 executing program 4: ioctl$SG_GET_SG_TABLESIZE(0xffffffffffffffff, 0x227f, &(0x7f0000000080)) 05:44:11 executing program 3: r0 = socket(0x18, 0x0, 0x0) connect$inet(r0, 0x0, 0x1d) [ 317.361795][ T23] audit: type=1400 audit(1677995051.445:384): avc: denied { write } for pid=16688 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 05:44:11 executing program 1: bpf$PROG_LOAD(0x23, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:44:11 executing program 2: socket$packet(0x11, 0x2, 0x300) syz_emit_ethernet(0x1e, &(0x7f0000000040)={@random="ee942143f319", @local, @void, {@can={0xc, {{}, 0x0, 0x0, 0x0, 0x0, "f4e13e38b31075ed"}}}}, 0xfffffffffffffffe) 05:44:11 executing program 0: syz_clone(0x80001400, 0x0, 0x0, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="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") 05:44:11 executing program 5: syz_clone(0x208000, &(0x7f0000002fc0), 0x0, 0x0, &(0x7f0000003040), &(0x7f0000003080)="bd") 05:44:11 executing program 4: ioctl$SG_GET_SG_TABLESIZE(0xffffffffffffffff, 0x227f, &(0x7f0000000080)) 05:44:11 executing program 0: r0 = syz_open_dev$sg(&(0x7f00000000c0), 0x0, 0x0) ioctl$SG_GET_SG_TABLESIZE(r0, 0x2276, 0x0) 05:44:11 executing program 5: socket$inet(0x2, 0xa, 0x7fffffff) 05:44:11 executing program 4: r0 = syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$SG_GET_SG_TABLESIZE(r0, 0x227f, &(0x7f0000000080)) 05:44:11 executing program 2: bpf$PROG_LOAD(0x16, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:44:11 executing program 3: syz_clone(0x86000, 0x0, 0x0, 0x0, 0x0, 0x0) 05:44:11 executing program 1: r0 = socket(0x18, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8906, 0x0) 05:44:11 executing program 4: r0 = syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$SG_GET_SG_TABLESIZE(r0, 0x227f, &(0x7f0000000080)) 05:44:11 executing program 0: r0 = syz_open_dev$sg(&(0x7f00000000c0), 0x0, 0x0) ioctl$SG_GET_SG_TABLESIZE(r0, 0x227c, 0x0) 05:44:11 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x20001400) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r1, 0x4004743d, 0x20001400) 05:44:11 executing program 1: r0 = syz_open_dev$sg(&(0x7f00000000c0), 0x0, 0x0) ioctl$SG_GET_SG_TABLESIZE(r0, 0xc0481273, 0x0) 05:44:11 executing program 5: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/cgroup\x00') syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/cgroup\x00') 05:44:11 executing program 4: r0 = syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$SG_GET_SG_TABLESIZE(r0, 0x227f, &(0x7f0000000080)) 05:44:11 executing program 0: bpf$PROG_LOAD(0x1a, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:44:11 executing program 1: bpf$PROG_LOAD(0xd, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:44:11 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r0, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18}, './file0\x00'}) 05:44:11 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0), 0x0, 0x0) ioctl$SG_GET_SG_TABLESIZE(r0, 0x1274, 0x0) 05:44:11 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000000c0), 0x0, 0x0) ioctl$SG_GET_SG_TABLESIZE(r0, 0x1276, 0x0) 05:44:11 executing program 0: r0 = socket(0x18, 0x0, 0x1) connect$inet(r0, 0x0, 0x0) 05:44:11 executing program 4: syz_open_dev$sg(&(0x7f00000000c0), 0x0, 0x0) ioctl$SG_GET_SG_TABLESIZE(0xffffffffffffffff, 0x227f, &(0x7f0000000080)) 05:44:11 executing program 2: r0 = socket(0x21, 0x2, 0x2) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 05:44:11 executing program 1: bpf$PROG_LOAD(0x17, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:44:11 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0), 0x0, 0x0) ioctl$SG_GET_SG_TABLESIZE(r0, 0x2286, 0x0) 05:44:11 executing program 5: bpf$PROG_LOAD(0x19, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:44:11 executing program 1: r0 = socket(0x18, 0x0, 0x1) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, 0x0, 0x0) 05:44:12 executing program 0: syz_clone(0x80001400, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='2') 05:44:12 executing program 2: r0 = socket$inet(0x2, 0x3, 0x101) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000280)={'tunl0\x00', 0x0}) 05:44:12 executing program 4: syz_open_dev$sg(&(0x7f00000000c0), 0x0, 0x0) ioctl$SG_GET_SG_TABLESIZE(0xffffffffffffffff, 0x227f, &(0x7f0000000080)) 05:44:12 executing program 2: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/bnep\x00') 05:44:12 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000180), 0x1, 0x0) read$msr(r0, 0x0, 0x0) 05:44:12 executing program 1: r0 = socket(0x18, 0x0, 0x1) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) 05:44:12 executing program 4: syz_open_dev$sg(&(0x7f00000000c0), 0x0, 0x0) ioctl$SG_GET_SG_TABLESIZE(0xffffffffffffffff, 0x227f, &(0x7f0000000080)) 05:44:12 executing program 5: bpf$PROG_LOAD(0x1d, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:44:12 executing program 0: r0 = syz_open_dev$sg(&(0x7f00000000c0), 0x0, 0x0) ioctl$SG_GET_SG_TABLESIZE(r0, 0x2275, 0x0) 05:44:12 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0), 0x0, 0x0) ioctl$SG_GET_SG_TABLESIZE(r0, 0x2284, 0x0) 05:44:12 executing program 1: r0 = syz_open_dev$sg(&(0x7f00000000c0), 0x0, 0x0) ioctl$SG_GET_SG_TABLESIZE(r0, 0x2203, 0x0) 05:44:12 executing program 0: r0 = syz_open_dev$sg(&(0x7f00000000c0), 0x0, 0x0) ioctl$SG_GET_SG_TABLESIZE(r0, 0x227a, 0x0) 05:44:12 executing program 4: r0 = syz_open_dev$sg(&(0x7f00000000c0), 0x0, 0x0) ioctl$SG_GET_SG_TABLESIZE(r0, 0x227f, 0x0) 05:44:12 executing program 5: bpf$PROG_LOAD(0x4, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:44:12 executing program 2: bpf$PROG_LOAD(0x1c, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:44:12 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000140), 0x82ab, 0x0) read$eventfd(r0, &(0x7f0000000000), 0x8) 05:44:12 executing program 3: r0 = socket(0x18, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @private1}}) 05:44:12 executing program 1: r0 = socket(0x18, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x80047437, 0x0) 05:44:12 executing program 4: r0 = syz_open_dev$sg(&(0x7f00000000c0), 0x0, 0x0) ioctl$SG_GET_SG_TABLESIZE(r0, 0x227f, 0x0) 05:44:12 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x0, 0x0) read$msr(r0, &(0x7f0000000040)=""/12, 0xffffffffffffffed) 05:44:12 executing program 0: r0 = syz_open_dev$sg(&(0x7f00000000c0), 0x0, 0x0) ioctl$SG_GET_SG_TABLESIZE(r0, 0x227a, 0x0) 05:44:12 executing program 0: r0 = syz_open_dev$sg(&(0x7f00000000c0), 0x0, 0x0) ioctl$SG_GET_SG_TABLESIZE(r0, 0x227a, 0x0) 05:44:12 executing program 1: r0 = socket(0x21, 0x2, 0x2) setsockopt$inet_msfilter(r0, 0x110, 0x29, 0x0, 0x0) 05:44:12 executing program 5: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000040)="2ec9e71f9512dcde0695b7cf2783f289730399d9d3e10fbe75c33ad52025", 0x1e, 0x0, &(0x7f0000000100), 0x0) syz_clone(0x86000, &(0x7f0000000180)="f437cc4b50bb9139ce46031711c18f6e99b37f4c45959c748e7fa6a54b52c839a81f1fca5b206df3c7ce9e822827318bc62b94c877b6ddf4d177ad9cb98c73d1be9ffabf5f0316a5d30c8ef790455ac3309f7efc5f8e0599e5caebcc7248123d3f2a101dd8514cb994e9093c1cc1c611210298b917bd948277f58584d3df997180e521f48a35fe96690e536dec030f5d29b78906fa0968f7902a1e87cf8d32839a68899460bedb939c8a74119b2f121362fea6775dc42b9df8e9d017758c349b53ec54ef2900ed298553809f1ee9bccfc57a03b732ee82a0", 0xd8, &(0x7f0000000280), 0x0, &(0x7f0000000300)) 05:44:12 executing program 4: r0 = syz_open_dev$sg(&(0x7f00000000c0), 0x0, 0x0) ioctl$SG_GET_SG_TABLESIZE(r0, 0x227f, 0x0) 05:44:12 executing program 2: socket$can_bcm(0x1d, 0x2, 0x2) r0 = socket(0x40000000015, 0x5, 0x0) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) 05:44:12 executing program 1: syz_open_dev$sg(&(0x7f00000000c0), 0x0, 0x4081) 05:44:12 executing program 4: bpf$PROG_LOAD(0xe, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:44:12 executing program 3: fdatasync(0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='blkio.bfq.io_merged_recursive\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[], 0x208e24b) fsetxattr$system_posix_acl(r0, &(0x7f00000000c0)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.io_service_bytes_recursive\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r1, 0x0) 05:44:12 executing program 0: r0 = syz_open_dev$sg(&(0x7f00000000c0), 0x0, 0x0) ioctl$SG_GET_SG_TABLESIZE(r0, 0x227a, 0x0) 05:44:12 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0), 0x0, 0x0) ioctl$SG_GET_SG_TABLESIZE(r0, 0x2288, 0x0) 05:44:12 executing program 4: r0 = syz_open_dev$sg(&(0x7f00000000c0), 0x0, 0x0) ioctl$SG_GET_SG_TABLESIZE(r0, 0x5385, 0x0) 05:44:12 executing program 1: r0 = socket(0x21, 0x2, 0x2) setsockopt$inet_msfilter(r0, 0x110, 0x2, 0x0, 0x0) 05:44:12 executing program 2: r0 = socket(0x18, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x80108906, 0x0) 05:44:12 executing program 0: ioctl$SG_GET_SG_TABLESIZE(0xffffffffffffffff, 0x227a, 0x0) 05:44:12 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x0, 0x0) read$msr(r0, 0x0, 0x0) 05:44:12 executing program 1: syz_clone(0x86000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)) 05:44:12 executing program 4: r0 = syz_open_dev$sg(&(0x7f00000000c0), 0x0, 0x0) ioctl$SG_GET_SG_TABLESIZE(r0, 0x227e, 0x0) 05:44:12 executing program 0: ioctl$SG_GET_SG_TABLESIZE(0xffffffffffffffff, 0x227a, 0x0) 05:44:12 executing program 2: r0 = socket(0x18, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x80047453, 0x0) 05:44:12 executing program 3: r0 = socket(0x18, 0x0, 0x0) connect$inet(r0, 0x0, 0x0) 05:44:12 executing program 0: ioctl$SG_GET_SG_TABLESIZE(0xffffffffffffffff, 0x227a, 0x0) 05:44:12 executing program 2: syz_open_dev$vcsa(&(0x7f0000000040), 0x0, 0x414202) 05:44:12 executing program 3: bpf$PROG_LOAD(0x22, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:44:12 executing program 4: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x48001000, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0) 05:44:12 executing program 0: r0 = syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$SG_GET_SG_TABLESIZE(r0, 0x227a, 0x0) 05:44:12 executing program 3: r0 = socket(0x21, 0x2, 0x2) setsockopt$inet_msfilter(r0, 0x110, 0x5, 0x0, 0x0) 05:44:12 executing program 5: add_key$user(&(0x7f0000000300), 0x0, 0x0, 0x0, 0xfffffffffffffffa) 05:44:12 executing program 1: mknod(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), &(0x7f0000000200), 0x2, 0x0) 05:44:12 executing program 2: bpf$PROG_LOAD(0x18, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:44:12 executing program 0: r0 = syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$SG_GET_SG_TABLESIZE(r0, 0x227a, 0x0) 05:44:12 executing program 3: bpf$PROG_LOAD(0x3, 0x0, 0x0) 05:44:12 executing program 4: r0 = socket(0x18, 0x0, 0x2) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000040)={'filter\x00', 0x4, [{}, {}, {}, {}]}, 0x68) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket(0xf, 0x2, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000100)={0x2f, @loopback, 0x4e22, 0x2, 'none\x00', 0x0, 0x5, 0x35}, 0x2c) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f00000000c0)={0x2, 'wg2\x00'}, 0x18) accept$inet(r1, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) accept$inet(r3, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'syzkaller0\x00', 0x2}, 0x18) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000000)={'wg0\x00'}) 05:44:12 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='blkio.bfq.io_merged_recursive\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[], 0x208e24b) fsetxattr$system_posix_acl(r0, &(0x7f00000000c0)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r1, 0x0) 05:44:12 executing program 0: r0 = syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$SG_GET_SG_TABLESIZE(r0, 0x227a, 0x0) 05:44:12 executing program 2: r0 = socket$inet(0x2, 0x3, 0x101) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000280)={'tunl0\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB='tunl0\x00'/16, @ANYRES32, @ANYBLOB="87098000000000010000000840"]}) 05:44:13 executing program 0: syz_open_dev$sg(&(0x7f00000000c0), 0x0, 0x0) ioctl$SG_GET_SG_TABLESIZE(0xffffffffffffffff, 0x227a, 0x0) 05:44:13 executing program 1: syz_clone(0x48001000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 05:44:13 executing program 2: r0 = socket(0x21, 0x2, 0x2) connect$inet(r0, 0x0, 0x0) 05:44:13 executing program 5: r0 = socket$inet(0x2, 0xa, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) 05:44:13 executing program 0: syz_open_dev$sg(&(0x7f00000000c0), 0x0, 0x0) ioctl$SG_GET_SG_TABLESIZE(0xffffffffffffffff, 0x227a, 0x0) 05:44:13 executing program 4: r0 = syz_open_dev$sg(&(0x7f00000000c0), 0x0, 0x0) ioctl$SG_GET_SG_TABLESIZE(r0, 0x541b, 0x0) 05:44:13 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000440), 0x0, 0x0) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 05:44:13 executing program 4: r0 = socket(0x18, 0x0, 0x2) accept$inet(r0, 0x0, 0x0) 05:44:13 executing program 0: syz_open_dev$sg(&(0x7f00000000c0), 0x0, 0x0) ioctl$SG_GET_SG_TABLESIZE(0xffffffffffffffff, 0x227a, 0x0) [ 319.053163][ T23] audit: type=1400 audit(1677995053.135:385): avc: denied { accept } for pid=16915 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 05:44:13 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0), 0x0, 0x0) ioctl$SG_GET_SG_TABLESIZE(r0, 0x2272, 0x0) 05:44:13 executing program 0: r0 = socket(0x21, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, 0x0) 05:44:13 executing program 3: bpf$PROG_LOAD(0x13, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:44:13 executing program 1: socketpair(0x30, 0x0, 0x0, &(0x7f0000000040)) 05:44:13 executing program 4: r0 = syz_open_dev$sg(&(0x7f00000000c0), 0x0, 0x0) ioctl$SG_GET_SG_TABLESIZE(r0, 0x2285, 0x0) 05:44:13 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0), 0x0, 0x0) ioctl$SG_GET_SG_TABLESIZE(r0, 0x2283, 0x0) 05:44:13 executing program 2: syz_emit_ethernet(0x68, &(0x7f0000000500)={@broadcast, @link_local={0x17, 0x80, 0xc2, 0x0, 0x5}, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x32, 0x3a, 0x0, @dev, @mcast2, {[], @time_exceed={0x3, 0x0, 0x0, 0x0, '\x00', {0x0, 0x6, "2aec28", 0x0, 0x2b, 0x0, @private1, @loopback, [], "a6bb"}}}}}}}, 0x0) 05:44:13 executing program 1: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x48001000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x86000, 0x0, 0x0, 0x0, 0x0, 0x0) 05:44:13 executing program 0: syz_open_procfs(0x0, &(0x7f0000000480)='timers\x00') 05:44:13 executing program 4: eventfd2(0x0, 0x180001) 05:44:13 executing program 5: fdatasync(0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='blkio.bfq.io_merged_recursive\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[], 0x208e24b) fsetxattr$system_posix_acl(r0, &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000140)={{}, {0x1, 0x3}, [{0x2, 0x1}, {}, {0x2, 0x6}, {0x2, 0x1}], {0x4, 0x6}}, 0x44, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) [ 319.293287][ T23] audit: type=1400 audit(1677995053.375:386): avc: denied { ioctl } for pid=16920 comm="syz-executor.0" path="socket:[60458]" dev="sockfs" ino=60458 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 05:44:13 executing program 2: syz_emit_ethernet(0x68, &(0x7f0000000500)={@broadcast, @link_local={0x17, 0x80, 0xc2, 0x0, 0x5}, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x32, 0x3a, 0x0, @dev, @mcast2, {[], @time_exceed={0x3, 0x0, 0x0, 0x0, '\x00', {0x0, 0x6, "2aec28", 0x0, 0x2b, 0x0, @private1, @loopback, [], "a6bb"}}}}}}}, 0x0) 05:44:13 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='blkio.bfq.io_merged_recursive\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[], 0x208e24b) fsetxattr$system_posix_acl(r0, &(0x7f00000000c0)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.io_service_bytes_recursive\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r1, 0x0) 05:44:13 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:44:13 executing program 3: r0 = socket(0x21, 0x2, 0x2) setsockopt$inet_msfilter(r0, 0x110, 0x3, 0x0, 0x0) 05:44:13 executing program 2: syz_emit_ethernet(0x68, &(0x7f0000000500)={@broadcast, @link_local={0x17, 0x80, 0xc2, 0x0, 0x5}, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x32, 0x3a, 0x0, @dev, @mcast2, {[], @time_exceed={0x3, 0x0, 0x0, 0x0, '\x00', {0x0, 0x6, "2aec28", 0x0, 0x2b, 0x0, @private1, @loopback, [], "a6bb"}}}}}}}, 0x0) 05:44:13 executing program 0: r0 = socket(0x21, 0x2, 0x2) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r0) 05:44:13 executing program 0: bpf$PROG_LOAD(0x11, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:44:13 executing program 3: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000280)={0x0, 0x0, 0x260000}, 0x20) 05:44:14 executing program 1: r0 = socket(0x21, 0x2, 0x2) setsockopt$inet_msfilter(r0, 0x0, 0x29, 0x0, 0x0) 05:44:14 executing program 2: syz_emit_ethernet(0x68, &(0x7f0000000500)={@broadcast, @link_local={0x17, 0x80, 0xc2, 0x0, 0x5}, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x32, 0x3a, 0x0, @dev, @mcast2, {[], @time_exceed={0x3, 0x0, 0x0, 0x0, '\x00', {0x0, 0x6, "2aec28", 0x0, 0x2b, 0x0, @private1, @loopback, [], "a6bb"}}}}}}}, 0x0) 05:44:14 executing program 3: r0 = socket(0x18, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0xb101, 0x0) 05:44:14 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x7ffffffff000) 05:44:14 executing program 4: prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f0000ffc000/0x2000)=nil, 0xffffff5b, &(0x7f00000000c0)=' \x00\x00\x00\x00/\x89u\xfc1\x14N1\x9ca+\t\xad^\xd2\b\xe4\x0eqh\x91b\x12\x12\xb6\x90\xa3\xde\x9ad\x1b\x1b<\xaa\x8d\x14\x05UhQ\x02\bW\x95\xf7S\xeeY\x9dE\xf0\xd4@r1\xa6\x1d)2E\x918V\xfc\x1f\xdfX/\xf6\x833RB\x02\x00 v\xa1v=\x85x\xdd\x84\x85\x01\x93\xfb\x044\xf2X\xedK\x1a\xa1\x8cp`\x8a=\xf7!\xf6/y\x17\x01m\x05[\x0e\xa2n\x7f\xc9\x9dG\xee\xbe\x0f\x850\x88u_\x90\fl\x87\xc5\f:&\xbfN\xb2?\xf3N\xd8-r\x87\xfc\xa0\x18^0;tD\x89\x98\xc8d\x81\xf6T<\x1f2\x8f\xa3\x90H\xe8w\x02f\xff\xaf\x131\x15ia\xb6%\xab\x1f\xedzGPx\xac\xc1\xb3\r\xf8\xba\xe1') 05:44:14 executing program 5: fdatasync(0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='blkio.bfq.io_merged_recursive\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[], 0x208e24b) fsetxattr$system_posix_acl(r0, &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000140)={{}, {0x1, 0x3}, [{0x2, 0x1}, {}, {0x2, 0x6}, {0x2, 0x1}], {0x4, 0x6}}, 0x44, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) 05:44:14 executing program 3: socketpair(0x18, 0x0, 0x4, &(0x7f0000000400)) 05:44:14 executing program 4: bpf$PROG_LOAD(0xa, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:44:14 executing program 0: r0 = syz_open_dev$sg(&(0x7f00000000c0), 0x0, 0x0) ioctl$SG_GET_SG_TABLESIZE(r0, 0x2202, 0x0) 05:44:14 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) 05:44:14 executing program 3: r0 = socket(0x18, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x4008b100, 0x0) 05:44:14 executing program 4: r0 = socket$inet(0x2, 0x3, 0x101) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000280)={'tunl0\x00', &(0x7f00000002c0)=ANY=[]}) 05:44:14 executing program 1: bpf$PROG_LOAD(0x1e, 0x0, 0x0) 05:44:14 executing program 0: bpf$PROG_LOAD(0x1e, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:44:14 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) 05:44:14 executing program 4: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='net/llc/core\x00') 05:44:14 executing program 3: r0 = socket(0x21, 0x2, 0x2) setsockopt$inet_msfilter(r0, 0x110, 0x4, 0x0, 0x0) 05:44:14 executing program 5: r0 = socket(0x2b, 0x1, 0x1) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, 0x0, 0x0) 05:44:14 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) 05:44:14 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0x288080, 0x0) mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000100)={0x10000a, 0x0, 0x0, {r0}}, 0x20) 05:44:14 executing program 1: r0 = syz_open_dev$sg(&(0x7f00000000c0), 0x0, 0x0) ioctl$SG_GET_VERSION_NUM(r0, 0x2282, &(0x7f0000000080)) 05:44:14 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000140), 0x0, 0x141200) read$eventfd(r0, 0x0, 0x0) 05:44:14 executing program 3: bpf$PROG_LOAD(0x11, 0x0, 0x0) 05:44:14 executing program 2: syz_emit_ethernet(0x68, &(0x7f0000000500)={@broadcast, @link_local={0x17, 0x80, 0xc2, 0x0, 0x5}, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x32, 0x3a, 0x0, @dev, @mcast2, {[], @time_exceed={0x3, 0x0, 0x0, 0x0, '\x00', {0x0, 0x6, "2aec28", 0x0, 0x0, 0x0, @private1, @loopback, [], "a6bb"}}}}}}}, 0x0) 05:44:14 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x1000000, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:44:14 executing program 3: r0 = socket(0x21, 0x2, 0x2) accept$inet(r0, 0x0, 0x0) 05:44:14 executing program 4: sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x0, 0x701, 0x0, 0x0, {0x6}}, 0x14}}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x1c, r1, 0x701, 0x0, 0x0, {0x6}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 05:44:14 executing program 0: bpf$PROG_LOAD(0x12, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:44:14 executing program 1: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f0000000100)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00'}, 0x10) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) 05:44:14 executing program 5: r0 = socket(0x18, 0x0, 0x1) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x111, 0x6b, 0x0, 0x0) 05:44:14 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000140), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x1, 0x3, &(0x7f0000000180)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x80) 05:44:14 executing program 4: sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x0, 0x701, 0x0, 0x0, {0x6}}, 0x14}}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x1c, r1, 0x701, 0x0, 0x0, {0x6}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) [ 320.378725][ T23] audit: type=1400 audit(1677995054.455:387): avc: denied { accept } for pid=17017 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 05:44:14 executing program 3: r0 = socket(0x21, 0x2, 0x2) accept$inet(r0, 0x0, 0x0) 05:44:14 executing program 2: syz_emit_ethernet(0x68, &(0x7f0000000500)={@broadcast, @link_local={0x17, 0x80, 0xc2, 0x0, 0x5}, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x32, 0x3a, 0x0, @dev, @mcast2, {[], @time_exceed={0x3, 0x0, 0x0, 0x0, '\x00', {0x0, 0x6, "2aec28", 0x0, 0x0, 0x0, @private1, @loopback, [], "a6bb"}}}}}}}, 0x0) 05:44:14 executing program 1: r0 = socket$inet(0x2, 0x3, 0x101) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000280)={'tunl0\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB='tunl0\x00'/16, @ANYRES32, @ANYBLOB="87098000000000010000000840e3008000670000202f"]}) 05:44:14 executing program 0: syz_clone(0x80001400, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x0) 05:44:14 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffffffffffff, 0x212e02) 05:44:14 executing program 4: sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x0, 0x701, 0x0, 0x0, {0x6}}, 0x14}}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x1c, r1, 0x701, 0x0, 0x0, {0x6}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 05:44:14 executing program 2: syz_emit_ethernet(0x68, &(0x7f0000000500)={@broadcast, @link_local={0x17, 0x80, 0xc2, 0x0, 0x5}, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x32, 0x3a, 0x0, @dev, @mcast2, {[], @time_exceed={0x3, 0x0, 0x0, 0x0, '\x00', {0x0, 0x6, "2aec28", 0x0, 0x0, 0x0, @private1, @loopback, [], "a6bb"}}}}}}}, 0x0) 05:44:14 executing program 1: r0 = socket(0x18, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'ip6_vti0\x00', 0x0}) 05:44:14 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0), 0x0, 0x0) ioctl$SG_GET_SG_TABLESIZE(r0, 0x227f, 0x0) 05:44:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_msfilter(r0, 0x0, 0x29, 0x0, 0x3ef) 05:44:14 executing program 0: r0 = socket(0x18, 0x0, 0x1) accept$inet(r0, 0x0, 0x0) 05:44:14 executing program 4: sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x0, 0x701, 0x0, 0x0, {0x6}}, 0x14}}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x1c, r1, 0x701, 0x0, 0x0, {0x6}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 05:44:14 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f00000000c0)={{0x3}}) ioctl$SNDRV_TIMER_IOCTL_STOP(r0, 0x40505412) 05:44:14 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000500)={@broadcast, @link_local={0x17, 0x80, 0xc2, 0x0, 0x5}, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x30, 0x3a, 0x0, @dev, @mcast2, {[], @time_exceed={0x3, 0x0, 0x0, 0x0, '\x00', {0x0, 0x6, "2aec28", 0x0, 0x2b, 0x0, @private1, @loopback}}}}}}}, 0x0) 05:44:14 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SET_MACPARAMS(r0, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000840)={&(0x7f00000007c0)={0x14, 0x0, 0x1}, 0x14}}, 0x0) 05:44:14 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 05:44:14 executing program 0: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) capset(&(0x7f00000002c0)={0x19980330, r0}, 0x0) 05:44:14 executing program 4: sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x0, 0x701, 0x0, 0x0, {0x6}}, 0x14}}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) socket(0x1, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x1c, r1, 0x701, 0x0, 0x0, {0x6}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}}, 0x0) 05:44:14 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000500)={@broadcast, @link_local={0x17, 0x80, 0xc2, 0x0, 0x5}, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x30, 0x3a, 0x0, @dev, @mcast2, {[], @time_exceed={0x3, 0x0, 0x0, 0x0, '\x00', {0x0, 0x6, "2aec28", 0x0, 0x2b, 0x0, @private1, @loopback}}}}}}}, 0x0) 05:44:14 executing program 1: mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f00000000c0)={0x100073, 0x8}, 0x20) 05:44:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @dev}, {0x0, @local}, 0x68, {0x2, 0x0, @empty}, 'macvlan1\x00'}) 05:44:14 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000980), 0x4) 05:44:14 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000001680)={&(0x7f0000001540), 0xc, &(0x7f0000001640)={&(0x7f00000015c0)={0x14}, 0x14}}, 0x20040040) 05:44:14 executing program 4: sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x0, 0x701, 0x0, 0x0, {0x6}}, 0x14}}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) socket(0x1, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x1c, r1, 0x701, 0x0, 0x0, {0x6}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}}, 0x0) 05:44:14 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f00000000c0)={{0x3}}) ioctl$SNDRV_TIMER_IOCTL_STOP(r0, 0x5420) ioctl$SNDRV_TIMER_IOCTL_STOP(r0, 0x5423) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) 05:44:14 executing program 3: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000040), 0x8) [ 320.602833][T17066] capability: warning: `syz-executor.0' uses 32-bit capabilities (legacy support in use) 05:44:14 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000500)={@broadcast, @link_local={0x17, 0x80, 0xc2, 0x0, 0x5}, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x30, 0x3a, 0x0, @dev, @mcast2, {[], @time_exceed={0x3, 0x0, 0x0, 0x0, '\x00', {0x0, 0x6, "2aec28", 0x0, 0x2b, 0x0, @private1, @loopback}}}}}}}, 0x0) 05:44:14 executing program 4: sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x0, 0x701, 0x0, 0x0, {0x6}}, 0x14}}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) socket(0x1, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x1c, r1, 0x701, 0x0, 0x0, {0x6}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}}, 0x0) 05:44:14 executing program 0: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) capset(&(0x7f00000002c0)={0x19980330, r0}, 0x0) 05:44:14 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f00000000c0)={{0x0, 0x1}}) ioctl$SNDRV_TIMER_IOCTL_INFO(r0, 0x80e85411, 0x0) 05:44:14 executing program 3: futex(&(0x7f0000000600), 0x4, 0x0, 0x0, 0x0, 0x0) 05:44:14 executing program 2: syz_emit_ethernet(0x67, &(0x7f0000000500)={@broadcast, @link_local={0x17, 0x80, 0xc2, 0x0, 0x5}, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x31, 0x3a, 0x0, @dev, @mcast2, {[], @time_exceed={0x3, 0x0, 0x0, 0x0, '\x00', {0x0, 0x6, "2aec28", 0x0, 0x2b, 0x0, @private1, @loopback, [], "a6"}}}}}}}, 0x0) [ 320.681102][ T23] audit: type=1400 audit(1677995054.765:388): avc: denied { read } for pid=17083 comm="syz-executor.3" name="nvram" dev="devtmpfs" ino=98 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nvram_device_t tclass=chr_file permissive=1 05:44:14 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f00000000c0)={{0x0, 0x1}}) ioctl$SNDRV_TIMER_IOCTL_INFO(r0, 0x80e85411, 0x0) 05:44:14 executing program 0: syz_open_procfs$namespace(0x0, &(0x7f0000003b00)='ns/pid\x00') 05:44:14 executing program 4: sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x0, 0x701, 0x0, 0x0, {0x6}}, 0x14}}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x1c, r1, 0x701, 0x0, 0x0, {0x6}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}]}, 0x1c}}, 0x0) 05:44:14 executing program 3: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f00000000c0)={{0x1, 0x0, 0x0, 0x3}}) ioctl$SNDRV_TIMER_IOCTL_STOP(r0, 0x5420) 05:44:14 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f00000000c0)={{0x3}}) ioctl$SNDRV_TIMER_IOCTL_STOP(r0, 0x5420) ioctl$SNDRV_TIMER_IOCTL_STOP(r0, 0x5423) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) 05:44:14 executing program 4: sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x0, 0x701, 0x0, 0x0, {0x6}}, 0x14}}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x1c, r1, 0x701, 0x0, 0x0, {0x6}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}]}, 0x1c}}, 0x0) 05:44:14 executing program 2: syz_emit_ethernet(0x67, &(0x7f0000000500)={@broadcast, @link_local={0x17, 0x80, 0xc2, 0x0, 0x5}, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x31, 0x3a, 0x0, @dev, @mcast2, {[], @time_exceed={0x3, 0x0, 0x0, 0x0, '\x00', {0x0, 0x6, "2aec28", 0x0, 0x2b, 0x0, @private1, @loopback, [], "a6"}}}}}}}, 0x0) 05:44:14 executing program 1: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x4c, 0x15, 0x1, 0x0, 0x0, {0xa}}, 0x4c}}, 0x0) 05:44:14 executing program 3: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080), 0x20e482, 0x0) [ 320.771488][ T23] audit: type=1400 audit(1677995054.795:389): avc: denied { open } for pid=17083 comm="syz-executor.3" path="/dev/nvram" dev="devtmpfs" ino=98 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nvram_device_t tclass=chr_file permissive=1 05:44:14 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f00000000c0)={{0x3}}) ioctl$SNDRV_TIMER_IOCTL_STOP(r0, 0x5420) ioctl$SNDRV_TIMER_IOCTL_STOP(r0, 0x5423) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) 05:44:14 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$P9_RSYMLINK(0xffffffffffffffff, 0x0, 0x0) getegid() syz_open_procfs$namespace(0x0, 0x0) syz_usbip_server_init(0x2) 05:44:14 executing program 2: syz_emit_ethernet(0x67, &(0x7f0000000500)={@broadcast, @link_local={0x17, 0x80, 0xc2, 0x0, 0x5}, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x31, 0x3a, 0x0, @dev, @mcast2, {[], @time_exceed={0x3, 0x0, 0x0, 0x0, '\x00', {0x0, 0x6, "2aec28", 0x0, 0x2b, 0x0, @private1, @loopback, [], "a6"}}}}}}}, 0x0) 05:44:14 executing program 4: sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x0, 0x701, 0x0, 0x0, {0x6}}, 0x14}}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x1c, r1, 0x701, 0x0, 0x0, {0x6}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}]}, 0x1c}}, 0x0) 05:44:14 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$SOCK_DESTROY(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x20, 0x11, 0x1, 0x0, 0x0, {}, [@INET_DIAG_REQ_BYTECODE={0x9, 0x1, "4d956926f1"}]}, 0x20}}, 0x0) 05:44:14 executing program 4: sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x0, 0x701, 0x0, 0x0, {0x6}}, 0x14}}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x1c, 0x0, 0x701, 0x0, 0x0, {0x6}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}]}, 0x1c}}, 0x0) 05:44:15 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) sendmsg$SOCK_DESTROY(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x18, 0x10, 0x0, 0x0, 0x0, {}, [@INET_DIAG_REQ_BYTECODE={0x4}]}, 0x18}}, 0x0) 05:44:15 executing program 1: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, 0x0) 05:44:15 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f00000000c0)={{0x3}}) ioctl$SNDRV_TIMER_IOCTL_STOP(r0, 0x5420) ioctl$SNDRV_TIMER_IOCTL_STOP(r0, 0x5423) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) 05:44:15 executing program 1: bpf$BPF_MAP_GET_FD_BY_ID(0x16, &(0x7f0000000140)={0x0, 0x0, 0x18}, 0xc) 05:44:15 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:44:15 executing program 4: sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x0, 0x701, 0x0, 0x0, {0x6}}, 0x14}}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x1c, 0x0, 0x701, 0x0, 0x0, {0x6}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}]}, 0x1c}}, 0x0) 05:44:15 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0xc0145401, &(0x7f00000000c0)={{0x1}}) [ 320.912916][T17126] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(4) [ 320.919499][T17126] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 320.927249][T17126] vhci_hcd vhci_hcd.0: Device attached [ 320.941798][T17140] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 320.987663][T17130] vhci_hcd: connection closed [ 320.987864][ T8] vhci_hcd: stop threads [ 320.996876][ T8] vhci_hcd: release socket [ 321.001382][ T8] vhci_hcd: disconnect device 05:44:15 executing program 0: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x4c, 0x12, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, {0x0, 0x0, [0xfffffffc]}}}, 0x4c}}, 0x0) 05:44:15 executing program 1: openat$tun(0xffffffffffffff9c, &(0x7f0000000500), 0x1c5c01, 0x0) 05:44:15 executing program 3: rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000080)={0x77359400}, 0x8) 05:44:15 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$SOCK_DESTROY(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, 0x1c, 0x1}, 0x14}}, 0x0) 05:44:15 executing program 4: sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x0, 0x701, 0x0, 0x0, {0x6}}, 0x14}}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x1c, 0x0, 0x701, 0x0, 0x0, {0x6}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}]}, 0x1c}}, 0x0) 05:44:15 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x800448d4, &(0x7f0000000140)) 05:44:15 executing program 0: mknod$loop(&(0x7f0000000a00)='./file0\x00', 0x0, 0x1) utime(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) 05:44:15 executing program 2: futex(&(0x7f0000000600)=0x2, 0x4, 0x0, 0x0, &(0x7f00000006c0), 0x2) 05:44:15 executing program 1: syz_open_dev$evdev(&(0x7f0000000080), 0x7a01, 0x4240) 05:44:15 executing program 5: shmget$private(0x0, 0x2000, 0x8, &(0x7f0000ffe000/0x2000)=nil) 05:44:15 executing program 0: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f00000000c0)={{0x3}}) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r0, 0x80e85411, &(0x7f0000000180)) 05:44:15 executing program 4: sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x0, 0x701, 0x0, 0x0, {0x6}}, 0x14}}, 0x0) r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x1c, r0, 0x701, 0x0, 0x0, {0x6}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}]}, 0x1c}}, 0x0) 05:44:15 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0xc0145401, &(0x7f0000000400)) 05:44:15 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f00000000c0)={{0x3}}) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r0, 0x80605414, &(0x7f0000000180)) [ 321.508777][ T23] audit: type=1400 audit(1677995055.585:390): avc: denied { ioctl } for pid=17157 comm="syz-executor.5" path="socket:[61697]" dev="sockfs" ino=61697 ioctlcmd=0x48d4 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 05:44:16 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xc) sendmsg$SOCK_DESTROY(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x14, 0x10}, 0x14}}, 0x0) 05:44:16 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$SOCK_DESTROY(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x18, 0x15, 0x1, 0x0, 0x0, {0x2}, [@INET_DIAG_REQ_BYTECODE={0x4, 0x38}]}, 0x18}}, 0x0) 05:44:16 executing program 5: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080), 0x940, 0x0) 05:44:16 executing program 0: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40505412, 0x0) 05:44:16 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f00000000c0)={{0x3}}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x3}}) 05:44:16 executing program 4: sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x0, 0x701, 0x0, 0x0, {0x6}}, 0x14}}, 0x0) r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x1c, r0, 0x701, 0x0, 0x0, {0x6}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}]}, 0x1c}}, 0x0) 05:44:16 executing program 4: sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x0, 0x701, 0x0, 0x0, {0x6}}, 0x14}}, 0x0) r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x1c, r0, 0x701, 0x0, 0x0, {0x6}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}]}, 0x1c}}, 0x0) 05:44:16 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$SOCK_DESTROY(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, 0x21, 0x1}, 0x14}}, 0x0) 05:44:16 executing program 5: socketpair(0xf, 0x0, 0x0, &(0x7f0000000b40)) 05:44:16 executing program 2: openat$full(0xffffffffffffff9c, &(0x7f0000001fc0), 0x200242, 0x0) 05:44:16 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f00000000c0)={{0x3}}) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r0, 0x40505412, &(0x7f0000000180)) 05:44:16 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x6) sendmsg$SOCK_DESTROY(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, 0x12, 0x1}, 0x14}}, 0x0) 05:44:16 executing program 3: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) 05:44:16 executing program 5: futex(0x0, 0x0, 0x0, 0x0, &(0x7f0000002c00), 0x0) 05:44:16 executing program 2: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nfc(&(0x7f0000000040), 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 05:44:16 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x1c, r1, 0x701, 0x0, 0x0, {0x6}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 05:44:16 executing program 3: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000), 0x18841, 0x0) 05:44:16 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@local, @dev, @void, {@ipv4={0x800, @tipc={{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @multicast1}, @payload_named={{{{{0x28, 0x0, 0x0, 0x0, 0x0, 0xa}, 0x20020000}, 0x0, 0x400000}}}}}}}, 0x0) 05:44:16 executing program 5: setxattr$incfs_metadata(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000240)=@md0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, &(0x7f0000000300)='/dev/ndctl0\x00') 05:44:16 executing program 1: r0 = creat(&(0x7f0000001180)='./file0\x00', 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000001240)='virtio_transport_recv_pkt\x00', &(0x7f0000001280)='./file1\x00', 0xffffffffffffffff) 05:44:16 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000300)={'sit0\x00', &(0x7f0000000540)=ANY=[@ANYBLOB="69705f76c2a600000000000000", @ANYRES32]}) 05:44:16 executing program 0: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0xc0145401, &(0x7f00000000c0)={{0x1, 0x0, 0x0, 0x3}}) 05:44:16 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x1c, r1, 0x701, 0x0, 0x0, {0x6}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 05:44:16 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) 05:44:16 executing program 3: setxattr$incfs_metadata(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000240)=@md0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0) 05:44:16 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) fallocate(r0, 0xb, 0x0, 0x100000001) 05:44:16 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYRESDEC], 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000000)) 05:44:16 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x1c, r1, 0x701, 0x0, 0x0, {0x6}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 05:44:16 executing program 3: openat$pfkey(0xffffffffffffff9c, 0x0, 0x67f9353711474578, 0x0) 05:44:16 executing program 5: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @hyper}, 0x10) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000080)=0x100000000, 0x8) 05:44:16 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x1, 0x4, &(0x7f00000000c0)=@framed={{}, [@jmp={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0x4}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:44:16 executing program 1: setsockopt$MRT_DEL_MFC_PROXY(0xffffffffffffffff, 0x0, 0xd3, &(0x7f0000000000)={@multicast2, @multicast2, 0x0, "a1622eb938394ac96344a0842b5d0879ff47e8d8c1faf9aeb7d45e000000ff01"}, 0xfffffffffffffe88) 05:44:16 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) fallocate(r0, 0xa, 0x0, 0x23) 05:44:16 executing program 5: mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)='/dev/ndctl0\x00') 05:44:16 executing program 4: sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x1c, r1, 0x701, 0x0, 0x0, {0x6}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 05:44:16 executing program 3: r0 = syz_usbip_server_init(0x5) ioctl$FIOCLEX(r0, 0x5451) 05:44:16 executing program 0: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000bc0)='/sys/bus/pci', 0xd58b075f8f312b85, 0x0) 05:44:16 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) connect$netlink(r0, &(0x7f0000000000)=@kern={0x10, 0x0, 0x0, 0x80000000}, 0xc) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000000c0)=0x1f, 0x4) sendmsg$SOCK_DESTROY(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, 0x26, 0x1}, 0x14}}, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz1\x00', 0x1ff) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000500), 0x6c8940) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f00000000c0)) sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000180)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRESDEC=r1, @ANYBLOB="20002cbd7000fbdbdf250f0000000800040002000000080005001f0000004c000180070006006c630000080005000200000008000b00736970000800080000020000080009007a0000000800050001000000060004004e23000008000b0073697000060001000200000008000400ff0f00000800050008000000"], 0x80}, 0x1, 0x0, 0x0, 0x40041}, 0x5) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_DEL_SERVICE(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) pipe2(&(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) move_mount(r3, &(0x7f0000000b00)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000b40)='./file0/file0\x00', 0x24) pipe2(&(0x7f00000004c0)={0xffffffffffffffff}, 0x800) ioctl$EVIOCGREP(r4, 0x80084503, &(0x7f00000009c0)=""/246) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000540)) getsockopt$netlink(r2, 0x10e, 0x3, &(0x7f0000000400)=""/100, &(0x7f0000000480)=0x64) setxattr$trusted_overlay_nlink(&(0x7f0000000280)='./file0/file0\x00', &(0x7f00000001c0), &(0x7f0000000200)={'L-', 0x9}, 0x16, 0x3) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f00000002c0), r5) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r5, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x48, r6, 0x100, 0x70bd27, 0x25dfdbff, {}, [@NL802154_ATTR_WPAN_PHY={0x8}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_PHY={0x8}, @NL802154_ATTR_NETNS_FD={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x48}, 0x1, 0x0, 0x0, 0x4004080}, 0x0) write$bt_hci(r4, &(0x7f0000000580)={0x1, @write_page_scan_activity={{0xc1c, 0x4}, {0x8001, 0xfff}}}, 0x8) sendmsg$NL802154_CMD_SET_PAN_ID(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r6, 0x100, 0x70bd2b, 0x25dfdbfd, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40000}, 0x24040080) 05:44:16 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x3}, 0x48) 05:44:16 executing program 4: sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x1c, r1, 0x701, 0x0, 0x0, {0x6}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 05:44:16 executing program 0: sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, 0x0, 0x0) 05:44:16 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) fallocate(r0, 0x0, 0x0, 0x100000001) 05:44:16 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5}, 0x48) 05:44:16 executing program 1: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) 05:44:16 executing program 2: utimes(0x0, 0x0) setxattr$trusted_overlay_redirect(0x0, &(0x7f0000000040), 0x0, 0x0, 0x0) 05:44:16 executing program 5: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000140), 0xffffffffffffffff) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r4, 0x8933, &(0x7f0000000080)={'wg0\x00', 0x0}) sendmsg$WG_CMD_SET_DEVICE(r2, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000d00)={&(0x7f00000005c0)={0x24, r3, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_FLAGS={0x8, 0x5, 0x1}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r5}]}, 0x24}}, 0x0) 05:44:16 executing program 0: r0 = epoll_create1(0x0) fcntl$lock(r0, 0x26, &(0x7f00000011c0)={0x2, 0x0, 0x0, 0x40}) [ 322.667304][T17262] vhci_hcd vhci_hcd.0: pdev(3) rhport(0) sockfd(3) [ 322.673897][T17262] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 322.681713][T17262] vhci_hcd vhci_hcd.0: Device attached [ 322.690044][T17263] vhci_hcd: connection closed [ 322.694573][ T35] vhci_hcd: stop threads [ 322.703576][ T35] vhci_hcd: release socket [ 322.708071][ T35] vhci_hcd: disconnect device 05:44:17 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x7, 0x4, &(0x7f0000000040)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xae}]}, &(0x7f0000000180)='syzkaller\x00', 0x4, 0xaa, &(0x7f0000000080)=""/170, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:44:17 executing program 4: sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x1c, r1, 0x701, 0x0, 0x0, {0x6}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 05:44:17 executing program 1: openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) getresuid(&(0x7f0000000d80), &(0x7f0000000dc0), &(0x7f0000000e00)) 05:44:17 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x7, 0x4, &(0x7f0000000040)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f0000000180)='syzkaller\x00', 0x4, 0xaa, &(0x7f0000000080)=""/170, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:44:17 executing program 0: ppoll(0x0, 0x0, &(0x7f0000002c80), &(0x7f0000002cc0), 0x8) 05:44:17 executing program 5: pipe2(&(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) connect$packet(r0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="86000021801c"}, 0xfffffffffffffe22) 05:44:17 executing program 0: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x4400, &(0x7f0000000000)={[{@inode_readahead_blks}, {@block_validity}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x66}}, {@errors_remount}, {@nobh}, {@quota}]}, 0x1, 0x41f, &(0x7f00000004c0)="$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") 05:44:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x4400, &(0x7f0000000000)={[{@inode_readahead_blks}, {@block_validity}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x66}}, {@errors_remount}, {@nobh}, {@quota}]}, 0x1, 0x41f, &(0x7f00000004c0)="$eJzs289rHFUcAPDvTJJWW9vEWn/0h7paxeCPpEmr9uBFUfCgIOihHmOSlthtI00EW4JGkXqUgnfxKPgXeNKLqCfBq96lUCSXVk8rszuTbDe7MT823eh8PjDkvZ0X3vvOm7f75r3dAEqrEhH7I+KuiPgtIgYjImktUGn8ubm0MPnX0sJkErXam38m9XI3lhYmi6LF/+3NM8NpRPppEkfa1Dt36fK5iWp1+mKeH50//97o3KXLz8ycnzg7fXb6wvipUydPjD3/3PizXYkzi+vG4Q9njx569e2rr0+evvrOT98kedzREke3VKJy67Vs8ni3K+uxfU3ppL+HDWFD0ojIumugPv4Hoy9WOm8wXvmkp40DtlWtVqvt7nx6sQb8jyXR6xYAvVF80GfPv8Vxm6YeO8L1FxsPQFncN/Ojcaa//mwU+bPRvm2qvxIRpxf//jI7YpvWIQAAmn2XzX+ebjf/S+O+pnL78z2UoYi4OyIORMQ9EXEwIu6NqJe9PyIe2GD9lZb86vlPem1Tga1TNv97Id/bunX+V8z+Yqgvz+2rxz+QnJmpTh/Pr8lwDOzO8mNr1PH9y79+3ulc8/wvO7L6i7lg3o5r/S0LdFMT8xNbibnZ9Y8jDve3iz9Z3glIIuJQRBzeZB0zT359tNO5f49/DV3YZ6p9FfFEo/8XoyX+QrL2/uToHVGdPj5a3BWr/fzLlTc61b+l+Lsg6/89be//5fiHkub92rmN13Hl9886PtMMbvL+35W8VU/vyl/7YGJ+/uJYxK7ktdWvj6/8b5EvymfxDx9rP/4PxMqVOBIR2U38YEQ8FBEP5333SEQ8GhHH1oj/x5cee7fTuZ3Q/1Mb6v+NJ/rO/fBtp/rX9/53sp4azl9Zz/vfehu4lWsHAAAA/xVp/TvwSTqynE7TkZHGd/gPxp60Ojs3/9SZ2fcvTDW+Kz8UA2mx0jXYtB46lq8NF/nxlvyJfN34i7476/mRydnqVK+Dh5Lb22H8Z/7o63XrgG3n91pQXsY/lJfxD+Vl/EN5Gf9QXu3G/0c9aAdw+/n8h/Iy/qG8jH8oL+MfSmkrv+uXKHMi0h3RDIltSvT6nQkAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAKA7/gkAAP//oaXmfA==") 05:44:17 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1b, 0x0, 0x0, 0x2000000}, 0x48) 05:44:17 executing program 1: io_setup(0x4, &(0x7f0000000000)=0x0) mlockall(0x1) io_setup(0x0, 0x0) io_destroy(r0) 05:44:17 executing program 4: sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x1c, r1, 0x701, 0x0, 0x0, {0x6}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 05:44:17 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x60}]}) 05:44:17 executing program 4: sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x1c, r1, 0x701, 0x0, 0x0, {0x6}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 05:44:17 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000a0db000000000000000000850000000e000000c50000002a00000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000080)='sys_enter\x00', r0}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000280)) [ 323.253052][T17298] loop0: detected capacity change from 0 to 512 [ 323.255854][T17297] loop5: detected capacity change from 0 to 512 [ 323.287407][T17298] EXT4-fs: Ignoring removed nobh option 05:44:17 executing program 4: sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x1c, r1, 0x701, 0x0, 0x0, {0x6}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 05:44:17 executing program 3: bpf$MAP_CREATE(0x2, 0x0, 0x4a) 05:44:17 executing program 2: timer_create(0x7, &(0x7f00000003c0)={0x0, 0x0, 0x1, @thr={0x0, 0x0}}, &(0x7f0000000400)) timer_settime(0x0, 0x0, &(0x7f0000000440)={{0x0, 0x989680}, {0x0, 0x3938700}}, &(0x7f0000000480)) [ 323.303473][T17297] EXT4-fs: Ignoring removed nobh option [ 323.311342][T17298] EXT4-fs (loop0): bad geometry: first data block is 0 with a 1k block and cluster size [ 323.318060][T17297] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 323.332164][T17297] EXT4-fs (loop5): group descriptors corrupted! 05:44:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x11, 0x483, 0x0, 0x0) 05:44:17 executing program 0: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x4400, &(0x7f0000000000)={[{@inode_readahead_blks}, {@block_validity}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x66}}, {@errors_remount}, {@nobh}, {@quota}]}, 0x1, 0x41f, &(0x7f00000004c0)="$eJzs289rHFUcAPDvzCaptraJtf5oWnW1isEfSZNW7cGLouBBQdBDPcYkLbHbRpoItgSNIvUoBe/iUfAv8KQXUU+CV71LoUgurZ5WZnc2WTe7MT823dj5fGDIezsvvPedN2/3zXu7ARRWOSIORMRdEfFbRAy2K1Cu/7m5vDj11/LiVBLV6pt/JpFExI3lxalG0ST/uy/PjKQR6adJHGlT7/yly+cmK5WZi3l+bOH8e2Pzly4/M3t+8uzM2ZkLE6dOnTwx/vxzE892Jc4srhvDH84dPfzq21dfnzp99Z2fvknyuKMljm4pR3nlmrR6vNuV9dj+pnTS18OGsCmliMi6q782/gejFKudNxivfNLTxgE7qlqtVvd0Pr1UBW5jSfS6BUBvND7os+ffxnGLph67wvUX6w9AWdw386N+pi/SvEx/y/NtN5Uj4vTS319mR+zQOgQAQLPvsvnP0+3mf2nc11TuQL6HMhQRd0fEwYi4JyIORcS9EbWy90fEA5usv9ySXzv/Sa9tKbANyuZ/L+R7W/+e/zVmfzFUynP7a/H3J2dmKzPH82syEv17svz4OnV8//Kvn3c61zz/y46s/sZcMG/Htb6WBbrpyYXJ7cTc7PrHEcN97eJPVnYCkog4HBHDW6xj9smvj3Y699/xr6ML+0zVryKeqPf/UrTE35Csvz85dkdUZo6PNe6KtX7+5cobnerfVvxdkPX/3rb3/0r8Q0nzfu385uu48vtnHZ9pBrd4/w8kb9XSA/lrH0wuLFwcjxhIXlv7+sTq/zbyjfJZ/CPH2o//g7F6JY5ERHYTPxgRD0XEw3nfPRIRj0bEsXXi//Glx97tdG439P/0pvp/84nSuR++7VT/xt7/TtZSI/krG3n/22gDt3PtAAAA4P8irX0HPklHV9JpOjpa/w7/odibVubmF546M/f+hen6d+WHoj9trHQNNq2Hjudrw438REv+RL5u/EXpzlp+dGquMt3r4KHg9nUY/5k/Sr1uHbDj/F4Lisv4h+Iy/qG4jH8oLuMfiqvd+P+oB+0Abj2f/1Bcxj8Ul/EPxWX8QyFt53f9EkVORLormiGxQ4levzMBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB0xz8BAAD//5255nw=") 05:44:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x4400, &(0x7f0000000000)={[{@inode_readahead_blks}, {@block_validity}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x66}}, {@errors_remount}, {@nobh}, {@quota}]}, 0x1, 0x41f, &(0x7f00000004c0)="$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") 05:44:17 executing program 4: sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x1c, r1, 0x701, 0x0, 0x0, {0x6}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) [ 323.432604][T17316] loop0: detected capacity change from 0 to 512 [ 323.450164][T17316] EXT4-fs: Ignoring removed nobh option [ 323.458062][T17321] loop5: detected capacity change from 0 to 512 [ 323.465589][T17316] EXT4-fs (loop0): bad geometry: first data block is 0 with a 1k block and cluster size [ 323.476725][T17321] EXT4-fs: Ignoring removed nobh option [ 323.484059][T17321] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 5088)! [ 323.494480][T17321] EXT4-fs (loop5): group descriptors corrupted! 05:44:17 executing program 1: msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000080)=""/44) 05:44:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x30, 0x0, 0x0) 05:44:17 executing program 3: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/net\x00') ioctl$NS_GET_PARENT(r0, 0x5452, 0x20000000) 05:44:17 executing program 4: sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x1c, r1, 0x701, 0x0, 0x0, {0x6}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 05:44:17 executing program 0: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x4400, &(0x7f0000000000)={[{@inode_readahead_blks}, {@block_validity}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x66}}, {@errors_remount}, {@nobh}, {@quota}]}, 0x1, 0x41f, &(0x7f00000004c0)="$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") 05:44:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x4400, &(0x7f0000000000)={[{@inode_readahead_blks}, {@block_validity}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x66}}, {@errors_remount}, {@nobh}, {@quota}]}, 0x1, 0x41f, &(0x7f00000004c0)="$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") 05:44:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x4400, &(0x7f0000000000)={[{@inode_readahead_blks}, {@block_validity}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x66}}, {@errors_remount}, {@nobh}, {@quota}]}, 0x1, 0x41f, &(0x7f00000004c0)="$eJzs28tvG0UYAPBv10kLLW1CKY8+AENBRDySJi3QAxcQSBxAQoJDOYYkrUrdBjVBolUFAaFyRJW4I45I/AWc4IKAExJXuKNKFcqlhZPR2ruJ69ghD6cO7O8nrTLjnWjm29mxZ2fsAEqrGhF7I+KuiPgtIoYiImkvUG3+ubl4eeqvxctTSdTrb/6ZNMrdWLw8VRQt/m93nhlJI9JPkzjUod65i5fOTtZqMxfy/Nj8uffG5i5eeubMucnTM6dnzk+cOHH82Pjzz00825M4s7huHPxw9vCBV9+++vrUyavv/PRNkscdbXH0SjWqt17LFo/3urI+29OSTgb62BDWpRIRWXcNNsb/UFRiufOG4pVP+to4YEvV6/X6zu6nF+rA/1gS/W4B0B/FB332/Fsct2nqsS1cf7H5AJTFfTM/mmcGIs3LDLY93/ZSNSJOLvz9ZXbEFq1DAAC0+i6b/zzdaf6Xxn0t5fbmeyjDEXF3ROyLiHsiYn9E3BvRKHt/RDywzvqrbfmV85/02oYCW6Ns/vdCvrd16/yvmP3FcCXP7WnEP5icOlObOZpfk5EY3Jnlx1ep4/uXf/2827nW+V92ZPUXc8G8HdcG2hbopifnJzcTc6vrH0ccHOgUf7K0E5BExIGIOLjBOs48+fXhbuf+Pf5V9GCfqf5VxBPN/l+ItvgLyer7k2N3RG3m6FhxV6z08y9X3uhW/6bi74Gs/3d1vP+X4h9OWvdr59Zfx5XfP+v6TDO0wft/R/JWI70jf+2Dyfn5C+MRO5LXVr4+sfy/Rb4on8U/cqTz+N8Xy1fiUERkN/GDEfFQRDyc990jEfFoRBxZJf4fX3rs3W7ntkP/T6+r/9efqJz94dtu9a/t/e94IzWSv7KW97+1NnAz1w4AAAD+K9LGd+CTdHQpnaajo83v8O+PXWltdm7+qVOz75+fbn5XfjgG02Kla6hlPXQ8Xxsu8hNt+WP5uvEXlTsb+dGp2dp0v4OHktvdZfxn/qj0u3XAlvN7LSgv4x/Ky/iH8jL+obyMfyivTuP/oz60A7j9fP5DeRn/UF7GP5SX8Q+ltJnf9UuUORHptmiGxBYl+v3OBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0Bv/BAAA//+Z4eZ9") openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) 05:44:17 executing program 1: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={0x0}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) 05:44:17 executing program 2: r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0), 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00c9e71410a3308f000800ff88506c00"}) r3 = syz_open_pts(r2, 0x0) read(r3, 0x0, 0x2006) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)) 05:44:17 executing program 4: sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x1c, r1, 0x701, 0x0, 0x0, {0x6}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) [ 323.629962][T17329] loop0: detected capacity change from 0 to 512 [ 323.634848][T17331] loop5: detected capacity change from 0 to 512 [ 323.663149][T17331] EXT4-fs: Ignoring removed nobh option 05:44:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x12, &(0x7f0000000240)={0x0, @remote, 0x0, 0x0, 'lc\x00'}, 0x2c) 05:44:17 executing program 4: sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x0, 0x0, 0x0, 0x0, {0x6}}, 0x14}}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x1c, r1, 0x701, 0x0, 0x0, {0x6}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 05:44:17 executing program 1: io_uring_setup(0x71f9, &(0x7f0000000040)={0x0, 0x0, 0x2}) 05:44:17 executing program 1: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000080)='sys_enter\x00'}, 0x10) getpid() 05:44:17 executing program 4: sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x0, 0x0, 0x0, 0x0, {0x6}}, 0x14}}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x1c, r1, 0x701, 0x0, 0x0, {0x6}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) [ 323.676191][T17338] loop3: detected capacity change from 0 to 512 [ 323.676979][T17331] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 5088)! [ 323.691195][T17329] EXT4-fs: Ignoring removed nobh option [ 323.692845][T17331] EXT4-fs (loop5): group descriptors corrupted! [ 323.700079][T17338] EXT4-fs: Ignoring removed nobh option [ 323.714018][T17329] EXT4-fs (loop0): bad geometry: first data block is 0 with a 1k block and cluster size 05:44:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x4400, &(0x7f0000000000)={[{@inode_readahead_blks}, {@block_validity}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x66}}, {@errors_remount}, {@nobh}, {@quota}]}, 0x1, 0x41f, &(0x7f00000004c0)="$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") [ 323.759631][T17338] EXT4-fs error (device loop3): ext4_orphan_get:1392: inode #15: comm syz-executor.3: iget: bad extra_isize 15 (inode size 256) [ 323.796653][T17338] EXT4-fs (loop3): Remounting filesystem read-only 05:44:17 executing program 0: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x4400, &(0x7f0000000000)={[{@inode_readahead_blks}, {@block_validity}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x66}}, {@errors_remount}, {@nobh}, {@quota}]}, 0x1, 0x41f, &(0x7f00000004c0)="$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") 05:44:17 executing program 2: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x4400, &(0x7f0000000000)={[{@inode_readahead_blks}, {@block_validity}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x66}}, {@errors_remount}, {@nobh}, {@quota}]}, 0x1, 0x41f, &(0x7f00000004c0)="$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") [ 323.803474][T17338] EXT4-fs error (device loop3): ext4_orphan_get:1397: comm syz-executor.3: couldn't read orphan inode 15 (err -117) [ 323.827117][T17360] loop2: detected capacity change from 0 to 512 [ 323.837510][T17362] loop5: detected capacity change from 0 to 512 [ 323.841870][T17363] loop0: detected capacity change from 0 to 512 [ 323.845480][T17360] EXT4-fs: Ignoring removed nobh option 05:44:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x4400, &(0x7f0000000000)={[{@inode_readahead_blks}, {@block_validity}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x66}}, {@errors_remount}, {@nobh}, {@quota}]}, 0x1, 0x41f, &(0x7f00000004c0)="$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") openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) 05:44:17 executing program 4: sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x0, 0x0, 0x0, 0x0, {0x6}}, 0x14}}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x1c, r1, 0x701, 0x0, 0x0, {0x6}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 05:44:17 executing program 1: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/pid\x00') ioctl$NS_GET_PARENT(r0, 0x5460, 0xc009a854760000) [ 323.851713][T17363] EXT4-fs: Ignoring removed nobh option [ 323.857810][T17362] EXT4-fs: Ignoring removed nobh option [ 323.862456][T17338] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. [ 323.867068][T17362] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 5088)! [ 323.889405][T17362] EXT4-fs (loop5): group descriptors corrupted! [ 323.894534][T17360] EXT4-fs error (device loop2): ext4_orphan_get:1392: inode #15: comm syz-executor.2: iget: bad extra_isize 15 (inode size 256) 05:44:18 executing program 4: sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x0, 0x701, 0x0, 0x0, {0x6}}, 0x14}}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x1c, r1, 0x701, 0x0, 0x0, {0x6}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 05:44:18 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x0, 0x0, 0x0, 0x0, 0x1fe, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) [ 323.895672][T17363] EXT4-fs (loop0): bad geometry: first data block is 0 with a 1k block and cluster size [ 323.918879][ T23] audit: type=1400 audit(1677995057.995:391): avc: denied { ioctl } for pid=17367 comm="syz-executor.1" path="pid:[4026532373]" dev="nsfs" ino=4026532373 ioctlcmd=0x5460 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 323.934540][ T3150] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 323.953444][T17360] EXT4-fs (loop2): Remounting filesystem read-only 05:44:18 executing program 4: sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x0, 0x701, 0x0, 0x0, {0x6}}, 0x14}}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x1c, r1, 0x701, 0x0, 0x0, {0x6}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 05:44:18 executing program 1: syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) io_setup(0xffff, &(0x7f0000000040)) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) 05:44:18 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000440)=@nat={'nat\x00', 0x19, 0x2, 0x90, [0x20000080], 0x0, 0x0, &(0x7f0000000080)=[{}, {}, {0x0, '\x00', 0x2}]}, 0x108) 05:44:18 executing program 4: sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x0, 0x701, 0x0, 0x0, {0x6}}, 0x14}}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x1c, r1, 0x701, 0x0, 0x0, {0x6}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 05:44:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x4400, &(0x7f0000000000)={[{@inode_readahead_blks}, {@block_validity}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x66}}, {@errors_remount}, {@nobh}, {@quota}]}, 0x1, 0x41f, &(0x7f00000004c0)="$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") 05:44:18 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x2) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) write$P9_RLINK(r3, &(0x7f0000000040)={0x7, 0x47, 0x2}, 0x7) r4 = ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r6 = ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r6) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r4) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) [ 323.960288][T17360] EXT4-fs error (device loop2): ext4_orphan_get:1397: comm syz-executor.2: couldn't read orphan inode 15 (err -117) [ 323.980178][T17360] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. 05:44:18 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000030000000000000000000000850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r0}, 0x10) msgget(0x3, 0x0) [ 324.034811][ T3154] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 324.044211][T17381] loop5: detected capacity change from 0 to 512 [ 324.046121][T17378] loop3: detected capacity change from 0 to 512 [ 324.051518][T17381] EXT4-fs: Ignoring removed nobh option [ 324.071472][T17381] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 5088)! [ 324.079513][T17378] EXT4-fs: Ignoring removed nobh option [ 324.081941][T17381] EXT4-fs (loop5): group descriptors corrupted! [ 324.114254][T17378] EXT4-fs error (device loop3): ext4_orphan_get:1392: inode #15: comm syz-executor.3: iget: bad extra_isize 15 (inode size 256) [ 324.128240][T17378] EXT4-fs (loop3): Remounting filesystem read-only [ 324.134933][T17378] EXT4-fs error (device loop3): ext4_orphan_get:1397: comm syz-executor.3: couldn't read orphan inode 15 (err -117) [ 324.148260][T17378] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. [ 324.175083][T15228] I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 05:44:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x4400, &(0x7f0000000000)={[{@inode_readahead_blks}, {@block_validity}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x66}}, {@errors_remount}, {@nobh}, {@quota}]}, 0x1, 0x41f, &(0x7f00000004c0)="$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") openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) 05:44:18 executing program 4: sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x0, 0x701, 0x0, 0x0, {0x6}}, 0x14}}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) r2 = socket(0x0, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x1c, r1, 0x701, 0x0, 0x0, {0x6}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 05:44:18 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000a0db000000000000000000850000000e000000c50000002a"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sched_setscheduler(0x0, 0x0, &(0x7f0000000200)) 05:44:18 executing program 0: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00'}) [ 324.184494][T15228] Buffer I/O error on dev loop5, logical block 0, async page read [ 324.191894][ T23] audit: type=1400 audit(1677995058.275:392): avc: denied { ioctl } for pid=17392 comm="syz-executor.0" path="socket:[62103]" dev="sockfs" ino=62103 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 324.203648][T15228] I/O error, dev loop5, sector 6 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 05:44:18 executing program 1: memfd_create(&(0x7f00000000c0)='\xaf\x00', 0x4) 05:44:18 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x48) 05:44:18 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000a0db000000000000000000850000000e000000c50000002a00000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000080)='sys_enter\x00', r0}, 0x10) fchmod(r1, 0x0) 05:44:18 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x92}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000a40)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x60, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x38, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x28, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x0, 0x6}}]}]}}}, @IFLA_LINK={0x8, 0x5, r5}]}, 0x60}}, 0x0) 05:44:18 executing program 4: sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x0, 0x701, 0x0, 0x0, {0x6}}, 0x14}}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) r2 = socket(0x0, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x1c, r1, 0x701, 0x0, 0x0, {0x6}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 05:44:18 executing program 0: syz_genetlink_get_family_id$nl80211(&(0x7f0000000ac0), 0xffffffffffffffff) io_setup(0xffff, &(0x7f0000000040)) socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$NL80211_CMD_CHANNEL_SWITCH(0xffffffffffffffff, 0x0, 0x0) [ 324.228257][T15228] Buffer I/O error on dev loop5, logical block 3, async page read [ 324.243781][ T3150] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. 05:44:18 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000030000000000000000000000850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r0}, 0x10) r1 = msgget(0x3, 0x0) msgsnd(r1, &(0x7f0000000100)={0x1}, 0x8, 0x0) 05:44:18 executing program 2: bpf$MAP_CREATE(0x10, &(0x7f0000001c00), 0x48) [ 324.301484][T17408] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 324.329161][T17413] loop3: detected capacity change from 0 to 512 [ 324.354164][T17413] EXT4-fs: Ignoring removed nobh option [ 324.378087][T17413] EXT4-fs error (device loop3): ext4_orphan_get:1392: inode #15: comm syz-executor.3: iget: bad extra_isize 15 (inode size 256) [ 324.391684][T17413] EXT4-fs (loop3): Remounting filesystem read-only 05:44:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x4400, &(0x7f0000000000)={[{@inode_readahead_blks}, {@block_validity}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x66}}, {@errors_remount}, {@nobh}, {@quota}]}, 0x1, 0x41f, &(0x7f00000004c0)="$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") openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) 05:44:18 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="bc0000001000030400"/20, @ANYRES32=0x0, @ANYBLOB="e7cda888000000008c00128009000100766c616e000000007c0002800600010000000000700003800c00010009000000b27a00000c00010000040000030000000c00010001040000090000000c00010005000000060000000c0001009a000000000800000c00010006000000080000000c00010000800000080000000c000100a7000000150e00000c000100020000000004000008000500", @ANYRES32, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0xbc}}, 0x4008000) 05:44:18 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000a00), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'team0\x00', 0x1}) ioctl$TUNGETIFF(r0, 0x400454d1, 0x0) 05:44:18 executing program 4: sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x0, 0x701, 0x0, 0x0, {0x6}}, 0x14}}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) r2 = socket(0x0, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x1c, r1, 0x701, 0x0, 0x0, {0x6}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 05:44:18 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00c9e71410a3308f000800ff88506c00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCMBIC(r1, 0x5417, 0x0) 05:44:18 executing program 0: timer_create(0x1, &(0x7f0000000240)={0x0, 0x0, 0x1, @thr={0x0, 0x0}}, &(0x7f0000000280)) timer_gettime(0x0, &(0x7f0000000000)) 05:44:18 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$WG_CMD_GET_DEVICE(r0, &(0x7f0000000980)={&(0x7f00000001c0), 0xc, &(0x7f0000000940)={&(0x7f0000000240)={0x50, r1, 0x709, 0x0, 0x0, {}, [@WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_PRIVATE_KEY={0x24}, @WGDEVICE_A_PEERS={0x8, 0x8, 0x0, 0x1, [{0x4}]}, @WGDEVICE_A_LISTEN_PORT={0x6}]}, 0x50}}, 0x0) [ 324.398301][T17413] EXT4-fs error (device loop3): ext4_orphan_get:1397: comm syz-executor.3: couldn't read orphan inode 15 (err -117) [ 324.410968][T17413] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. 05:44:18 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000a0db000000000000000000850000000e000000c50000002a00000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) setuid(0x0) 05:44:18 executing program 4: sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x0, 0x701, 0x0, 0x0, {0x6}}, 0x14}}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) r2 = socket(0x1, 0x0, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x1c, r1, 0x701, 0x0, 0x0, {0x6}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 05:44:18 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x6, 0x4, &(0x7f00000002c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x1}]}, &(0x7f0000000180)='syzkaller\x00', 0x2, 0xaa, &(0x7f0000000080)=""/170, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:44:18 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x7, 0x4, &(0x7f0000000040)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x77}]}, &(0x7f0000000180)='syzkaller\x00', 0x4, 0xaa, &(0x7f0000000080)=""/170, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:44:18 executing program 2: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/net\x00') pipe2(&(0x7f0000000780)={0xffffffffffffffff}, 0x0) ioctl$NS_GET_PARENT(r0, 0x5452, 0x20000000) [ 324.462742][ T3150] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 324.532926][T17441] loop3: detected capacity change from 0 to 512 [ 324.542091][T17441] EXT4-fs: Ignoring removed nobh option [ 324.553370][T17441] EXT4-fs error (device loop3): ext4_orphan_get:1392: inode #15: comm syz-executor.3: iget: bad extra_isize 15 (inode size 256) [ 324.566727][T17441] EXT4-fs (loop3): Remounting filesystem read-only 05:44:18 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x4, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) 05:44:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x4400, &(0x7f0000000000)={[{@inode_readahead_blks}, {@block_validity}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x66}}, {@errors_remount}, {@nobh}, {@quota}]}, 0x1, 0x41f, &(0x7f00000004c0)="$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") 05:44:18 executing program 4: sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x0, 0x701, 0x0, 0x0, {0x6}}, 0x14}}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) r2 = socket(0x1, 0x0, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x1c, r1, 0x701, 0x0, 0x0, {0x6}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 05:44:18 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, 0x0) 05:44:18 executing program 0: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x4400, &(0x7f0000000000)={[{@inode_readahead_blks}, {@block_validity}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x66}}, {@errors_remount}, {@nobh}, {@quota}]}, 0x1, 0x41f, &(0x7f00000004c0)="$eJzs289rHFUcAPDvTJJWW9PEWn80rbpaxeCPpEmr9uBFUfCgIOihHmOSlthtI00EW4JGkXqUgnfxKPgXeNKLqCfBq96lUCSXVk8rs5lJtpvdmB+bbnQ+Hxjy3s4L733nzdt9895uAKVViYgDEXFXRPwWEQMRkTQXqCz/ubm0MPnX0sJkErXam38m9XI3lhYmi6LF/+3PM8NpRPppEkda1Dt36fK5iWp1+mKeH50//97o3KXLz8ycnzg7fXb6wvipUydPjD3/3PizHYkzi+vG0IezRw+/+vbV1ydPX33np2+SPO5oiqNTKlG59Vo2eLzTlXVZf0M66e1iQ9iUnohII6KvPv4HoidWO28gXvmkq40DdlStVqvtbX96sQb8jyXR7RYA3VF80GfPv8Vxm6Yeu8L1FyOyR54s7pv5sXymt/5cFPmzUf8O1V+JiNOLf3+ZHbFD6xAAAI2+y+Y/T7ea/6VxX0O5A/keymBE3B0RByPinog4FBH3RtTL3h8RD2yy/kpTfu38J722pcA2KJv/vZDvbd06/ytmfzFYrJH31+PvS87MVKeP59dkOPr2Zvmxder4/uVfP293rnH+lx1Z/cVcMG/Htd6mBbqpifmJ7cTc6PrHEUO9reJPVnYCkog4HBFDW6xj5smvj7Y79+/xr6MD+0y1ryKeWO7/xWiKv5Csvz85ekdUp4+PFnfFWj//cuWNdvVvK/4OyPp/X8v7fyX+waRxv3Zu83Vc+f2zts80A1u8//ckb9XTe/LXPpiYn784FrEneW3t6+Or/1vki/JZ/MPHWo//g7F6JY5ERHYTPxgRD0XEw3nfPRIRj0bEsXXi//Glx95td2439P/Upvp/84mecz98267+jb3/naynhvNXNvL+t9EGbufaAQAAwH9FWv8OfJKOrKTTdGRk+Tv8h2JfWp2dm3/qzOz7F6aWvys/GH1psdI10LAeOpavDRf58ab8iXzd+IueO+v5kcnZ6lS3g4eS299m/Gf+6Ol264Ad5/daUF7GP5SX8Q/lZfxDeRn/UF6txv9HXWgHcPv5/IfyMv6hvIx/KC/jH0ppO7/rlyhzItJd0QyJHUp0+50JAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACgM/4JAAD//6lx5ns=") 05:44:18 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000a0db000000000000000000850000000e000000c50000002a08000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000080)='sys_enter\x00', r0}, 0x10) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syncfs(r1) [ 324.573265][T17441] EXT4-fs error (device loop3): ext4_orphan_get:1397: comm syz-executor.3: couldn't read orphan inode 15 (err -117) [ 324.585711][T17441] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. [ 324.606251][ T3150] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. 05:44:18 executing program 2: syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000500)='./file0\x00', 0x2000080, &(0x7f0000000140)=ANY=[@ANYRES16=0x0, @ANYRESOCT=0x0, @ANYRES16, @ANYBLOB="2cb01c1e639e91d61bbec8b7c11d8dce1df25af485403496a0df47260e5f1e7e0ca6a6405f50a4ac0d92903ed8e1f6a9acb918f25cc98a37861efabc45820e122561ffe9a1fc67b0378d813885c36453d404f1787049a142c14bc3f20b92262b42e0258e41cbc133d7e95fffdc0977168956ea1e144f66a4f255cfb43353bdd69edc5cee882ab0d7b6cfe6287fdfcff2669e68a8155aa6cc037f8b7725bdb75c677caad352112ff5f5f338775e3141dbff89f5c3e0cd6f1af2223c35566682c1da28b2ef084d5951be11ef883c9312fa3d2043d379"], 0x1, 0x516, &(0x7f0000000f80)="$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") 05:44:18 executing program 4: sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x0, 0x701, 0x0, 0x0, {0x6}}, 0x14}}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) r2 = socket(0x1, 0x0, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x1c, r1, 0x701, 0x0, 0x0, {0x6}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 05:44:18 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x2) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) pipe2$9p(0x0, 0x80000) write$P9_RLINK(0xffffffffffffffff, &(0x7f0000000040)={0x7, 0x47, 0x2}, 0x7) r2 = ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r4 = ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r4) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 05:44:18 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='freezer.self_freezing\x00', 0x275a, 0x0) preadv(r0, 0x0, 0x0, 0x3f7f400, 0x9fc) [ 324.631686][ T23] audit: type=1326 audit(1677995058.715:393): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17446 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fc6aece10f9 code=0x0 [ 324.633871][T17455] loop5: detected capacity change from 0 to 512 05:44:18 executing program 4: sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x0, 0x701, 0x0, 0x0, {0x6}}, 0x14}}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) socket(0x1, 0x803, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x1c, r1, 0x701, 0x0, 0x0, {0x6}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}]}, 0x1c}}, 0x0) 05:44:18 executing program 4: sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x0, 0x701, 0x0, 0x0, {0x6}}, 0x14}}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) socket(0x1, 0x803, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x1c, r1, 0x701, 0x0, 0x0, {0x6}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}]}, 0x1c}}, 0x0) 05:44:18 executing program 0: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x4400, &(0x7f0000000000)={[{@inode_readahead_blks}, {@block_validity}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x66}}, {@errors_remount}, {@nobh}, {@quota}]}, 0x1, 0x41f, &(0x7f00000004c0)="$eJzs281vG0UbAPBn10n7vi1tQikfTQsYCiLiI2nSAj1wAYHEASQkOJRjSNIq1G1QEyRaRRAQKkdUiTviiMRfwAkuCDghcYU7qlShXFo4Ga29doxjh3w4dWB/P2mVGe9GM8/Oznp2Zh1AYZUj4mBE3BERv0TEUESk7QeU639urSxN/7GyNJ1Etfr670kkEXFzZWm6cWiS/92fZ0bTiPTjJI52KHfh8pXzU5XK7KU8P7544Z3xhctXnpq7MHVu9tzsxcnTp0+dnHj2mcmnexJnFtfNkffnjx15+c1rr06fufbWD18ledzRFkevlKPcPCftHu11YX12oCWdDPSxImxKKSKy5hqs9f+hKMVq4w3FSx/1tXLAjqpWq9W93XcvV4H/sCT6XQOgPxpf9Nnzb2O7TUOPXeHG8/UHoCzuW/lW3zPQnAcZbHu+7aVyRJxZ/vPzbIsdmocAAGj1TTb+ebLT+C+Ne1qOO5ivoQxHxJ0RcSgi7oqIwxFxd0Tt2Hsj4r5Nll9uy68d/6TXtxTYBmXjv+fyta2/j/+aq2DDpTx3oBb/YHJ2rjJ7Ij8nozG4N8tPrFPGty/+/Gm3fa3jv2zLym+MBfN6XB9om6CbmVqc2k7MrW58GDEy0Cn+pLkSkETEkYgY2WIZc49/eazbvn+Ofx09WGeqfhHxWL39l6Mt/oZk/fXJ8f9FZfbEeOOqWOvHn66+1q38bcXfA1n77+t4/TfjH05a12sXNl/G1V8/6fpMM7TF639P8kYtvSf/7L2pxcVLExF7klfWfj65+r+NfOP4LP7R4537/6FYPRNHIyK7iO+PiAci4sG87R6KiIcj4vg68X//wiNvd9u3G9p/ZlPtv/lE6fx3X3crf2P3v1O11Gj+yUbufxut4HbOHQAAAPxbpLV34JN0rJlO07Gx+jv8h2NfWplfWHzi7Py7F2fq78oPx2DamOkaapkPncjnhhv5ybb8yXze+LPS/2v5sen5yky/g4eC29+l/2d+K/W7dsCO83stKC79H4pL/4fi0v+huPR/KK5O/f+DPtQDuP18/0Nx6f9QXPo/FJf+D4W0nd/1SxQ5EemuqIbEDiX6fWcCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADojb8CAAD//5YJ5n4=") [ 324.698468][T17459] loop2: detected capacity change from 0 to 512 [ 324.707279][T17455] EXT4-fs: Ignoring removed nobh option [ 324.717029][T17455] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 324.726878][T17455] EXT4-fs (loop5): group descriptors corrupted! [ 324.738811][T17459] EXT4-fs (loop2): The Hurd can't support 64-bit file systems 05:44:18 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000140)) 05:44:18 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000a0db000000000000000000850000000e000000c50000002a08000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000080)='sys_enter\x00', r0}, 0x10) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syncfs(r1) 05:44:18 executing program 4: sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x0, 0x701, 0x0, 0x0, {0x6}}, 0x14}}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) socket(0x1, 0x803, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x1c, r1, 0x701, 0x0, 0x0, {0x6}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}]}, 0x1c}}, 0x0) 05:44:18 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x38, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ppp={{0x8}, {0xc, 0x2, 0x0, 0x1, {0x8, 0x1, r1}}}}]}, 0x38}}, 0x0) 05:44:18 executing program 2: syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000500)='./file0\x00', 0x2000080, &(0x7f0000000140)=ANY=[@ANYRES16=0x0, @ANYRESOCT=0x0, @ANYRES16, @ANYBLOB="2cb01c1e639e91d61bbec8b7c11d8dce1df25af485403496a0df47260e5f1e7e0ca6a6405f50a4ac0d92903ed8e1f6a9acb918f25cc98a37861efabc45820e122561ffe9a1fc67b0378d813885c36453d404f1787049a142c14bc3f20b92262b42e0258e41cbc133d7e95fffdc0977168956ea1e144f66a4f255cfb43353bdd69edc5cee882ab0d7b6cfe6287fdfcff2669e68a8155aa6cc037f8b7725bdb75c677caad352112ff5f5f338775e3141dbff89f5c3e0cd6f1af2223c35566682c1da28b2ef084d5951be11ef883c9312fa3d2043d379"], 0x1, 0x516, &(0x7f0000000f80)="$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") 05:44:18 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000440)=@nat={'nat\x00', 0x19, 0x2, 0x136, [0x20000080, 0x0, 0x0, 0x200000b0, 0x200003bc], 0x0, 0x0, &(0x7f0000000080)=[{}, {0x0, '\x00', 0x0, 0x0, 0x1, [{0x9, 0x0, 0x0, 'veth1_to_team\x00', 'bridge_slave_1\x00', 'pimreg0\x00', 'ip6gre0\x00', @empty, [], @remote, [], 0x6e, 0x6e, 0xa6, [], [], @common=@mark={'mark\x00', 0x10}}]}, {0x0, '\x00', 0x2}]}, 0x1ae) 05:44:18 executing program 4: sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x0, 0x701, 0x0, 0x0, {0x6}}, 0x14}}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, 0x0, &(0x7f00000002c0)) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x1c, r1, 0x701, 0x0, 0x0, {0x6}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}}, 0x0) 05:44:18 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 05:44:18 executing program 5: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x20000000) 05:44:18 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000a0db000000000000000000850000000e000000c50000002a08000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000080)='sys_enter\x00', r0}, 0x10) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syncfs(r1) 05:44:18 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000a0db000000000000000000850000000e000000c5"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000080)='sys_enter\x00', r0}, 0x10) pidfd_getfd(0xffffffffffffffff, r1, 0x0) 05:44:18 executing program 4: sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x0, 0x701, 0x0, 0x0, {0x6}}, 0x14}}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, 0x0, &(0x7f00000002c0)) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x1c, r1, 0x701, 0x0, 0x0, {0x6}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}}, 0x0) 05:44:19 executing program 5: socket$nl_netfilter(0x10, 0x3, 0xc) socket(0x1, 0x5, 0x0) socket$packet(0x11, 0x3, 0x300) epoll_create1(0x0) socket$unix(0x1, 0x2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/key-users\x00', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x440, 0x0) socket$packet(0x11, 0x3, 0x300) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8cde7}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x18, 0x19}}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x58}}, 0x4008000) [ 324.873231][T17483] loop2: detected capacity change from 0 to 512 [ 324.896671][T17483] EXT4-fs (loop2): The Hurd can't support 64-bit file systems 05:44:19 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x3, 0x4, &(0x7f0000000040)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x5}]}, &(0x7f0000000180)='syzkaller\x00', 0x4, 0xaa, &(0x7f0000000080)=""/170, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0xd04) 05:44:19 executing program 4: sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x0, 0x701, 0x0, 0x0, {0x6}}, 0x14}}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, 0x0, &(0x7f00000002c0)) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x1c, r1, 0x701, 0x0, 0x0, {0x6}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}}, 0x0) 05:44:19 executing program 4: sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x0, 0x701, 0x0, 0x0, {0x6}}, 0x14}}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x1c, r1, 0x701, 0x0, 0x0, {0x6}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) [ 324.919349][T15228] udevd[15228]: inotify_add_watch(7, /dev/loop0, 10) failed: No such file or directory [ 324.945090][T17499] vlan2: entered promiscuous mode [ 324.950526][T17499] bond0: entered promiscuous mode [ 324.955662][T17499] bond_slave_0: entered promiscuous mode [ 324.961796][T17499] bond_slave_1: entered promiscuous mode 05:44:19 executing program 2: syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000500)='./file0\x00', 0x2000080, &(0x7f0000000140)=ANY=[@ANYRES16=0x0, @ANYRESOCT=0x0, @ANYRES16, @ANYBLOB="2cb01c1e639e91d61bbec8b7c11d8dce1df25af485403496a0df47260e5f1e7e0ca6a6405f50a4ac0d92903ed8e1f6a9acb918f25cc98a37861efabc45820e122561ffe9a1fc67b0378d813885c36453d404f1787049a142c14bc3f20b92262b42e0258e41cbc133d7e95fffdc0977168956ea1e144f66a4f255cfb43353bdd69edc5cee882ab0d7b6cfe6287fdfcff2669e68a8155aa6cc037f8b7725bdb75c677caad352112ff5f5f338775e3141dbff89f5c3e0cd6f1af2223c35566682c1da28b2ef084d5951be11ef883c9312fa3d2043d379"], 0x1, 0x516, &(0x7f0000000f80)="$eJzs3V1rZGcdAPD/mWQ2+xJN1F5UoS/YSrboziSNbYMXbQXxrqDU+zUkkxAyyYTMpG5CkSx+AEFEe9srbwQ/gCD9CCIU9F5UlEW3etEL7ZEzc2aziWd2JmZeaPL7wZPznNf//5lMzpyXZ3ICuLKej4g3I2IqIl6KiLl8eikvcdwp2XIfPXx3LStJpOnbf08iyadliyV5ydzKV/sk7SiK2zw82l6t12v7+Xi1tbNXbR4e3dnaWd2sbdZ2l5eXXl15beWVlcWhtDNr1+vf+svPfvyLb7/+m6/94I93/3b7h1m+s/n8bjuGrfOalOP6Y9OmI2J/FMEmYCpvT3nSiQAAMJDsGP/zEfHl9vH/XEy1j+YGk4w0MwAAAGBY0jdm499JRDqo7kn/wCsAAAAAk1Zq94FNSpW8L8BslEqVSqcP71Nxs1RvNFtf3Wgc7K53+srOR7m0sVWvLeZ9auejnGTjS+36yfjLj8aT48evN/x07kZ7fmWtUV+fzCUPAAAAuHJunTn//9dc5/z/Ce6PLTkAAABgeOYnnQAAAAAwcv97/v/+RPIAAAAARsf9fwAAALjUvvPWW1lJu8+/Xn/n8GC78c6d9Vpzu7JzsFZZa+zvVTYbjc16OhOx02979UZj7+uxe3Cv2qo1W9Xm4dHdncbBbuvu1qlHYAMAAABj9LnnPvhDEhHH37jRLplr2Y+pHivoKwCXRuk8C/95dHkA49frYx64/KYnnQAwMeXOIJl0HsDk9NsB9Oy889vh5wIAAIzGwheL7/9Pn1wbAC6p/vf/fW0HLiv3/+Hqcv8frq6yIwC48kZ//z9N+24LAAAYqdl2SUqV/F7gbJQ+TjtiPsrJxla9thgRn42I38+VZ7LxpfaaiS8NAAAAAAAAAAAAAAAAAAAAAAAAAMCA0jSJFAAAALjUIkp/TfLnfy3MvTh79vrAteTjufaw/XSAt39+b7XV2l/Kpv8jnx7Rei+f/vJ5rjz0f/I4AAAA8P/pnqd3z+MBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYJg+evjuWreMM+6Db0bEfFH86bjeHl6PckTc/GcS092VnotIImJqCPGP70fE00XxkyytmM+zOBU/IkoRcaOdxcjjP5OmaWH8WxeODlfbB9n+582iv79SPN8eFv/9T+floh50KwXxu/u/qYL42Z7nMwPG+NKHv6oWzyl15k8X73+68ZMe8V8o2mTBi/L97x0d9cotfT9iofDzJzkVq9ra2as2D4/ubO2sbtY2a7vLy0uvrry28srKYnVjq17LfxbG+Mkzv/6kV/wH9yNu9og/f7r9q2fb/2JWKffa8on/fHjv4Rc61fKZTbTj336h+P339On4p17a7D3xlfw3mM1f6NaPO/XHPfvL3z37pPbPPGr/tYgY/Pd/u3/T21767o/+NOCiAMAYNA+Ptlfr9dp+70p2qNFvmQEq76VpeoHVz1XJUh5XrAtXnvr0pHpSeeM8C6czA7/ZVPpWZmIssSa9ZwIAAIbt5KB/0pkAAAAAAAAAAAAAAAAAAADA1TWO/1h2NubxZJoKAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPBE/w0AAP//KvjR2w==") 05:44:19 executing program 1: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000007400)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{&(0x7f0000006100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000007340)=[{0x0}], 0x1, &(0x7f0000007380)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}], 0x60}}], 0x3, 0x0) 05:44:19 executing program 0: syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) timer_create(0x7a70087bf347e37a, 0x0, 0x0) 05:44:19 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), r0) 05:44:19 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) fgetxattr(r0, 0x0, 0x0, 0x0) [ 324.986270][T17499] bond0: left promiscuous mode [ 324.991285][T17499] bond_slave_0: left promiscuous mode [ 324.996782][T17499] bond_slave_1: left promiscuous mode 05:44:19 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000a0db000000000000000000850000000e000000c50000002a08000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000080)='sys_enter\x00', r0}, 0x10) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) syncfs(r1) 05:44:19 executing program 4: sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x0, 0x701, 0x0, 0x0, {0x6}}, 0x14}}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x1c, r1, 0x701, 0x0, 0x0, {0x6}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 05:44:19 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) socket(0x1, 0x5, 0x0) socket$packet(0x11, 0x3, 0x300) epoll_create1(0x0) socket$unix(0x1, 0x2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/key-users\x00', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x440, 0x0) socket$packet(0x11, 0x3, 0x300) socket$inet_tcp(0x2, 0x1, 0x0) socket$nl_route(0x10, 0x3, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000800)='/proc/keys\x00', 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8cde7}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) [ 325.029927][T17510] loop2: detected capacity change from 0 to 512 [ 325.067306][T17510] EXT4-fs (loop2): The Hurd can't support 64-bit file systems 05:44:19 executing program 5: socket$nl_netfilter(0x10, 0x3, 0xc) socket(0x1, 0x5, 0x0) socket$packet(0x11, 0x3, 0x300) epoll_create1(0x0) socket$unix(0x1, 0x2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/key-users\x00', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x440, 0x0) socket$packet(0x11, 0x3, 0x300) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8cde7}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x18, 0x19}}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x58}}, 0x4008000) 05:44:19 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/cgroup\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x20000000) 05:44:19 executing program 4: sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x0, 0x701, 0x0, 0x0, {0x6}}, 0x14}}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x1c, r1, 0x701, 0x0, 0x0, {0x6}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 05:44:19 executing program 2: syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000500)='./file0\x00', 0x2000080, &(0x7f0000000140)=ANY=[@ANYRES16=0x0, @ANYRESOCT=0x0, @ANYRES16, @ANYBLOB="2cb01c1e639e91d61bbec8b7c11d8dce1df25af485403496a0df47260e5f1e7e0ca6a6405f50a4ac0d92903ed8e1f6a9acb918f25cc98a37861efabc45820e122561ffe9a1fc67b0378d813885c36453d404f1787049a142c14bc3f20b92262b42e0258e41cbc133d7e95fffdc0977168956ea1e144f66a4f255cfb43353bdd69edc5cee882ab0d7b6cfe6287fdfcff2669e68a8155aa6cc037f8b7725bdb75c677caad352112ff5f5f338775e3141dbff89f5c3e0cd6f1af2223c35566682c1da28b2ef084d5951be11ef883c9312fa3d2043d379"], 0x1, 0x516, &(0x7f0000000f80)="$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") 05:44:19 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/pid\x00') ioctl$NS_GET_PARENT(r0, 0x40305839, 0x0) 05:44:19 executing program 3: r0 = gettid() bpf$BPF_TASK_FD_QUERY(0xe, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) 05:44:19 executing program 4: sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x0, 0x701, 0x0, 0x0, {0x6}}, 0x14}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x1c, r0, 0x701, 0x0, 0x0, {0x6}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}]}, 0x1c}}, 0x0) 05:44:19 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000a0db000000000000000000850000000e000000c50000002a00000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000080)='sys_enter\x00', r0}, 0x10) dup2(r1, r1) [ 325.092246][T17520] vlan3: entered promiscuous mode [ 325.097329][T17520] dummy0: entered promiscuous mode 05:44:19 executing program 3: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x4400, &(0x7f0000000000)={[{@inode_readahead_blks}, {@block_validity}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x66}}, {@errors_remount}, {@nobh}, {@quota}]}, 0x1, 0x41f, &(0x7f00000004c0)="$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") 05:44:19 executing program 4: sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x0, 0x701, 0x0, 0x0, {0x6}}, 0x14}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x1c, r0, 0x701, 0x0, 0x0, {0x6}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}]}, 0x1c}}, 0x0) 05:44:19 executing program 0: timer_create(0x7a70087bf347e37a, 0x0, &(0x7f0000000380)) [ 325.172881][T17527] loop2: detected capacity change from 0 to 512 [ 325.174208][T17529] vlan2: entered promiscuous mode [ 325.185001][T17529] bond0: entered promiscuous mode [ 325.190082][T17529] bond_slave_0: entered promiscuous mode [ 325.195846][T17529] bond_slave_1: entered promiscuous mode [ 325.203871][T17527] EXT4-fs (loop2): The Hurd can't support 64-bit file systems 05:44:19 executing program 0: mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000100), 0x3b, 0x0) unlink(&(0x7f0000000000)='./file0\x00') [ 325.223809][T17539] loop3: detected capacity change from 0 to 512 [ 325.231425][T17529] bond0: left promiscuous mode [ 325.236275][T17529] bond_slave_0: left promiscuous mode [ 325.241831][T17529] bond_slave_1: left promiscuous mode [ 325.250457][T17539] EXT4-fs: Ignoring removed nobh option 05:44:19 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x3, 0x4, &(0x7f0000000040)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x99}]}, &(0x7f0000000180)='syzkaller\x00', 0x2, 0xaa, &(0x7f0000000080)=""/170, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:44:19 executing program 4: sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x0, 0x701, 0x0, 0x0, {0x6}}, 0x14}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x1c, r0, 0x701, 0x0, 0x0, {0x6}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}]}, 0x1c}}, 0x0) 05:44:19 executing program 1: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000140), 0xffffffffffffffff) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r4, 0x8933, &(0x7f0000000080)={'wg0\x00', 0x0}) sendmsg$WG_CMD_SET_DEVICE(r2, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000d00)={&(0x7f00000005c0)={0x34, r3, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_PEERS={0x10, 0x8, 0x0, 0x1, [{0xc, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x4}]}]}, @WGDEVICE_A_FLAGS={0x8, 0x5, 0x1}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r5}]}, 0x34}}, 0x0) 05:44:19 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x5, 0x0, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x2c8000, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) dup3(r0, r1, 0x0) 05:44:19 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000300)=0x14) [ 325.268713][T17539] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps block group descriptors [ 325.279674][T17539] EXT4-fs (loop3): group descriptors corrupted! 05:44:19 executing program 0: socket$packet(0x11, 0x3, 0x300) socket$unix(0x1, 0x2, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) socket$nl_route(0x10, 0x3, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000800)='/proc/keys\x00', 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000100)) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8cde7}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x0, 0x19}}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x58}}, 0x4008000) 05:44:19 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x3, 0x4, &(0x7f0000000040)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f0000000180)='syzkaller\x00', 0x5, 0xaa, &(0x7f0000000080)=""/170, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:44:19 executing program 1: pipe2(&(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$NS_GET_PARENT(r0, 0x541b, 0x20000000) 05:44:19 executing program 3: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x4400, &(0x7f0000000000)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x3}}, {@block_validity}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x66}}, {@errors_remount}, {@nobh}, {@quota}]}, 0x1, 0x41f, &(0x7f00000004c0)="$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") 05:44:19 executing program 4: sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x0, 0x701, 0x0, 0x0, {0x6}}, 0x14}}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, 0x0, 0x0) 05:44:19 executing program 1: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/net\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x20000000) 05:44:19 executing program 4: sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x0, 0x701, 0x0, 0x0, {0x6}}, 0x14}}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, 0x0, 0x0) 05:44:19 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000140), 0x10) sendmsg$can_bcm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000940)={0x2, 0xb32, 0x0, {0x0, 0xea60}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "4210220097b2bb36662d7dd23a59126b470b759d7b9beb929157fbabb8971fdf7268450b731d6d110917f27e538256a669fea5023441347712804650cc7d8236"}}, 0x80}}, 0x0) 05:44:19 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000a00), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'team0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x0) 05:44:19 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00c9e71410a3308f000800ff88506c00"}) syz_open_pts(r0, 0x180) [ 325.397111][T17558] vlan2: entered promiscuous mode 05:44:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000040)={{0x2, 0x0, @broadcast}, {0x0, @local}, 0xe, {0x2, 0x0, @dev}, 'veth0\x00'}) 05:44:19 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, 0x0, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f00000002c0), 0x0, 0x8) 05:44:19 executing program 0: openat$zero(0xffffffffffffff9c, &(0x7f0000000b40), 0xa80, 0x0) 05:44:19 executing program 4: sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x0, 0x701, 0x0, 0x0, {0x6}}, 0x14}}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, 0x0, 0x0) 05:44:19 executing program 1: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/net\x00') syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/net\x00') [ 325.429315][T17566] loop3: detected capacity change from 0 to 512 [ 325.430633][ T23] audit: type=1400 audit(1677995059.515:394): avc: denied { connect } for pid=17567 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 325.444531][T17566] EXT4-fs: EXT4-fs: inode_readahead_blks must be 0 or a power of 2 smaller than 2^31 05:44:19 executing program 3: futex(&(0x7f0000000140), 0xb, 0x0, &(0x7f0000000180), 0x0, 0x0) 05:44:19 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000340)={'vcan0\x00', 0x0}) connect$can_bcm(r0, &(0x7f0000000140)={0x1d, r2}, 0x10) 05:44:19 executing program 2: r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000000c0)=0x4) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000080)='.log\x00', 0x140bc2, 0x0) pwritev(r1, &(0x7f00000000c0)=[{&(0x7f00000002c0)='|', 0x1}], 0x1, 0x80dea1, 0x0) 05:44:19 executing program 4: sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x0, 0x701, 0x0, 0x0, {0x6}}, 0x14}}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) 05:44:19 executing program 1: pselect6(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x1}, &(0x7f0000000080)={0x2}, &(0x7f00000001c0), &(0x7f0000000140)={&(0x7f0000000100)={[0x9]}, 0x8}) 05:44:19 executing program 5: socketpair(0x27, 0x0, 0x0, &(0x7f0000002200)) 05:44:19 executing program 5: socket(0x10, 0x0, 0x6) 05:44:19 executing program 4: sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x0, 0x701, 0x0, 0x0, {0x6}}, 0x14}}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) 05:44:19 executing program 3: r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000d00)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000008"], 0x38}}, 0x0) 05:44:19 executing program 1: r0 = socket(0x18, 0x0, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 325.574796][ T23] audit: type=1400 audit(1677995059.655:395): avc: denied { ioctl } for pid=17587 comm="syz-executor.0" path="socket:[62651]" dev="sockfs" ino=62651 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 05:44:19 executing program 2: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f0000000000)={'veth1_virt_wifi\x00'}) 05:44:19 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_MAC_ACL(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f00000012c0)={0x28, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000002640), 0xffffffffffffffff) 05:44:19 executing program 4: sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x0, 0x701, 0x0, 0x0, {0x6}}, 0x14}}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) 05:44:19 executing program 5: timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x3938700}, {0x0, 0x3938700}}, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000300)=0x0) ppoll(&(0x7f0000000180)=[{}], 0x1, 0x0, 0x0, 0x0) timer_settime(r0, 0x0, &(0x7f0000000140)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 05:44:19 executing program 2: r0 = socket$tipc(0x1e, 0x4, 0x0) ppoll(&(0x7f0000000100)=[{r0}], 0x1, &(0x7f0000000140), 0x0, 0x0) 05:44:19 executing program 1: syz_open_procfs$namespace(0x0, &(0x7f0000004140)='ns/mnt\x00') 05:44:19 executing program 3: socketpair(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000040)=@file={0x0, './file0\x00'}, 0xa) 05:44:19 executing program 4: sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x0, 0x701, 0x0, 0x0, {0x6}}, 0x14}}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 05:44:19 executing program 0: syz_emit_ethernet(0x41, &(0x7f00000000c0)=ANY=[@ANYBLOB="25cb1865c2224e142d94bc8f08"], 0x0) [ 325.623017][T17601] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.3'. 05:44:19 executing program 1: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000003280)={0xffffffffffffffff, 0x0, 0x18}, 0xc) 05:44:19 executing program 2: r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000000c0)=0x4) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000080)='.log\x00', 0x140bc2, 0x0) preadv(r1, &(0x7f0000000bc0)=[{&(0x7f00000008c0)=""/209, 0xd1}], 0x1, 0x1ffc0000, 0x0) 05:44:19 executing program 3: r0 = socket(0x11, 0xa, 0x0) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={0x0}}, 0x0) 05:44:19 executing program 0: ppoll(&(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}, {}], 0x200000000000001f, &(0x7f0000000140)={0x77359400}, 0x0, 0x0) 05:44:19 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_DISABLE(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000680)={0x24, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x10, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xc, 0x1, @l2={'eth', 0x3a, 'wg1\x00'}}]}]}, 0x24}}, 0x0) 05:44:19 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_SNAP_CREATE(r1, 0x50009401, 0x0) 05:44:20 executing program 5: r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)=0x40) 05:44:20 executing program 4: sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x0, 0x701, 0x0, 0x0, {0x6}}, 0x14}}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 05:44:20 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_GET_ADDR(r0, &(0x7f0000000d80)={0x0, 0x0, &(0x7f0000000d40)={0x0}}, 0x0) 05:44:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000cc0)={'sit0\x00', &(0x7f0000000bc0)={'tunl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x25, 0x4, 0x0, 0x0, 0x94, 0x0, 0x0, 0x0, 0x29, 0x0, @dev, @multicast2, {[@ssrr={0x89, 0x17, 0x0, [@initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @multicast1, @dev, @dev]}, @end, @generic={0x0, 0x11, "2ea57811109bdb376f5ab21043118c"}, @timestamp_addr={0x44, 0x54, 0x0, 0x1, 0x0, [{@private}, {@dev}, {@private}, {@multicast2}, {@multicast1}, {@empty}, {@local}, {@dev}, {@dev}, {@empty}]}]}}}}}) 05:44:20 executing program 0: bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000)={0x851f25a4}, 0x8) 05:44:20 executing program 2: r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000d00)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010000000000000000000c00000004000a"], 0x38}}, 0x0) 05:44:20 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000a00), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x40086602, &(0x7f0000000000)={'ipvlan0\x00'}) 05:44:20 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='freezer.self_freezing\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000ec0)={0x6, 0x1, &(0x7f0000000d40)=@raw=[@alu], &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) openat$cgroup(0xffffffffffffffff, &(0x7f0000000fc0)='syz1\x00', 0x200002, 0x0) 05:44:20 executing program 1: r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000d00)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010000000000000000000b000000040009802000058008000100657468"], 0x38}}, 0x0) 05:44:20 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) mknodat(r0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) 05:44:20 executing program 4: sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x0, 0x701, 0x0, 0x0, {0x6}}, 0x14}}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 05:44:20 executing program 5: socketpair(0x22, 0x2, 0x4, &(0x7f0000000200)) 05:44:20 executing program 3: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) faccessat(r0, &(0x7f0000000300)='./file0\x00', 0x0) [ 326.543511][T17643] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.2'. 05:44:20 executing program 4: sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x0, 0x701, 0x0, 0x0, {0x6}}, 0x14}}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x1c, 0x0, 0x701, 0x0, 0x0, {0x6}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}]}, 0x1c}}, 0x0) 05:44:20 executing program 0: chown(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) 05:44:20 executing program 5: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 05:44:20 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$can_raw(r1, &(0x7f0000000080), 0x10) 05:44:20 executing program 1: syz_emit_ethernet(0x55, &(0x7f0000000080), 0x0) 05:44:20 executing program 3: syz_emit_ethernet(0x42, &(0x7f0000000000), 0x0) 05:44:20 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) getsockname$unix(r0, &(0x7f0000001ec0), &(0x7f0000002100)=0x204) 05:44:20 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000026c0)={0xffffffffffffffff, 0xffffffffffffffff}) shutdown(r0, 0x0) write(r1, &(0x7f0000000400)='N', 0x1) 05:44:20 executing program 4: sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x0, 0x701, 0x0, 0x0, {0x6}}, 0x14}}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x1c, 0x0, 0x701, 0x0, 0x0, {0x6}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}]}, 0x1c}}, 0x0) [ 326.617401][T17654] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 05:44:20 executing program 2: socket$inet6(0xa, 0x6, 0xffffffff) 05:44:20 executing program 1: socketpair(0x11, 0x0, 0x0, &(0x7f0000001c40)) 05:44:20 executing program 3: r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000000)={0x43, 0x3}, 0x10) sendmsg$tipc(r0, &(0x7f0000001480)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 05:44:20 executing program 5: syz_emit_ethernet(0x66, &(0x7f0000000200), 0x0) 05:44:20 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) fcntl$getown(r0, 0x5) 05:44:20 executing program 4: sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x0, 0x701, 0x0, 0x0, {0x6}}, 0x14}}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x1c, 0x0, 0x701, 0x0, 0x0, {0x6}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}]}, 0x1c}}, 0x0) 05:44:20 executing program 1: socketpair(0x1, 0x2, 0x0, &(0x7f0000000440)) 05:44:20 executing program 3: syz_emit_ethernet(0x2a, &(0x7f0000000100), 0x0) 05:44:20 executing program 5: pipe2(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) sendmsg$unix(r0, &(0x7f0000000d80)={0x0, 0x0, &(0x7f0000000b40)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 05:44:20 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendto(r0, &(0x7f0000000480)="c551c3468d8a18347120868fa9393bf0b8429ea1164dd563bb30b398f6671ba5b73e2182273df172207f9fcda0b882266d7754df5a0e60f60f49e75a6e07651e96601b5b4e6a4aa92b9e1d02ad5f317828cb03d1e6", 0x55, 0x81, 0x0, 0x0) 05:44:20 executing program 4: sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x0, 0x701, 0x0, 0x0, {0x6}}, 0x14}}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x1c, r1, 0x0, 0x0, 0x0, {0x6}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 05:44:20 executing program 5: socketpair(0x1e, 0x0, 0xfffffffa, &(0x7f0000000640)) 05:44:20 executing program 0: mmap(&(0x7f0000ff2000/0xc000)=nil, 0xc000, 0x0, 0x1010, 0xffffffffffffffff, 0x0) 05:44:20 executing program 2: munmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000) munmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000) 05:44:20 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)) mlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) 05:44:20 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000480)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="2d9cf0dce2f1d4e58c2c110180b1bc8888dd1be4", 0x14}], 0x4}, 0x0) 05:44:20 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$sock_linger(r0, 0xffff, 0x80, &(0x7f0000000000), 0x5) 05:44:20 executing program 4: sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x0, 0x701, 0x0, 0x0, {0x6}}, 0x14}}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x1c, r1, 0x0, 0x0, 0x0, {0x6}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 05:44:20 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) getsockname(r0, 0x0, 0x0) 05:44:20 executing program 0: shmat(0x0, &(0x7f0000ffd000/0x2000)=nil, 0x0) shmat(0x0, &(0x7f00009de000/0x5000)=nil, 0x0) 05:44:20 executing program 2: r0 = msgget(0x1, 0x0) msgsnd(r0, &(0x7f0000000180)={0x0, "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"}, 0x801, 0x0) 05:44:20 executing program 3: socketpair(0x29, 0x2, 0xffffffff, &(0x7f0000000000)) 05:44:20 executing program 2: socketpair(0x1e, 0x0, 0x0, &(0x7f0000000200)) 05:44:20 executing program 1: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 05:44:20 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$SOCK_DESTROY(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, 0x1d, 0x1}, 0x14}}, 0x0) 05:44:20 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_int(r0, 0xffff, 0x1002, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 05:44:20 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x1cc) r0 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000000c0)='./file0\x00', 0x0) utimensat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)={{0x0, 0xfffffffffffffffe}}, 0x0) 05:44:20 executing program 4: sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x0, 0x701, 0x0, 0x0, {0x6}}, 0x14}}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x1c, r1, 0x0, 0x0, 0x0, {0x6}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 05:44:20 executing program 1: socketpair(0x1e, 0x0, 0xf553, &(0x7f0000000000)) 05:44:20 executing program 0: socketpair(0x18, 0x3, 0x2, 0x0) 05:44:21 executing program 5: syz_emit_ethernet(0x82, &(0x7f0000000080), 0x0) 05:44:21 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000740)="670da1e0dc22d0a9f82db4800e75e0479cbe6f33879c24ed593cc979d76dc84f80c8ff24f1784e400593f57a19b6dbf4c4ca11ca0739810604141140ea28d8f9a122138633b11cb0ab0ba5af9ba1b7ea5bc9826cb5bec27f2e46bce31c096eebc3afd7bec6163a038330935eb9e08ed11e12cb92c906520b1a2c43f7107b74b7106992a6e51b201081d8e92420286c33a7", 0x91}], 0x1}, 0x0) 05:44:21 executing program 4: sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x0, 0x701, 0x0, 0x0, {0x6}}, 0x14}}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14, r1, 0x701, 0x0, 0x0, {0x6}}, 0x14}}, 0x0) 05:44:21 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) symlinkat(&(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00') 05:44:21 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000002c0)={0x0, 0xa, &(0x7f0000000040)=[{&(0x7f0000000400)=')', 0x1}], 0x1}, 0x0) recvmsg(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)=""/171, 0xab}], 0x1}, 0x400c0) 05:44:21 executing program 0: socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000001c80)={&(0x7f00000007c0), 0x10, 0x0, 0x0, &(0x7f0000001bc0)=[{0x10}], 0x10}, 0x20181) 05:44:21 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[@cred], 0x20}, 0x0) 05:44:21 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) sendmsg(r0, &(0x7f00000028c0)={0x0, 0x0, &(0x7f00000014c0)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, &(0x7f0000001580)=[{0x40, 0x0, 0x0, "33a295cd870ec3643edf7f079ff8fed8180a5f52f0b035e97b306b9e75120afc75d36f4770137a5501"}, {0x80, 0x0, 0x0, "be31cac4908ca4e2a1eed81b2b30366b1e86432a45721baea66ac1240084bb690d2cbbc28aaade06fa881509f4e0ed22bf4fb4ea38174612e641ceb8d5c2dd5ecf4bf07201415a4e8b0644aa359d61741211cc6950aca62bfcbedf0f4c67507ac91a8db06341a59ef0"}, {0x88, 0x0, 0x0, "a8e6b23109e8ecd39a7679db2be98eb8238535f517fcd0d2501f5537abd6461c719a6aafea6593d42043f6bf9c0123de883867f1ed1e41cb06c3c0ed9ed8bafbd089756315a519154da70aa0638df4ff3ec0f1212e9b7e188f68d6d69199d9981346e418e46bb13e71ca45d42f913dca72"}, {0x98, 0x0, 0x0, "2966dda735c9772ee5c78f19ea55ca5ee6480d2989e79dd87cf0559b11a7624adadcf4501e3399062e31b2acbd1aecf2d21acc9a1e01195c0f2314a470e308a32984cbb8b930496bba65f86f660e181997af23a41f4ec17113a5dcbd49fbf2a206d370b3b0c0806b6df8e729c86a422be6a015f9c8ddb0c5423df30285740a6f18"}, {0x40, 0x0, 0x0, "2f0cb343c035afbb48e4c72ec42f1fc8ff23b2c2383d9c9211745404c957089ae8ea5409cd29dd1126"}, {0x5e8, 0x0, 0x0, "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"}], 0x808}, 0x0) 05:44:21 executing program 4: sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x0, 0x701, 0x0, 0x0, {0x6}}, 0x14}}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14, r1, 0x701, 0x0, 0x0, {0x6}}, 0x14}}, 0x0) 05:44:21 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x202, 0x0) 05:44:21 executing program 0: socketpair(0x2, 0x3, 0x1, &(0x7f0000000700)) 05:44:21 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) accept(r0, 0x0, 0x0) 05:44:21 executing program 5: r0 = open$dir(&(0x7f0000000600)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x0) 05:44:21 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) sendmsg$unix(r0, &(0x7f0000001540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0) 05:44:21 executing program 4: sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x0, 0x701, 0x0, 0x0, {0x6}}, 0x14}}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14, r1, 0x701, 0x0, 0x0, {0x6}}, 0x14}}, 0x0) 05:44:21 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000026c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt(r0, 0xffff, 0x1000, &(0x7f0000000700), 0x0) 05:44:21 executing program 0: lchown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) madvise(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x3) 05:44:21 executing program 5: r0 = open$dir(&(0x7f0000000040)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') 05:44:21 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x1}, 0xc) 05:44:21 executing program 3: r0 = shmget$private(0x0, 0x1000, 0x100, &(0x7f0000ffc000/0x1000)=nil) shmctl$IPC_STAT(r0, 0x2, &(0x7f00000007c0)=""/164) 05:44:21 executing program 4: sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x0, 0x701, 0x0, 0x0, {0x6}}, 0x14}}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x1c, r1, 0x701, 0x0, 0x0, {0x6}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}}, 0x0) 05:44:21 executing program 4: sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x0, 0x701, 0x0, 0x0, {0x6}}, 0x14}}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x1c, r1, 0x701, 0x0, 0x0, {0x6}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}}, 0x0) 05:44:21 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) getsockname$unix(r0, 0x0, 0x0) 05:44:21 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)=[@rights], 0x18}, 0x0) 05:44:21 executing program 0: socketpair(0x11, 0x0, 0x0, &(0x7f0000004b40)) 05:44:21 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0/file0\x00', 0x8000, 0x1) open$dir(&(0x7f0000000340)='./file0/file0\x00', 0x200, 0x0) 05:44:21 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) chown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) 05:44:21 executing program 5: socketpair(0x1e, 0x80000, 0x0, &(0x7f0000001a80)) 05:44:21 executing program 0: r0 = socket(0x18, 0x1, 0x0) setsockopt$sock_linger(r0, 0xffff, 0x80, &(0x7f0000000000)={0x8001}, 0x8) 05:44:21 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f000000ab00)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000500)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x200000ae, 0x0}, 0x0) 05:44:21 executing program 3: r0 = socket$inet(0x2, 0x3, 0x0) getsockopt$inet_opts(r0, 0x0, 0x1, &(0x7f0000000080)=""/211, &(0x7f0000000000)=0xd3) 05:44:21 executing program 4: sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x0, 0x701, 0x0, 0x0, {0x6}}, 0x14}}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x1c, r1, 0x701, 0x0, 0x0, {0x6}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}}, 0x0) 05:44:21 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) read(r0, &(0x7f0000000080)=""/19, 0x13) 05:44:21 executing program 5: munmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000) r0 = msgget$private(0x0, 0x2) msgsnd(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x70, 0x800) socket(0x1f, 0x4, 0x0) msgrcv(r0, &(0x7f0000000580)={0x0, ""/18}, 0x1a, 0x1, 0x3000) msgsnd(r0, &(0x7f0000000100)={0x1, "7ab2c3244657c70b86600a74161f9cd197d93752d86bba2e65dbce720fa5495449aabe7c43e0ef836400508497a9b5200bec"}, 0x3a, 0x0) 05:44:21 executing program 0: socketpair(0x10, 0x0, 0x0, &(0x7f0000000480)) 05:44:21 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000180)={&(0x7f0000000080)=@abs={0x8, 0x1}, 0x8, 0x0}, 0x0) 05:44:21 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r0, &(0x7f0000000300)={&(0x7f0000000000)=@abs, 0x8, &(0x7f0000000280)=[{&(0x7f0000000040)="78037ebeadb2e3b7457db8f67f1f0a90bb754f9c19f09e100b861ceaa9c244a062e9ff870bdb620771a926daf6dcf51effb93b8febb747aa4f74c47c8d3926e452d3a9805448617ff18d9c02d9243c3cd10bbd08e724978bff1034615f45e548a03950346dc268836a82da18f43a9a23e5e04e39ae5fc20ef3bc9e20165ec1d1855b8e729997a495b36f275232e0d49e66584a", 0x93}, {&(0x7f0000000100)="e32c52fd112c44f7b167c2ebdd74c3502624214c29af1414bd93de9c4b409344b13d83b06bc735b6d954cf911cf944b3b2b17d53041d9cf69f237b239f3e38ffd20533c5c4af08491f74e33c685d9bd31a62f64ab90e3a2f01802a8bb0511d812566fd79a2893a56dd4ac4d3cd44200b694edf4107b6a0decb3e6f06b16ce584a5d438535414f60bca5ddd5d777ff18f2a5371f973fc43468279e830f674080b67b412eede4568160f66e1d82c4d8cb93312c5f855e6f567cfceb955152c1bce8006f613b859822c5400e801e59b3dbb478bfb9cce9a2f1a87f661b20ad9", 0xde}, {0x0}], 0x3, &(0x7f00000002c0)=[@cred], 0x20}, 0x7) 05:44:21 executing program 5: setrlimit(0x4, &(0x7f0000000140)={0x0, 0x52d}) 05:44:21 executing program 0: r0 = open$dir(&(0x7f00000003c0)='./file0\x00', 0x200, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) 05:44:21 executing program 4: r0 = socket$inet(0x2, 0x3, 0x9) sendto$inet(r0, 0x0, 0x0, 0x2000001, 0x0, 0x0) 05:44:21 executing program 2: socketpair(0x2, 0x80002, 0x0, &(0x7f0000000040)) 05:44:21 executing program 3: open$dir(&(0x7f0000000200)='./file0\x00', 0x19b442, 0x0) 05:44:21 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000340)=[{&(0x7f0000000080)="a5", 0x1}], 0x1}, 0x0) sendmsg$unix(r0, &(0x7f0000001c00)={0x0, 0x0, &(0x7f00000013c0)=[{&(0x7f0000000500)="dd6414ce6b2473c07726dbd056cd16ed075b6171e5b0488577b168a9befe3ab8b91c8ca44849bae977f85dd3c98614f6459027efd83d3d34be69ffe6ffc462367abf6f0e355e6be02993bdb808ab921388b7d1efecb473222af59cf932046d050ed28e053b235bd23b791f0702ac740c257a2e55ed293db27cd5d8dae4967ae7e7ab2912ea1a858180f420711f07618edf284d9934eb04861fd7d02fe56860d562dfbcf9b4cd8790ee236d165a2589772f39abb3eff31c4eb4626215fec361397897cc0509c5789f0b49a7e12c24d498063c34b0f240d8dda6d1b0e62a8464e6", 0xe0}], 0x1}, 0x0) 05:44:21 executing program 2: getrlimit(0x3ec04ed5c89c1adb, 0x0) 05:44:22 executing program 1: open$dir(&(0x7f00000001c0)='./file0\x00', 0x200, 0x0) r0 = getgid() lchown(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, r0) 05:44:22 executing program 4: open$dir(&(0x7f0000000000)='./file0\x00', 0x200, 0xfb9936a4b1e9647f) 05:44:22 executing program 3: mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) mlock(&(0x7f0000ffc000/0x2000)=nil, 0x2000) 05:44:22 executing program 5: symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000180)='./file0\x00') mknod$loop(&(0x7f0000000140)='./file1\x00', 0x0, 0x1) 05:44:22 executing program 0: socket(0x1, 0x0, 0x1) 05:44:22 executing program 2: semget(0x3, 0x0, 0x628) 05:44:22 executing program 0: socketpair(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r0, &(0x7f0000001800)=[{&(0x7f0000000800)="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", 0x801}], 0x1) 05:44:22 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000200)=@file={0x1, './file0\x00'}, 0x6e) 05:44:22 executing program 3: r0 = socket$inet6(0x18, 0x3, 0x0) r1 = dup2(r0, r0) setsockopt$sock_linger(r1, 0xffff, 0x80, &(0x7f0000001400), 0x8) 05:44:22 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) poll(&(0x7f0000000040)=[{r1, 0x4}], 0x1, 0x0) dup2(r2, r0) 05:44:22 executing program 5: socket$inet6(0x18, 0x3, 0x4) 05:44:22 executing program 0: r0 = socket$unix(0x2, 0x2, 0x0) getsockname$unix(r0, &(0x7f0000000280), &(0x7f0000001280)=0xffa) 05:44:22 executing program 1: semctl$SETALL(0x0, 0x0, 0x9, &(0x7f0000000180)=[0x0]) 05:44:22 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000015c0)={0x0, 0x0, &(0x7f0000001400)=[{0x0}, {0x0}], 0x2}, 0x0) 05:44:22 executing program 0: socketpair(0x2, 0x3, 0x5, &(0x7f0000000080)) 05:44:22 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000040), 0x0) 05:44:22 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) readlink(&(0x7f00000008c0)='./file0/file0\x00', 0x0, 0x0) chown(&(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0) 05:44:22 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvfrom$unix(r0, 0x0, 0x0, 0x7, 0x0, 0x0) 05:44:22 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) 05:44:22 executing program 1: socketpair(0x22, 0x0, 0x9, &(0x7f00000002c0)) 05:44:22 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) 05:44:22 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000000540)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 05:44:22 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 05:44:22 executing program 0: socketpair(0x2, 0xa, 0x5b6fb87e, &(0x7f0000000040)) 05:44:22 executing program 3: socketpair(0x29, 0x2, 0x0, &(0x7f00000010c0)) 05:44:22 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x54) 05:44:22 executing program 4: socket(0x1e, 0x0, 0x1c) 05:44:22 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) 05:44:22 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="392031274c231e22bb3fe3449098b6c8842922793e2ba90d8532a83728bf46a5f4d578481832ab16653d99f4e1a8ea796e0e84f335d0169cdab397bc914ed257ce80ac59ef0523c82ad61cbb89ab42087578588ebcd0a27cd610187cbe31c0fa6fd2b48c898a0a0163a094c72293a9ea19b38fe33cfe1523d9bbc2d3305c7a09782272cdc4cbb46da8c59cb271bb9b84be", 0x91}], 0x1) 05:44:22 executing program 5: madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x6) 05:44:22 executing program 4: symlinkat(&(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00') rename(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='.\x00') 05:44:22 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001e80)={0xffffffffffffffff}) close(r0) 05:44:22 executing program 3: syz_emit_ethernet(0xe81, &(0x7f0000000b00), 0x0) 05:44:22 executing program 2: mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x4015532, 0xffffffffffffffff, 0x0) 05:44:22 executing program 1: socket(0x0, 0x80016, 0x0) 05:44:22 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_timeval(r0, 0xffff, 0x1005, &(0x7f0000000040)={0x0, 0x1000}, 0x10) 05:44:22 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) close(r0) 05:44:22 executing program 4: mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 05:44:22 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) sendto$unix(r0, 0x0, 0x0, 0x3, 0x0, 0x0) 05:44:22 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000040)="86", 0x1) readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000080)=""/200, 0xc8}], 0x1) 05:44:22 executing program 1: setuid(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) 05:44:22 executing program 5: r0 = socket$inet6(0x18, 0x3, 0x0) setsockopt$sock_linger(r0, 0xffff, 0x80, 0x0, 0x0) 05:44:22 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a012e2f6669"], 0xa) 05:44:22 executing program 2: mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x81499a44f6877bf6, 0xffffffffffffffff, 0x0) 05:44:22 executing program 4: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) utimensat(r0, &(0x7f0000000540)='\x00', &(0x7f0000000580), 0x4000) 05:44:22 executing program 5: semctl$IPC_SET(0x0, 0x0, 0x8, 0x0) 05:44:22 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) bind(r0, 0x0, 0x0) 05:44:22 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) sendmsg$unix(r0, &(0x7f0000001540)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@cred], 0x20}, 0x0) 05:44:22 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)) 05:44:22 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x7ffffffff000) 05:44:22 executing program 2: mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1000000, 0x180132, 0xffffffffffffffff, 0x0) 05:44:22 executing program 0: open$dir(&(0x7f00000001c0)='./file0\x00', 0x200, 0x0) chown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xffffffffffffffff) 05:44:22 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) open$dir(&(0x7f0000000640)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x200, 0x0) chown(&(0x7f0000000140)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0xffffffffffffffff, 0x0) 05:44:22 executing program 3: mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1, 0xde070, 0xffffffffffffffff, 0x0) 05:44:22 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x0) sendmsg$unix(r0, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)=[{&(0x7f00000000c0)="ae71c49a9a4021a9b8ac455212f3be7e252733886d8fa08979fc85dfdd16d3a072ed6173c6a1a6ad69699dc87b18a4c1fca0bb5ed425c7b529bfb98d883874ad95b6eb6c737e03674e21890e34d9ca0645d688f382f06d0f9cb9ac2ed42810e0833c359bffe744902c64c16d4bdad4caf5898c6e5ff89491b8c468252054bf50e452862c1e51ccddeadf0b51c8f4b7ce34", 0x91}], 0x1}, 0xa) 05:44:22 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) sendmsg$unix(r0, &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)=[@rights], 0x10}, 0x0) 05:44:22 executing program 1: socketpair(0x3, 0x0, 0x3ff, 0x0) 05:44:22 executing program 0: r0 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmctl$IPC_STAT(r0, 0x2, 0x0) 05:44:22 executing program 2: symlinkat(&(0x7f0000000100)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00') rename(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='./file0/file0\x00') 05:44:22 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendto$unix(r0, 0x0, 0x52, 0x0, 0x0, 0x0) 05:44:22 executing program 5: r0 = socket$inet(0x2, 0x3, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002780), 0x10, 0x0, 0x0) recvmmsg(r0, &(0x7f0000002500), 0x10, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000500), 0x10, 0x0, 0x0) 05:44:22 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002e40)={0xffffffffffffffff}) poll(&(0x7f0000006740)=[{r0}], 0x1, 0x3) 05:44:22 executing program 4: r0 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) r1 = shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x6000) shmdt(r1) 05:44:22 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f0000000c40)="3f9bb28bc67a5f7e146371aabad62e12afee994332521909aa8f7e90fc727fb81bfeff1cede54ce30248c44adc413c4b28a12914f4be724fc3510c819e417b98c9d5105dd8fba48d84b84d85f20ca84051a0d28365f9613f75c5ffef7f4f27ac3c5c7293f2044843265d29514c9d394f546ff754ccc04cb37453fe4f0c3e7559c52a240ee36786a05a9400984a66db21b6", 0x91, 0x0, 0x0, 0x0) 05:44:22 executing program 1: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) getsockopt$inet_opts(r0, 0x0, 0x0, 0x0, 0x0) 05:44:22 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000080)="64554c7020b7e1d49aba53000000006e1e0069b52325a6ade4d2e99db5360c383e97868b8d4db2d1e846ec26bc342552f4be", 0x32) r2 = dup2(r0, r1) recvmsg(r2, &(0x7f0000002640)={0x0, 0x0, &(0x7f0000002540)=[{&(0x7f0000000140)=""/41, 0x29}, {&(0x7f0000000180)=""/9, 0x9}], 0x2}, 0x40) 05:44:22 executing program 3: symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00') utimensat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x2) 05:44:22 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000180), 0x0) 05:44:22 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000540)) madvise(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0) madvise(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x0) 05:44:22 executing program 1: syz_emit_ethernet(0x32, &(0x7f0000000000), 0x0) 05:44:22 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="23e590513fb30006b8f5c0363128a759ed7f9450ac5b1fea287ac59e4bca192ae5b609689252be1f69cd4fc51699f743ac566b01047b697aa73af7aa965b9a4a3e12d5bc0011b4b7ecc4e788765c779bc7d59515881c426b69b1e5f416c7b6efa016f1ceab9f1d7d1c764d47fff7a83421cf5be89cbeac5cd044721e0820ccb9d489e9d150ce03c500bcfa1576278f4a22", 0x91}], 0x1}, 0x0) 05:44:22 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0xffff, 0x8, &(0x7f0000000000), 0x4) 05:44:22 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002a80)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r0, 0x0, 0x0) 05:44:22 executing program 0: symlinkat(&(0x7f0000000100)='./file0/../file0\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0/../file0\x00') 05:44:22 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r1, &(0x7f0000000440), 0x10, 0x0) recvmmsg(r0, &(0x7f00000001c0), 0x10, 0x0, 0x0) 05:44:22 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) fchownat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0xee00, 0x0) 05:44:22 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0) chown(&(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0) 05:44:22 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) 05:44:22 executing program 0: r0 = open(&(0x7f00000001c0)='./file0\x00', 0x200, 0x0) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2, 0x10, r0, 0x0) 05:44:22 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$sock_timeval(r0, 0xffff, 0x1005, &(0x7f0000000180)={0x2}, 0x10) 05:44:22 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001040)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000001080), 0x0) 05:44:22 executing program 5: socketpair(0x28, 0x0, 0x81, &(0x7f0000000080)) 05:44:22 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendto$unix(r0, &(0x7f0000000140)="d9", 0x1, 0x4008044, 0x0, 0x0) 05:44:22 executing program 2: chdir(&(0x7f0000001000)='./file0\x00') lchown(&(0x7f0000001040)='./file0\x00', 0x0, 0x0) open(&(0x7f0000001480)='./file0\x00', 0x0, 0x0) 05:44:22 executing program 4: mlock(&(0x7f0000e95000/0x1000)=nil, 0x1000) pipe2(0x0, 0x0) mlock(&(0x7f0000e95000/0x2000)=nil, 0x2000) 05:44:22 executing program 3: mknod$loop(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchownat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0xee00, 0xee01, 0x0) 05:44:22 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000002c0)={0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000000400)="295137ca1d6e0bb63bbf2ef4305551582b88452830b1b6d0f3004073d0ac650e51e18566501441dd83dd8cf9784d2754ba435d64592d44c74810919fc9237d585580cb865d188bf09c2ee14696d0761809cca26d9e119aed9df3fdbf09e20c70414bb20ff437af3f6524588a3f03b5821cf93dd79a8affd9ac25b6cf423225ea9350d8fe090ffff7c43650b27c63f0d0a91036c100000000000000000000000000a413aa547b7ddb89ff5b97c15a2131acab", 0xb2}, {&(0x7f00000000c0)="b4b54270ecd888bd8e06a0c863235d43d2e99134b5838b17279ca1cb35d4b96ee7b6fc58a3dff73906f71478de53742e6e899ebc06811353148cdfc5ab3082b8c3aaa016ebb4377d7b7b2a4a8cdb849b60ee3153958cf8ed759b13774acab7f34ed777082097c08d32abeecbd3240abb", 0x70}, {&(0x7f0000001540)="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", 0x18f}, {&(0x7f0000001440)="d5d096cae5ac890fa6c20c3260c86367f5f44a3eca016fa46502050f2fe8eaf13904a6653227b8a9e6d2f2418193fff921df3570b7ca868fb3c7782178c1fde7b4d13ae6b16281797779b1e524770eb7a0e0d38074b9262d92fa5150c2112c7be7592859029f63395243c54465da45684a6977930f7400459c925da8a6c63c12cb4fbea8810ac20a5d7e2a0e8c74e908f1b32d8dd5aff42104bb22e9251da51c9dd8e20976c49b64e727e72706b6734f3c58e876fbc3ad00"/201, 0xc9}, {&(0x7f0000000500)="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", 0xc25}], 0x5}, 0x0) sendmsg$unix(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)="9cff6128f4c53fa40a77766a4b4d0caf1fba6d2109e06e1c0496898099d024f99fa424aabab284cb52d5299d4b69d5979dd32cfb420d5713b5991c3fff628b1cff2be4ce5fa550516120310e916b0976ac870df81f1f47dfbc325e1a571189939f3d", 0x62}], 0x1}, 0x0) [ 328.653505][ T23] audit: type=1400 audit(1677995062.735:396): avc: denied { map } for pid=17994 comm="syz-executor.5" path="socket:[63430]" dev="sockfs" ino=63430 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_stream_socket permissive=1 05:44:22 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f00000003c0)=@abs={0x8}, 0x8) 05:44:22 executing program 4: socketpair(0x10, 0x3, 0x0, &(0x7f0000001e40)) 05:44:22 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) connect$inet6(r2, 0x0, 0x0) 05:44:22 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) accept(r0, 0x0, 0x0) 05:44:22 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaabb86dd602fb1a7000803000000000000002dfd7eee3edaede95d0900000000000000000100ffff"], 0x0) 05:44:22 executing program 1: r0 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r0, 0x0, 0x1, &(0x7f0000000000)="60b30515eebc774bbd194b3734d6b0e7ff5fa55e1889af5fbbb11890f332986088afa47cd3b1e6607e6b02bd4c", 0x2d) 05:44:22 executing program 0: symlinkat(&(0x7f0000000000)='./file1\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00') utimensat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x2) 05:44:22 executing program 4: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaabb86dd602fb1a7000803000000000000002dfd7eee3edaede95d09ff"], 0x0) 05:44:22 executing program 2: madvise(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3) 05:44:22 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) getsockopt$sock_int(r0, 0xffff, 0x1008, &(0x7f0000000000), &(0x7f0000000040)=0x4) 05:44:22 executing program 5: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaabb86dd602fb1a7000803000000000000002dfd7eee3edaede95d0900000000000013000000ffff"], 0x0) 05:44:22 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000980), 0x0, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x2010, r0, 0x0) 05:44:22 executing program 0: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) fcntl$lock(r1, 0x7, 0x0) 05:44:22 executing program 4: r0 = perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x922000000001, 0x106) sendmsg$inet(r1, &(0x7f0000000fc0)={0x0, 0x0, 0x0}, 0x20000851) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = getpid() perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x4, 0xf9, 0x0, 0xff, 0x0, 0xf8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x4}, 0x19000, 0x0, 0x0, 0x2, 0x5, 0x0, 0x6, 0x0, 0x0, 0x0, 0x2}, r2, 0x0, r0, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000004c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:44:22 executing program 2: recvmsg$unix(0xffffffffffffffff, 0x0, 0xc0000002) 05:44:22 executing program 5: syz_clone(0x40000000, &(0x7f0000000000)="d008c1d5169dd65fc7eeba446697baffbe3fba2c67589ed888f8c2de8dbefb4ea2fc6e8d618de073156690cc0a285b79a781741486d243a96daeedef52339be3dd831410baf92f021a4175", 0x4b, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="2024c44240963608f41f566fe327eeeffeb41c9637802501c1b42131d0f6ce97618cf531c9") [ 328.777310][ T23] audit: type=1400 audit(1677995062.855:397): avc: denied { accept } for pid=18020 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_dgram_socket permissive=1 05:44:22 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000000440)='io.max\x00', 0x2, 0x0) gettid() bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000000)={0x0, r0}, 0x10) syz_clone(0x40200000, &(0x7f0000000200)="1167ee0fff3cd34557cd198ea2edf3da782b62c225df29788f8861b016a876a189aed7cc9e0ffd30eb46524e4bfedb697c8830b22256beb2ef48a0d25859e740771bf39000"/82, 0x52, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="60987bd580cfc8946fc33bf71ad9a8279371fed481cd082d1850581a267eacb5c4f14b858b3ce6b14d4b3af009320f497e269d3c8c546c750f0c9e7f72526fef04bedc2bc8d2bd7ec4f944c7e10add9a4b1370887f8bc799b71e4a47aa1b22c716ef71b10549d915cc35ac0898b2c31bc7032223733685fcbd5159c56fd2ebbd2564f53a3e842bf4ab17fb65c5cde43ad23d01c5f6f0ba") 05:44:22 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x1c, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:44:22 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) 05:44:22 executing program 0: clock_gettime(0x0, &(0x7f0000000040)) clock_gettime(0x6, &(0x7f0000000080)) 05:44:22 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x22241, 0x0) 05:44:22 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x801c581f, 0x0) 05:44:23 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1c, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:44:23 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000740)={0x6, 0x4, &(0x7f0000000500)=@framed={{}, [@alu={0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffff0}]}, &(0x7f0000000580)='syzkaller\x00', 0x6, 0xe3, &(0x7f00000005c0)=""/227, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:44:23 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x200400, 0x0) ioctl$TUNSETTXFILTER(r0, 0x400454d1, 0x0) 05:44:23 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x11, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xe0, &(0x7f00000000c0)=""/224, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:44:23 executing program 1: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'rose0\x00', 0x1}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x308) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f00000001c0)=0x6f39) 05:44:23 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x11, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xe0, &(0x7f00000000c0)=""/224, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:44:23 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'rose0\x00', 0x1}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x308) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)=0x6f39) 05:44:23 executing program 2: syz_clone(0x8002000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x40000000, &(0x7f0000000000)="d008c1d5169dd65fc7eeba446697baffbe3fba2c67589ed888f8c2de8dbefb4ea2fc6e8d618de073156690cc0a285b79a781741486d243a96daeedef52339be3dd831410baf92f021a41759d3bf9c5c367d0f2ad3147975b951964c606997b1414e95ef7dc69b97d3657bfdc8937023b9ade1509d9c57ab81e1351d2ff81cf05253e4eefeb02dc2b7bfea0fce818691a2f0731e6f4fa8ab508c7f68a65f53b4816f58d651a6dd21bb6d886816ef890", 0xaf, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="2024c44240963608f41f566fe327eeeffeb41c9637802501c1b42131d0f6ce97618cf531c9c7edd1b208") 05:44:23 executing program 3: syz_clone(0x40000000, &(0x7f0000000000)="d008c1d5169dd65fc7eeba446697baffbe3fba2c67589ed888f8c2de8dbefb4ea2fc6e8d618de073156690cc0a285b79a781741486d243a96daeedef52339be3dd831410baf92f021a41759d3bf9c5c367d0f2ad3147975b951964c606997b1414e95ef7dc69b97d3657bfdc8937023b9ade1509d9c57ab81e1351d2ff81cf05253e4eefeb02dc2b7bfea0fce818691a2f0731e6f4", 0x95, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) 05:44:23 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0xe96b, 0x101, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1}, 0x48) 05:44:23 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180), 0x200000, 0x0) close(r0) 05:44:23 executing program 5: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000300)={@map, 0xffffffffffffffff, 0x49}, 0x14) 05:44:23 executing program 0: socketpair(0x2, 0x2, 0x4, &(0x7f0000000040)) 05:44:23 executing program 5: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x700, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:44:23 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001640)={0x6, 0x2, &(0x7f0000000440)=@raw=[@ldst={0x3}, @jmp], &(0x7f0000000480)='GPL\x00', 0x3, 0x1000, &(0x7f00000004c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:44:23 executing program 0: perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x922000000001, 0x106) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000340)={r0}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8) 05:44:24 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) r2 = dup2(r1, r0) ioctl$TIOCGWINSZ(r2, 0x40087468, &(0x7f0000000000)) 05:44:24 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x7, 0x0, 0x0, 0x0, 0x410}, 0x48) 05:44:24 executing program 0: perf_event_open(&(0x7f0000000080)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:44:24 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00'}, 0x63) 05:44:24 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000001540)={0x0, 0x0, 0x0}, 0x0) 05:44:24 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000740)={0x6, 0x4, &(0x7f0000000500)=@framed={{}, [@alu={0x4, 0x1}]}, &(0x7f0000000580)='syzkaller\x00', 0x6, 0xef, &(0x7f0000000000)=""/239, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:44:24 executing program 0: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000100)="f9c67e29e2870e9ca08dd40743d0b3057f90c21422b1beea3baa41993c87ae5d0933db27317888624a2e296612c74969dd8a940bc8837e25c26520f717bee25a4d6749e9192c400000000cf8b4ccdbd83e1c34f76b5046c516c430ef36e060d9b0cf075d690873fc586b31b5bd94a5a5a38ad94f297d73906fd3ca87ce17671bd20000909a051263b5618ab252140774b7f8fb4def953f63cc", 0x99}, {&(0x7f00000001c0)="7718", 0x2}, {&(0x7f0000000940)="7c903be52cd6aa4c9f223d834cbf3bcb92e6d160d300a6c185d236543a3669f3dad8a25d261abe08da02316d6fcfaaffa6a63a8681c0f093ffc95498f369b957dce84c6d6a7913db1ab390d4f067c6ffffffffffffff7f2f8203002fae48c21c41392caaa98403d968395adc0a9a92207f8e7edcbc72b10711498af52f23b4bc880c23873e554757f32a17f598244ced2038e77269f8df62a4f15ded7b4daa9032d70f88eee6c8cb8d9576cdea3d1b9b2faef8faf56dc1cbae9dc864cd80d8fa9b7f627e547d9f9b0e5c1cbcc8dfee4574911ef33a0d219d840000", 0xdb}, {&(0x7f0000000b80)="62534386b600d73db3ebaaa6e2ca04cffbd763c44b96cdaf5864d243507b0e3fd7b2d0ff47e1d5bf7b229fe1b9081edfa3cb556d75e9de8ea6c25e0502d0d5c29ada90daa042f1b29169dd94b479d0570626a5dd8fd01ea693bae985b11de8456c63a7f90a25a2882d8caeb5e584557a615e3f43a73f51a731db383783c9784925fb32c5e0af849b508367335f2acca704741ea1c3c1e0d65e00badd5373aa80408b6a7513632e397ed8e0b208a9744231ec0deb9c928c08bc4bd282a0feead6f9", 0xc1}], 0x100002e7, 0x0, 0x0, 0x4}, 0x6) 05:44:24 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000100)="263b52f3b1686bcf5ee7464d3cfede22db711d704c5569db3035e09ca235bd1521af72b5373ec977ec6943dd8c3cf7a7c16cc16633d5a8957c9f0b4e2ff179c3abfa4568b672a49573b783c2fd92c9fae5aead839d3b91179f94d1321afadf2b2e8df54ff1f83792ed8ba705fe13ebd07100ef46bd055c68f33d4abdcdc3d56fa663fe4db67f", 0x86}, {&(0x7f0000000240)="95cde35db8e574cf1229c9", 0xb}], 0x2}, 0x0) writev(r0, &(0x7f0000001800)=[{&(0x7f0000000280)="d1c741eb19d00dcc00051a190afc3227d63cb191bd004f3c55bddf92ddff3b49779143db94d4d5c241e2c21a1d4dfa2e066f327dc1a416814e0421ba242c5d2719f405c57e06a39f8f59ac536116af7435391c968cbe3a7a2fd8d79c6a1c89f393c8721e15913c70dfb175151bd571561ecd48c4193550c88c49797c", 0x7c}, {&(0x7f0000000480)="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", 0x185}], 0x2) 05:44:24 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000380)='memory.low\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f00000003c0)=0xffffffffffffffff, 0x12) 05:44:24 executing program 5: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000380)='memory.low\x00', 0x2, 0x0) write$cgroup_int(r1, 0x0, 0x0) 05:44:24 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000001400)={&(0x7f0000000180)={0x2, 0x0, @empty}, 0x10, &(0x7f00000013c0)=[{&(0x7f00000001c0)}, {&(0x7f0000000280)="70817af307f19bb2a298db2598cb23dec59b64fd7d6cad9effe1dbabb7bf868873d21ecee02d3f55e32bf2467acb0079c5b7ad6e77d66829a29f4ed1f9baa7e32533f27c973fe056c338016e215054b068f267d74a508683a2e78593c1d792fccd8e73cef1423f6d", 0x68}], 0x2}, 0x0) 05:44:24 executing program 4: pipe(&(0x7f0000000000)) munmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x1010, 0xffffffffffffffff, 0x0) 05:44:24 executing program 0: munmap(&(0x7f0000fff000/0x1000)=nil, 0x1000) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x6) 05:44:24 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000002480)={0x0, 0x0, &(0x7f00000021c0)=[{&(0x7f0000000080)="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", 0x784}], 0x1}, 0x0) 05:44:24 executing program 2: r0 = semget(0x1, 0x0, 0x0) semctl$GETPID(r0, 0x0, 0x4, 0x0) 05:44:25 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x0, 0x0) 05:44:25 executing program 1: open(&(0x7f0000001280)='./file0\x00', 0x200, 0x0) truncate(&(0x7f0000000000)='./file0\x00', 0x0) 05:44:25 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read(r0, &(0x7f0000000040)=""/201, 0xc9) 05:44:25 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000001300)='./file0\x00', 0x0) execve(&(0x7f0000001080)='./file0\x00', 0x0, 0x0) 05:44:25 executing program 3: select(0x2, &(0x7f0000000080), &(0x7f00000000c0)={0xfffffffffffff781}, &(0x7f0000000100), &(0x7f0000000140)) 05:44:25 executing program 0: setitimer(0x0, &(0x7f0000000680)={{0xffffffff}, {0x0, 0x2}}, &(0x7f00000006c0)) 05:44:25 executing program 4: r0 = syz_open_pts(0xffffffffffffffff, 0x0) pwritev(r0, &(0x7f0000001a40)=[{0x0}], 0x1, 0x0, 0x0) 05:44:25 executing program 5: semget(0x0, 0x4, 0x608) 05:44:25 executing program 1: syz_emit_ethernet(0xfbf, &(0x7f0000000080)={@local, @remote, @val, {@ipv6}}, 0x0) 05:44:25 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) shutdown(r0, 0x0) 05:44:25 executing program 3: r0 = socket(0x2, 0xc002, 0x0) setsockopt$sock_linger(r0, 0xffff, 0x80, 0x0, 0x0) [ 330.960781][T18135] process 'syz-executor.2' launched './file0' with NULL argv: empty string added 05:44:25 executing program 1: r0 = getpgrp(0x0) setpgid(0x0, r0) 05:44:25 executing program 0: r0 = syz_open_pts(0xffffffffffffffff, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) 05:44:25 executing program 2: r0 = semget(0x1, 0x1, 0x0) semctl$GETPID(r0, 0x3, 0x4, 0x0) 05:44:25 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_timeval(r0, 0xffff, 0x1005, &(0x7f0000000400), &(0x7f0000000440)=0x10) 05:44:25 executing program 5: syz_emit_ethernet(0x2e, &(0x7f0000000040)={@empty, @random="0f10b08f1f3f", @val, {@ipv4={0x8100}}}, 0x0) 05:44:25 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000200)={@broadcast, @random="37654c57e22d", @val, {@ipv6}}, 0x0) 05:44:25 executing program 1: semget(0x2, 0x2, 0x240) 05:44:25 executing program 0: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sync() fchmod(0xffffffffffffffff, 0x0) 05:44:25 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000780), 0x0, 0x0) close(r0) readlinkat(r0, &(0x7f00000011c0)='./file0\x00', 0x0, 0x0) 05:44:25 executing program 4: symlinkat(&(0x7f00000001c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00') readlinkat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) 05:44:25 executing program 5: r0 = socket(0x18, 0x0, 0x0) getpeername$unix(r0, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e) 05:44:25 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) accept$inet(r0, 0x0, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f0000000000)={'ipvs\x00'}, &(0x7f0000000040)=0x1e) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000100)={'filter\x00', 0x4}, 0x68) r1 = socket$inet_udplite(0x2, 0x2, 0x88) accept$inet(r1, 0x0, 0x0) ioctl$sock_inet_SIOCGARP(r1, 0x8954, &(0x7f0000000080)={{0x2, 0x4e22, @broadcast}, {0x1, @multicast}, 0x56, {0x2, 0x4e24, @multicast1}, 'ipvlan1\x00'}) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f00000001c0)={0x6, @rand_addr=0x64010101, 0x4e20, 0x0, 'lblc\x00', 0x8, 0x80000001, 0x45}, 0x2c) 05:44:25 executing program 1: mmap(&(0x7f0000ffa000/0x3000)=nil, 0xffffffffdf005fff, 0x0, 0x10, 0xffffffffffffffff, 0x0) 05:44:25 executing program 0: socket(0x21, 0x0, 0x7f) 05:44:25 executing program 2: syz_emit_ethernet(0x22, &(0x7f0000000000)={@broadcast, @local, @val, {@ipv4}}, 0x0) 05:44:25 executing program 5: r0 = epoll_create1(0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000240)={0x10000000}) 05:44:25 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sched_setscheduler(0x0, 0x3, &(0x7f0000000bc0)=0x4) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$loop_ctrl(0xffffff9c, 0x0, 0x0, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f00000000c0)=ANY=[], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x1, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sched_setscheduler(r0, 0x2, &(0x7f0000000b80)=0x3ff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0xc1}, 0x40004) ioctl$AUTOFS_IOC_CATATONIC(r3, 0x9362, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000c80)=0x9) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = getpid() r6 = getpgid(r5) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r3, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000540)=ANY=[@ANYBLOB="17000000", @ANYRES16=0x0, @ANYBLOB="04002bbd7000fcdbdf250b000000"], 0x14}, 0x1, 0x0, 0x0, 0x48000}, 0x8000) syz_open_procfs$namespace(r6, &(0x7f0000000040)='ns/user\x00') newfstatat(0xffffffffffffff9c, &(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x800) r8 = gettid() socket$netlink(0x10, 0x3, 0xa) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000c00)={&(0x7f0000000d00)=ANY=[@ANYBLOB="4000000036e60008dbdf2500000000", @ANYRES32=0x0, @ANYBLOB="0700d5cd0900ecff010005000600050001ff00000a0001006e6574656d0000090000050000c100006c0b0137ae47472147749412127c97d23dedf601ba0ebd8e2066a65e85406b6404361d37b5d1f56982a8fae6940a9a7598758a"], 0x40}, 0x1, 0x0, 0x0, 0x4008}, 0x20000040) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000ac0)=0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net/syz1\x00', 0x1ff) sendmmsg$unix(r1, &(0x7f0000000b40)=[{{&(0x7f0000000380)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000940)=[{&(0x7f0000000400)="81c0f5d740c99112462400e7f6ca4a36e448a9cee55cd26a4a57c74d6a446e968ca7f68422857f28fab4dd079935f72463aa42589adf4a68603aa8429ec5141250650055", 0x44}, {&(0x7f0000000280)="b39ef68ba3f281b533", 0x9}, {&(0x7f0000000480)="d559d8cfc9a3bf3a291eaebfa6da4d9c3689d0859377fedd5441f646fb318e50103651c11662bd3602d3b164f887bcbd8e6865973276f5e0", 0x38}, {&(0x7f00000004c0)="9d1a7ecdfb46d2e45dbe7d996c884c658b2010579e213ff6fd3c7885e952ca", 0x1f}, {&(0x7f0000000500)}, {&(0x7f0000000600)="0de64dcb6d7a49a5c2bb81f68c4c5648a1b12baa13e7f0d5cbbbe8953a541820741a06d3ad9109c59178270dd39604e27fdcc2948596fc50ecc46db6da149ced58deed2c565fcdbe05db571014b86a2c8bc7fc8d07527f33d29eda4f5becf4f385c4330a6b1f3b0e194d1cb67039ac5f5a9e9cf949dffb3c576df37428b7297e0500a05fe227082751295b601b2128a41749b3fd4b6b2ee287d0f5da6e8ad71dd321473a2cbb0086f2d7e373920865aff4dba9c5125bbb64cf723cb4778a36c90649def4716f3c09c3052109e10e657957", 0xd1}, {&(0x7f0000000700)}, {&(0x7f0000000740)="4e68a39a78a6a9d0802f7c9e6d7baf2c0b4a5f1a639f", 0x16}, {&(0x7f0000000780)="e5b45b477ae4e1ca7865144a148a375a8f928e606a072081aaeb0dc7bf5016c48e9b815cb9c7b8dec8ba71c7eae78e1dfa89fb74b6a62afeea69a73c15a1b457feea8b672490e61ad26f6e09052455f3b62d84abe7533253bf75d2af62d1597bc144845ecc54ad14d2faf42b928666725dab5a4c84ebebbc1f04656f6c449214c5ba3046e4a52560e3e30e96724226f82dc548a9bfb2cf1154d5ae37b52454e25dd63f8d73", 0xa5}, {&(0x7f0000000840)="9c6b46c14ed8c327440b1647676996a5ed1945d19366590d504e024c6879b43294381bba9c0007edb3375c1aa77a89b89d9e87e623379e684cc8222f8d4309e154be8034cefc602a2399b954befe2fa39f0a8d0e66329e0367f1fb6040a456e06792de1a23af8843c86ac19e71bb753d756064cae2a677ed0a8041d592ed43b07745d57359207cc39d573031a421d2890ef509534bffd39c25db5eb41ca06b0af052547ad82151718ee2ba2eef552902c6bb4950fdc1eed36ec6", 0xba}], 0xa, &(0x7f0000000b00)=[@cred={{0x1c, 0x1, 0x2, {r6, 0xffffffffffffffff, r7}}}, @cred={{0x1c, 0x1, 0x2, {r8, r9, 0xee00}}}], 0x40, 0x20000880}}], 0x1, 0x4000800) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xffffff81}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}, @IFLA_MASTER={0x8}]}, 0x40}}, 0x0) 05:44:25 executing program 4: r0 = epoll_create1(0x0) epoll_wait(r0, &(0x7f0000000080)=[{}], 0x1, 0x80) r1 = socket$inet_udp(0x2, 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)={0xc0002006}) 05:44:25 executing program 2: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000140)='./binderfs/binder1\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000280)={0x8, 0x0, &(0x7f0000000180)=[@decrefs], 0x0, 0x0, 0x0}) 05:44:25 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f00000000c0)) 05:44:25 executing program 5: r0 = epoll_create1(0x0) epoll_wait(r0, &(0x7f0000000080)=[{}], 0x1, 0x80) epoll_pwait2(r0, &(0x7f0000000040)=[{}], 0x1, &(0x7f0000000100)={0x0, 0x989680}, 0x0, 0x0) 05:44:25 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000002c0)={0x28, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x10, 0x2, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}]}]}, @ETHTOOL_A_STRSET_HEADER={0x4}]}, 0x28}}, 0x0) 05:44:25 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/kernel/notes', 0x0, 0x0) read$watch_queue(r0, 0x0, 0x0) 05:44:25 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}]}, 0x1c}}, 0x0) 05:44:25 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001940), 0xffffffffffffffff) sendmsg$NL80211_CMD_CHANNEL_SWITCH(r0, &(0x7f0000001300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000012c0)={&(0x7f00000001c0)={0x10ec, r1, 0x20, 0x70bd27, 0x25dfdbfd, {{}, {@void, @val={0xc, 0x99, {0x35, 0x80}}}}, [@NL80211_ATTR_CH_SWITCH_COUNT={0x8, 0xb7, 0xdd}, @NL80211_ATTR_CH_SWITCH_COUNT={0x8, 0xb7, 0x84}, @NL80211_ATTR_CSA_IES={0x105c, 0xb9, 0x0, 0x1, [@NL80211_ATTR_CSA_C_OFF_PRESP={0x12, 0xbb, [0x100, 0x3, 0x7f, 0x6, 0xffff, 0x9, 0x2]}, @beacon_params=[@NL80211_ATTR_IE={0xd3, 0x2a, [@ht={0x2d, 0x1a, {0x400, 0x0, 0x5, 0x0, {0x3, 0xe10, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1}, 0x8, 0x80, 0x81}}, @supported_rates={0x1, 0x6, [{0x64}, {0x1b}, {0x36}, {0x30}, {0xc, 0x1}, {0xb, 0x1}]}, @mesh_config={0x71, 0x7, {0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x7, 0x20}}, @ssid={0x0, 0xe, @random="9e1275ab117049c0dcf865324b1b"}, @mesh_id={0x72, 0x6}, @chsw_timing={0x68, 0x4, {0x80, 0x6}}, @ibss={0x6, 0x2, 0x8}, @fast_bss_trans={0x37, 0x7b, {0x5, 0x1, "5721e3217b2cb87d87c54b47a4e58268", "3288a164dc2e3c7248412d1e4cf00f7ba26db0f9cfdd909644b5c4216d0dee4d", "f598174570f71f5a900c9c482dff48de8bb1f98c5b80b76b7a52ae827ae4e8f4", [{0x3, 0x27, "c5c9b036e40802f05cb39531056235537f0be6fca8fb7e0e48a13a757d4cde7cfde256f72291da"}]}}, @erp={0x2a, 0x1, {0x0, 0x0, 0x1}}]}, @NL80211_ATTR_FTM_RESPONDER={0x10, 0x10e, 0x0, 0x1, [@NL80211_FTM_RESP_ATTR_ENABLED={0x4}, @NL80211_FTM_RESP_ATTR_ENABLED={0x4}, @NL80211_FTM_RESP_ATTR_CIVICLOC={0x4}]}, @NL80211_ATTR_PROBE_RESP={0x584, 0x91, "2c5336f2e0bb43fb1b8055ac653674f45c5517a5526c42f767b9ac6f6a0001a48aeb491007a83e463bd2167c4808e03488a525129683c699198f00265811ad45ed6545e77804edd8b98f7a3d42b6eaa90a8dc4aa0dc6b290759a583fb2adad4b76f342e2e63398fee824ca39f727e0a6a4dcfb48dc8dd541be73613945533b12bbef85e3e027d377f96544be1c4959d579d5f6e75f4f9bf43d55dc3ad129817636d91865ed7167185975680e3670920777c73aa4548537b5b90e9cb5ba3b2e45eb13a17bd9de9136eb262350d6b0a1bb85b8788d1b96bb1d5ede722860bde0b9d51b06484f35aefaa59f2fb47b680ae1dfab845a3fc6ea590bf39c78244bab8e27967dd291416824de270b1492e82ed915296e0fdfe0e8ad1044f7135e7ee22ef8ea1c79ff3089251321ea2078f434dc5217806db39a85f011229ac9babe73bdb248c0121c513acee39b9e83e195ab5d7882315cfc9bb05e06ff394bc89f742be26aff2799609c2ad0a3cbe95c16ba05d23aafbc99ed6ce6077cb1694b6cd3f216ee9cd84042bf215db1f4b54da8116b8f7148508b43db80e3c011e34d361ba252cd3da03f8133bd6f6a0d5ac29675c81a1c5b804b3a0c9aa0fad9453d72e2da49a4e587946301da2369076b924bd172faaf350e89c72b34f44f1bbc681b2098dbdf49842a63c4ba663c6a2321ec186171419659f7d1af93e3995e9fb2470684a8442908200976203e13f58cd5d8e1dd948accd1519c2865ccd9a6195c3322a3566108ea0cc236e0d0a21f2e5646e27a9f366a9f0ebefbc57195350af59498b0b8569652157e79d7995de8e6998e3cac891e014fc125b96703e09777488e42d7b1ae7512173f96cbdf5cab9f823c94d181fa105194db5804e47c1336e95eba45f11c4ab765d734a7b91ef9f9712ca05b983b00335c07dcd9b15dd74cc6fbedfed0d458c154781c94105dfd539938df252f16784a67f111a857c8a9c0076fe2ebbb5cff42b4e439f4bf6b33d16d1d1887b645edc2146aa5c04e85a34dbfce5d8d62809215365c3f2599390d3705c1f19a6dd2c7a9d4c558021043773b4da2624f3b89a683cb5eea09094ca8950f454e7d4ce2e87d8e58bf302fdac8b0c7031dccf13505a6b0e3d2138bf02a7dcafdefa85cceee2381c8e094bf42ca7fec3700b895a67fb9d5bdb9a064a149b073ff75775c3db1d519ffd884ca35d60d31451d634306f192902a49978f0ef42960766758011fbe54f200eda710d6700a1d656b8cbc9e740f821e016c25cf9c8b2a1d3b0c5d7289fe52eac845ca54e7b4b7e5ea53a3584d1d8596d5bf754fe0b8e1725966800230555c05d7229349a8c5f30e63c2902f3e12ab031ce24b23b206d6c274b5256b19992f20ca417170d57f3e40102e75531d2e04d48b0271423af1f6d03aecfeabd01e5911dd22e5aa1c5a6e21644368aa72062a0782c86c1d9d39d2c26b7d6b9609f2bdd8f98b03e392e508f21f982232697de08f32e29936465bfb9976187c27448f6ddc17c762a7ad9398eb96ca88a6521887458346d12966ec6c049871f92b00768a85519d39c340fcf779831ebc8545d1df90201698bfc2abe51322b2ed10d8422eb88f16713628515d831abeb9090aca1728e0bd492f05c750ffdf0bc3263d83ce7de373025ad9911fc3cef362f3c59e7dcbc161a2b23a8142f3927372a4a70f423efdd89f0cc72847244a0a14f5144894f3d0b77f3ee82b0287dfe5bca081d2ee0307015e5f599b65900866d170227e7163c7845f6b6a47acdf9ba86a76877935e0ad3c60488e01ece4cf0ac0576c259775a6ed7fe3feb6924e46945ae1f5d9f83cb0da9115dea5a8b4ad27da6bd9bdd6f7cdb8f737b4ff03207ad6dd10f47ee7864f80683c84052a5826d8980e3c7aecac01b00070dfb2558986039d4f5027dedf4793894965b38fce53d3fb9faecbd5758e5beae258504246f6cf00a402d3299ec04ff161708aae02e014"}, @NL80211_ATTR_BEACON_TAIL={0x5e, 0xf, [@ht={0x2d, 0x1a, {0x1000, 0x0, 0x6, 0x0, {0x7, 0x154a, 0x0, 0x6, 0x0, 0x1, 0x0, 0x1, 0x1}, 0x6, 0x7, 0x3}}, @mesh_chsw={0x76, 0x6, {0xfc, 0x11, 0x3f, 0x821}}, @rann={0x7e, 0x15, {{0x0, 0x35}, 0x9, 0x5, @device_a, 0x3, 0x17f7, 0x7}}, @rann={0x7e, 0x15, {{0x0, 0x9}, 0x8, 0x1f, @broadcast, 0x3f, 0x8001, 0x2}}, @mesh_chsw={0x76, 0x6, {0x81, 0xfc, 0x4, 0x5}}]}, @NL80211_ATTR_BEACON_HEAD={0x33a, 0xe, {@wo_ht={{0x0, 0x0, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1}, {}, @broadcast, @broadcast, @initial, {0x0, 0x5c}}, 0x6, @default, 0x4, @void, @val, @val={0x3, 0x1, 0x40}, @val={0x4, 0x6, {0x81, 0x3f, 0x4, 0x9}}, @val={0x6, 0x2, 0x3ff}, @void, @void, @val={0x2a, 0x1}, @void, @void, @void, @val={0x71, 0x7, {0x1, 0x1, 0x1, 0x0, 0xffffffffffffffff, 0x1, 0x28}}, @val={0x76, 0x6, {0x7f, 0xff, 0x1b, 0x3}}, [{0xdd, 0xee, "223940bbfb2517792053ab79a4dccc76456ce3a4e5157c5b57df81446f843b43b571756ca52598aa931463d2dcbcba65b17473da00aee90951a41a5ea56f067bf08ec40b32b84ec959d35d9b1a4e28d0a4ea4eb7de3b39ca8fcb2bed2322262a43c268637188f7c8f27ccb81bc39bc29f6e90969b2dce9970a3ee7c449fdb36b78a66fd166edc89fa26785d664e9b4036e079e9319aac7d82f1a91e9496bbe504d7e90df26ed0f3a64a48a48bde4b49bb34a0f462f0d5e4abbe3d2a760fdf9389cdccb66bde5aae4770234e0d631fadd81bf3158ecc83ef9bf84b6ebbce32c1ba1d4f507a01c77bd93f71ca082b3"}, {0xdd, 0xcb, "7c974291b533c4047e8fc16d9485091be00261219acbd4657a08f711087a32902881c256dcb307c226e3198e3f5ffe274a5dd31412e67746db9921e1d55c96b229daaf1537fde0c9b640fa051bbd73f9be847d7b223a290ac11760a9f67df727b9b832a36cef77724b9854acf012c2c544c762d6da397ce643334957f6b5192f4ca00a9cafb1c480e5bcdfd1ac63b767f03b7bf3739e8cc585154b096d821c980e323aa04d48e56af03b3fa35397c559e935ff3ccd5ced5a68908c3509d5c2e2ba225fe0b82b8c02c5e7ec"}, {0xdd, 0xa8, "1fbd96ad6cc78a9397072707f7c2bc3925bcc041072eeda85e14c3e119f78a4fda9d359147967b92a5fada7a4dae6d82ded60b6d872df828cc0696bd315379643cfac9eb56af7a018de9a9fe78d3b27ad8af80d2cd04695edbb9f925c165465daecff257aa013aec46bf5b2b5293660121b2a6cc3236869b9103512321b6e12dfa8f9f6a044b617c10a92bccff05aaff653bcf099161bb528d925355d5b0083c9f316874b358bbe5"}, {0xdd, 0x84, "c53c307967582ea8e8ad785335915b6788a3cd933a6a8ba4b84530355945d8e3b7989b8b12152cdaca3c2adc7cef30dfe4babb10e972aa5c1a64f2ee17a1b9c88c558dcc243cafa8a1143b7597ecb98655b4af5b3319854b1d93e7d7811e08cd47a425e400dd08c7005f48b1219ed5eeeb50f57528b1cc2b91a7f5f78c4ac69a994502ac"}]}}], @beacon_params=[@NL80211_ATTR_BEACON_HEAD={0x48a, 0xe, {@wo_ht={{0x0, 0x0, 0x8, 0x0, 0x0, 0x1, 0x1}, {0x9}, @device_a, @device_b, @random="630dc4bd70bb", {0x0, 0xffb}}, 0x4, @random=0x6, 0x8889, @void, @val, @void, @void, @void, @void, @void, @void, @void, @void, @val={0x72, 0x6}, @val={0x71, 0x7, {0x1, 0xffffffffffffffff, 0x1, 0x1, 0x0, 0x86, 0x49}}, @void, [{0xdd, 0x4f, "3808112b628fbdd1e16689ed511c38469f8ee980770a78ef75f17e30edcfadab647562662555ba43999c0104c4ad1851899c68cd4442f3d3e73de623ea3af5be7792c0c0fe6531f53dddf73a01d93c"}, {0xdd, 0xfd, "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"}, {0xdd, 0xa8, "3c1dda6357200cdf96c0c6576609bdd62190492c787b103a05348004c75501a7b4eba812aea2cebfd10299fda3eb52d92f99ae93bf89c7947ab9d0c8a98a4460bfd36a9e770d0aa5d3fd3105097e15ff1cfedfaa3a3f14c9a5b94a097b62138afbbf98f7a3189803ebdba4c2674c33503dfa287ee19f3a797dca7bec268ed82517dd82a8bee4e360e7378a294f0fd11c470a0b64d16d38271cf84a49378b3c1fa6d1e3dc0d60c68a"}, {0xdd, 0x30, "35ebba41f59be06df9241f5479cdf63c02ac6e1bcd05790c086ee79168fa33256dfc1bd0baa0eca56ba6f33c5e26dfdf"}, {0xdd, 0xfe, "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"}, {0xdd, 0xf4, "da7ac04ad2702246bf6187e0abc0868d52720a07bfe83fd4666e0359ae6eaeeb225d60cffc1ae0f2c30fa3a7a8e1c35fdd4b4fbb56e090c46eb28fd5f72c44064732b5b69411ea2ab73e7f7429b04bfe5437bfbc1f8d40f3ba752382a06d95f9cb6b2c44c751f327b4b580f2f856b2cc4ffd40f44972b67e3574c00aeacc2e0b5922fa2191bc9f9481c2a72c3d775b7a118ef060b26034c490f773f9999ad8b145a0bd8d33051204b3cfee42fd96663ea3a0ac052f89ec6dbebf2ebd281a4d35415368acd8a630bfc54429ab48dac590679111f28e2d38a1f820f86b36a2b37b25546502a4d7da87c7ecf483a8508874b02c357d"}, {0xdd, 0x2b, "59a82e1f47cd8cc8e0e95cebc642278059d713a451dfe5ec543ce586241c40a94a62b7acd01837fda53423"}]}}, @NL80211_ATTR_IE_PROBE_RESP={0x1a7, 0x7f, [@challenge={0x10, 0x1, 0xf1}, @fast_bss_trans={0x37, 0x152, {0x7f, 0x9, "4ca55416fc90655658572a3e72f8bfa2", "12fcffa634d7215d884e4950971d857e06d988999e4425a00225e266fde4468b", "5b31c8182b7b56b3024379fa029af9223ec9991fd31c488e06ed7b566118dae6", [{0x4, 0x1c, "ca440f01d0a92ab27c9fcdc32f82fba0a9c5653cbe1fe21fe37b45e2"}, {0x1, 0x11, "4f6cd6509a2523b3f54449365256ff8d04"}, {0x3, 0x28, "c3389bcbf71617b8fb94eef23d423f336790a0d9c846e8b9a7dc0c459f970dc48f73219d36a218e2"}, {0x3, 0x21, "def7bc84ec5c19c8517d52ff01702f7f8683387348f49310f9c472ed7009619272"}, {0x3, 0x27, "8c69dce2b18662cac9d447d3fd196149950fe87bf982db9bf5232e4d12e732ae170a06d779667f"}, {0x3, 0x10, "4504942bfba4a5030de0d78b506a5692"}, {0x1, 0x1d, "0b6d19c3a5ea21dbc5fad76d8e84f0ff63e1b74195c27282a51f2119d7"}, {0x2, 0xa, "c8571543643990664940"}, {0x3, 0x1a, "30a8eb63a971d6a2f998483b77f643f66d1e260bc7c12354860e"}]}}, @measure_req={0x26, 0x4a, {0x3, 0x0, 0x1, "c65810a566db5228fc7e574adc48f208e88cd81bf079074d2e0dce59ec6c76cb4e4335fe4b682f1f27cdbf8e85a06ee55bd5ca9dd94f9c47a3942a1d1bde0c7b299adac6019610"}}]}], @NL80211_ATTR_CSA_C_OFF_PRESP={0xa, 0xbb, [0x0, 0x1, 0x7f]}]}, @chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x999}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x25}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x35}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x9}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1720}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x1000}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x5}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x3}], @NL80211_ATTR_CH_SWITCH_COUNT={0x8, 0xb7, 0xd2}, @NL80211_ATTR_CH_SWITCH_COUNT={0x8, 0xb7, 0x4d}, @chandef_params=[@NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x1}]]}, 0x10ec}, 0x1, 0x0, 0x0, 0x4000000}, 0x80) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000001340)={r0, 0xe5e8, 0x7fff, 0x1}) sendmsg$NL80211_CMD_TDLS_OPER(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000001a00)={&(0x7f0000001380)=ANY=[@ANYBLOB="38007f00fcb5", @ANYRES16=r2, @ANYRES16=r1], 0x38}}, 0x0) splice(0xffffffffffffffff, &(0x7f0000000080)=0x6, r0, &(0x7f00000000c0)=0x7fffffff, 0x5, 0x8) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x9, 0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="b4000000000000006a1143857caa0871b3460000000000009500000c00000000554ab8d8a1193333438c83843730bd9ae22f0a2b0c51e4e16224f556cab87bb1c084344bebb73af0bc3265eb1e686559ee601319480156f13d84274c75f581de831c9507ceeeedf974c2ffac762bb279cb41f27091a3035e14a42ed86f0e2766bb65ea989e14de44e00953a392416d41386fe4407d93c14c4b2e873f03840de7bb69cebedd94b5c8d6a7ce33e6"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff7c, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) 05:44:25 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4704}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f0000000ec0)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) unshare(0x40000000) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @remote}, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x10}) r4 = socket$netlink(0x10, 0x3, 0x0) writev(r4, &(0x7f0000000040)=[{&(0x7f00000000c0)="390000001300094700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r5}, 0x10) sched_setaffinity(r0, 0x8, &(0x7f0000000100)=0x8) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) sched_setscheduler(0x0, 0x6, &(0x7f0000000340)=0x100) getpgrp(r0) sched_getparam(r0, &(0x7f00000002c0)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000780)=0xc) sched_setattr(r6, &(0x7f0000000880)={0x38, 0x0, 0xd, 0x100, 0x8, 0x0, 0x1b6d, 0x0, 0x4, 0x92ed}, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="240000001e00ff3bd90ea7eff078", 0xe) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000380), &(0x7f0000cab000)=0xc) accept4(0xffffffffffffffff, &(0x7f0000000940)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000400)=0x80, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000800)=0xc) [ 331.213039][ T23] audit: type=1400 audit(1677995065.295:398): avc: denied { getopt } for pid=18186 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 331.233059][ T19] IPVS: starting estimator thread 0... [ 331.319553][T18188] IPVS: using max 2400 ests per chain, 120000 per kthread [ 331.331834][T18204] wireguard0: entered promiscuous mode [ 331.337476][T18204] wireguard0: entered allmulticast mode 05:44:25 executing program 2: pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) keyctl$KEYCTL_WATCH_KEY(0x2, 0x0, r0, 0x5e) 05:44:25 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x2, 0x0, 0x0, 0x0, 0x2, 0x2}, 0x10}}, 0x0) [ 331.775130][T18214] netlink: 'syz-executor.3': attribute type 4 has an invalid length. 05:44:26 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sched_setscheduler(0x0, 0x3, &(0x7f0000000bc0)=0x4) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$loop_ctrl(0xffffff9c, 0x0, 0x0, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f00000000c0)=ANY=[], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x1, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sched_setscheduler(r0, 0x2, &(0x7f0000000b80)=0x3ff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0xc1}, 0x40004) ioctl$AUTOFS_IOC_CATATONIC(r3, 0x9362, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000c80)=0x9) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = getpid() r6 = getpgid(r5) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r3, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000540)=ANY=[@ANYBLOB="17000000", @ANYRES16=0x0, @ANYBLOB="04002bbd7000fcdbdf250b000000"], 0x14}, 0x1, 0x0, 0x0, 0x48000}, 0x8000) syz_open_procfs$namespace(r6, &(0x7f0000000040)='ns/user\x00') newfstatat(0xffffffffffffff9c, &(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x800) r8 = gettid() socket$netlink(0x10, 0x3, 0xa) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000c00)={&(0x7f0000000d00)=ANY=[@ANYBLOB="4000000036e60008dbdf2500000000", @ANYRES32=0x0, @ANYBLOB="0700d5cd0900ecff010005000600050001ff00000a0001006e6574656d0000090000050000c100006c0b0137ae47472147749412127c97d23dedf601ba0ebd8e2066a65e85406b6404361d37b5d1f56982a8fae6940a9a7598758a"], 0x40}, 0x1, 0x0, 0x0, 0x4008}, 0x20000040) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000ac0)=0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net/syz1\x00', 0x1ff) sendmmsg$unix(r1, &(0x7f0000000b40)=[{{&(0x7f0000000380)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000940)=[{&(0x7f0000000400)="81c0f5d740c99112462400e7f6ca4a36e448a9cee55cd26a4a57c74d6a446e968ca7f68422857f28fab4dd079935f72463aa42589adf4a68603aa8429ec5141250650055", 0x44}, {&(0x7f0000000280)="b39ef68ba3f281b533", 0x9}, {&(0x7f0000000480)="d559d8cfc9a3bf3a291eaebfa6da4d9c3689d0859377fedd5441f646fb318e50103651c11662bd3602d3b164f887bcbd8e6865973276f5e0", 0x38}, {&(0x7f00000004c0)="9d1a7ecdfb46d2e45dbe7d996c884c658b2010579e213ff6fd3c7885e952ca", 0x1f}, {&(0x7f0000000500)}, {&(0x7f0000000600)="0de64dcb6d7a49a5c2bb81f68c4c5648a1b12baa13e7f0d5cbbbe8953a541820741a06d3ad9109c59178270dd39604e27fdcc2948596fc50ecc46db6da149ced58deed2c565fcdbe05db571014b86a2c8bc7fc8d07527f33d29eda4f5becf4f385c4330a6b1f3b0e194d1cb67039ac5f5a9e9cf949dffb3c576df37428b7297e0500a05fe227082751295b601b2128a41749b3fd4b6b2ee287d0f5da6e8ad71dd321473a2cbb0086f2d7e373920865aff4dba9c5125bbb64cf723cb4778a36c90649def4716f3c09c3052109e10e657957", 0xd1}, {&(0x7f0000000700)}, {&(0x7f0000000740)="4e68a39a78a6a9d0802f7c9e6d7baf2c0b4a5f1a639f", 0x16}, {&(0x7f0000000780)="e5b45b477ae4e1ca7865144a148a375a8f928e606a072081aaeb0dc7bf5016c48e9b815cb9c7b8dec8ba71c7eae78e1dfa89fb74b6a62afeea69a73c15a1b457feea8b672490e61ad26f6e09052455f3b62d84abe7533253bf75d2af62d1597bc144845ecc54ad14d2faf42b928666725dab5a4c84ebebbc1f04656f6c449214c5ba3046e4a52560e3e30e96724226f82dc548a9bfb2cf1154d5ae37b52454e25dd63f8d73", 0xa5}, {&(0x7f0000000840)="9c6b46c14ed8c327440b1647676996a5ed1945d19366590d504e024c6879b43294381bba9c0007edb3375c1aa77a89b89d9e87e623379e684cc8222f8d4309e154be8034cefc602a2399b954befe2fa39f0a8d0e66329e0367f1fb6040a456e06792de1a23af8843c86ac19e71bb753d756064cae2a677ed0a8041d592ed43b07745d57359207cc39d573031a421d2890ef509534bffd39c25db5eb41ca06b0af052547ad82151718ee2ba2eef552902c6bb4950fdc1eed36ec6", 0xba}], 0xa, &(0x7f0000000b00)=[@cred={{0x1c, 0x1, 0x2, {r6, 0xffffffffffffffff, r7}}}, @cred={{0x1c, 0x1, 0x2, {r8, r9, 0xee00}}}], 0x40, 0x20000880}}], 0x1, 0x4000800) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xffffff81}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}, @IFLA_MASTER={0x8}]}, 0x40}}, 0x0) 05:44:26 executing program 5: mq_open(&(0x7f0000000000)='\'\xff\xff\x00\x00]\xe1S\x00\xb2\'\xc9\x01\xc2QW\x0e\xc7\x94\x01R^\x948$\x1e\xf4\x03\a\x13\x05\x00\x8di\x10\b\xe9\x01~\x04\xc2\xc2j\xb0\xb3\x7f\x94\bG.FU8\x90\x7fq2\xfd19\x00', 0x2, 0x14e, 0x0) 05:44:26 executing program 0: mq_open(&(0x7f0000000000)='\'\xff\xff\x00\x00T\xe1S\x00\xb2\'\xc9\x01\xc2QW\x0e\xc7\x94\x01R^\x948$\x1e\xf4\x03\a\x13\x05\x00\x8di\x10\b\xe9\x01~\x04\xc2\xc2j\xb0\xb3\x7f\x94\bG.FU8\x90\x7fq2\xfd19\x00', 0x2, 0x18, 0x0) 05:44:26 executing program 4: mq_open(&(0x7f0000000000)='\'\xff\xff\x00\x00]\xe1S\x00\xb2\'\xc9\x01\xc2QW\x0e\xc7\x94\x01R^\x948$\x1e\xf4\x03\a\x13\x05\x00\x8di\x10\b\xe9\x01~\x04\xc2\xc2j\xb0\xb3\x7f\x94\bG.FU8\x90\x7fq2\xfd19\x00', 0x2, 0x0, 0x0) 05:44:26 executing program 2: mq_open(&(0x7f0000000000)='\'\xff\xff\x00\x00]\xe1S\x00\xb2\'\xc9\x01\xc2QW\x0e\xc7\x94\x01R^\x948$\x1e\xf4\x03\a\x13\x05\x00\x8di\x10\b\xe9\x01~\x04\xc2\xc2j\xb0\xb3\x7f\x94\bG.FU8\x90\x7fq2\xfd19\x00', 0x2, 0x0, &(0x7f0000000040)) 05:44:26 executing program 0: mq_open(&(0x7f0000000000)='\'\xff\xff\x00\x00]\xe1S\x00\xb2\'\xc9\x01\xc2QW\x0e\xc7\x94\x01R^\x948$\x1e\xf4\x03\a\x13\x05\x00\x8di\x10\b\xe9\x01~\x04\xc2\xc2j\xb0\xb3\x7f\x94\bG.FU8\x90\x7fq2\xfd19\x00', 0x2, 0x14e, &(0x7f0000000040)) 05:44:26 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=[{0x10}], 0x10}, 0x0) 05:44:26 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x2, 0xa0, &(0x7f0000000100)=""/160, 0x0, 0x6, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:44:26 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet6(r0, &(0x7f0000000180)={&(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c, &(0x7f0000000140)=[{&(0x7f0000000040)="8e", 0x1}], 0x1}, 0x0) 05:44:26 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f0000000000)=@framed={{}, [@jmp={0x5, 0x0, 0x0, 0x2}]}, &(0x7f0000000040)='syzkaller\x00', 0x2, 0xa0, &(0x7f0000000100)=""/160, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:44:26 executing program 5: socket(0x2, 0x1, 0x7) 05:44:26 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f0000000000)=@framed={{}, [@jmp={0x5, 0x0, 0x1, 0x0, 0x0, 0xffff}]}, &(0x7f0000000040)='syzkaller\x00', 0x2, 0xa0, &(0x7f0000000100)=""/160, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 332.182408][T18236] wireguard1: entered promiscuous mode [ 332.187922][T18236] wireguard1: entered allmulticast mode 05:44:27 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sched_setscheduler(0x0, 0x3, &(0x7f0000000bc0)=0x4) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$loop_ctrl(0xffffff9c, 0x0, 0x0, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f00000000c0)=ANY=[], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x1, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sched_setscheduler(r0, 0x2, &(0x7f0000000b80)=0x3ff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0xc1}, 0x40004) ioctl$AUTOFS_IOC_CATATONIC(r3, 0x9362, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000c80)=0x9) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = getpid() r6 = getpgid(r5) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r3, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000540)=ANY=[@ANYBLOB="17000000", @ANYRES16=0x0, @ANYBLOB="04002bbd7000fcdbdf250b000000"], 0x14}, 0x1, 0x0, 0x0, 0x48000}, 0x8000) syz_open_procfs$namespace(r6, &(0x7f0000000040)='ns/user\x00') newfstatat(0xffffffffffffff9c, &(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x800) r8 = gettid() socket$netlink(0x10, 0x3, 0xa) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000c00)={&(0x7f0000000d00)=ANY=[@ANYBLOB="4000000036e60008dbdf2500000000", @ANYRES32=0x0, @ANYBLOB="0700d5cd0900ecff010005000600050001ff00000a0001006e6574656d0000090000050000c100006c0b0137ae47472147749412127c97d23dedf601ba0ebd8e2066a65e85406b6404361d37b5d1f56982a8fae6940a9a7598758a"], 0x40}, 0x1, 0x0, 0x0, 0x4008}, 0x20000040) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000ac0)=0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net/syz1\x00', 0x1ff) sendmmsg$unix(r1, &(0x7f0000000b40)=[{{&(0x7f0000000380)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000940)=[{&(0x7f0000000400)="81c0f5d740c99112462400e7f6ca4a36e448a9cee55cd26a4a57c74d6a446e968ca7f68422857f28fab4dd079935f72463aa42589adf4a68603aa8429ec5141250650055", 0x44}, {&(0x7f0000000280)="b39ef68ba3f281b533", 0x9}, {&(0x7f0000000480)="d559d8cfc9a3bf3a291eaebfa6da4d9c3689d0859377fedd5441f646fb318e50103651c11662bd3602d3b164f887bcbd8e6865973276f5e0", 0x38}, {&(0x7f00000004c0)="9d1a7ecdfb46d2e45dbe7d996c884c658b2010579e213ff6fd3c7885e952ca", 0x1f}, {&(0x7f0000000500)}, {&(0x7f0000000600)="0de64dcb6d7a49a5c2bb81f68c4c5648a1b12baa13e7f0d5cbbbe8953a541820741a06d3ad9109c59178270dd39604e27fdcc2948596fc50ecc46db6da149ced58deed2c565fcdbe05db571014b86a2c8bc7fc8d07527f33d29eda4f5becf4f385c4330a6b1f3b0e194d1cb67039ac5f5a9e9cf949dffb3c576df37428b7297e0500a05fe227082751295b601b2128a41749b3fd4b6b2ee287d0f5da6e8ad71dd321473a2cbb0086f2d7e373920865aff4dba9c5125bbb64cf723cb4778a36c90649def4716f3c09c3052109e10e657957", 0xd1}, {&(0x7f0000000700)}, {&(0x7f0000000740)="4e68a39a78a6a9d0802f7c9e6d7baf2c0b4a5f1a639f", 0x16}, {&(0x7f0000000780)="e5b45b477ae4e1ca7865144a148a375a8f928e606a072081aaeb0dc7bf5016c48e9b815cb9c7b8dec8ba71c7eae78e1dfa89fb74b6a62afeea69a73c15a1b457feea8b672490e61ad26f6e09052455f3b62d84abe7533253bf75d2af62d1597bc144845ecc54ad14d2faf42b928666725dab5a4c84ebebbc1f04656f6c449214c5ba3046e4a52560e3e30e96724226f82dc548a9bfb2cf1154d5ae37b52454e25dd63f8d73", 0xa5}, {&(0x7f0000000840)="9c6b46c14ed8c327440b1647676996a5ed1945d19366590d504e024c6879b43294381bba9c0007edb3375c1aa77a89b89d9e87e623379e684cc8222f8d4309e154be8034cefc602a2399b954befe2fa39f0a8d0e66329e0367f1fb6040a456e06792de1a23af8843c86ac19e71bb753d756064cae2a677ed0a8041d592ed43b07745d57359207cc39d573031a421d2890ef509534bffd39c25db5eb41ca06b0af052547ad82151718ee2ba2eef552902c6bb4950fdc1eed36ec6", 0xba}], 0xa, &(0x7f0000000b00)=[@cred={{0x1c, 0x1, 0x2, {r6, 0xffffffffffffffff, r7}}}, @cred={{0x1c, 0x1, 0x2, {r8, r9, 0xee00}}}], 0x40, 0x20000880}}], 0x1, 0x4000800) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xffffff81}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}, @IFLA_MASTER={0x8}]}, 0x40}}, 0x0) 05:44:27 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet6(r0, &(0x7f0000000180)={&(0x7f0000000000)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x24}, 0x5}, 0x1c, &(0x7f0000000140)=[{&(0x7f0000000040)="8efb8fefac7962e87c1433", 0xb}], 0x1}, 0x4000024) 05:44:27 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000000)=@framed={{}, [], {0x95, 0x0, 0x0, 0x4000000}}, &(0x7f0000000040)='syzkaller\x00', 0x2, 0xa0, &(0x7f0000000100)=""/160, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:44:27 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x18, 0x1, &(0x7f0000000000)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}], &(0x7f0000000040)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000000080)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:44:27 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x9, 0x3, &(0x7f0000000700)=@framed, &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:44:27 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@remote, 0x0, 0x6c}, 0x0, @in=@dev}}, 0xe8) 05:44:27 executing program 0: r0 = epoll_create1(0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000004a80)) 05:44:27 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x2, 0x15, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 05:44:27 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f0000000000)=@framed={{}, [@jmp={0x5, 0x0, 0x1, 0x0, 0x8}]}, &(0x7f0000000040)='syzkaller\x00', 0x2, 0xa0, &(0x7f0000000100)=""/160, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:44:27 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2, 0x15, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x17, 0x0, 0xa0, 0x0, @in6={0xa, 0x0, 0x0, @private2}}]}, 0x38}}, 0x0) 05:44:27 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet6_int(r0, 0x29, 0x1e, &(0x7f0000000000), 0x4) 05:44:27 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x23, &(0x7f0000000000)="a1ab79ebf9e86dd8dd297adeafb36374a04ef4af00e88e9c72e5111dddd228494b5bd241d5368d39e4adba6eb4ec7b7176d90002d7efc93e007bf7d742970ef1fb75bda3d69d5249ff1c9cb9143a8d9fb00bbf5f133a1dd9dff6d61e33a36075631e22d0a2959d6117fef7f482ecc748c84a88e29acf5f843a70460a10e980ef8ba4e46a2d664b2998f121e73dbacc6cd9088f0f62e8da7dfeb4c7244f1a7725d39729ff4a93a538", 0xa8) [ 332.933400][T18232] syz-executor.4 (18232) used greatest stack depth: 10112 bytes left [ 333.158361][T18270] wireguard2: entered promiscuous mode [ 333.163908][T18270] wireguard2: entered allmulticast mode 05:44:27 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sched_setscheduler(0x0, 0x3, &(0x7f0000000bc0)=0x4) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$loop_ctrl(0xffffff9c, 0x0, 0x0, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f00000000c0)=ANY=[], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x1, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sched_setscheduler(r0, 0x2, &(0x7f0000000b80)=0x3ff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0xc1}, 0x40004) ioctl$AUTOFS_IOC_CATATONIC(r3, 0x9362, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000c80)=0x9) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = getpid() r6 = getpgid(r5) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r3, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000540)=ANY=[@ANYBLOB="17000000", @ANYRES16=0x0, @ANYBLOB="04002bbd7000fcdbdf250b000000"], 0x14}, 0x1, 0x0, 0x0, 0x48000}, 0x8000) syz_open_procfs$namespace(r6, &(0x7f0000000040)='ns/user\x00') newfstatat(0xffffffffffffff9c, &(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x800) r8 = gettid() socket$netlink(0x10, 0x3, 0xa) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000c00)={&(0x7f0000000d00)=ANY=[@ANYBLOB="4000000036e60008dbdf2500000000", @ANYRES32=0x0, @ANYBLOB="0700d5cd0900ecff010005000600050001ff00000a0001006e6574656d0000090000050000c100006c0b0137ae47472147749412127c97d23dedf601ba0ebd8e2066a65e85406b6404361d37b5d1f56982a8fae6940a9a7598758a"], 0x40}, 0x1, 0x0, 0x0, 0x4008}, 0x20000040) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000ac0)=0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net/syz1\x00', 0x1ff) sendmmsg$unix(r1, &(0x7f0000000b40)=[{{&(0x7f0000000380)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000940)=[{&(0x7f0000000400)="81c0f5d740c99112462400e7f6ca4a36e448a9cee55cd26a4a57c74d6a446e968ca7f68422857f28fab4dd079935f72463aa42589adf4a68603aa8429ec5141250650055", 0x44}, {&(0x7f0000000280)="b39ef68ba3f281b533", 0x9}, {&(0x7f0000000480)="d559d8cfc9a3bf3a291eaebfa6da4d9c3689d0859377fedd5441f646fb318e50103651c11662bd3602d3b164f887bcbd8e6865973276f5e0", 0x38}, {&(0x7f00000004c0)="9d1a7ecdfb46d2e45dbe7d996c884c658b2010579e213ff6fd3c7885e952ca", 0x1f}, {&(0x7f0000000500)}, {&(0x7f0000000600)="0de64dcb6d7a49a5c2bb81f68c4c5648a1b12baa13e7f0d5cbbbe8953a541820741a06d3ad9109c59178270dd39604e27fdcc2948596fc50ecc46db6da149ced58deed2c565fcdbe05db571014b86a2c8bc7fc8d07527f33d29eda4f5becf4f385c4330a6b1f3b0e194d1cb67039ac5f5a9e9cf949dffb3c576df37428b7297e0500a05fe227082751295b601b2128a41749b3fd4b6b2ee287d0f5da6e8ad71dd321473a2cbb0086f2d7e373920865aff4dba9c5125bbb64cf723cb4778a36c90649def4716f3c09c3052109e10e657957", 0xd1}, {&(0x7f0000000700)}, {&(0x7f0000000740)="4e68a39a78a6a9d0802f7c9e6d7baf2c0b4a5f1a639f", 0x16}, {&(0x7f0000000780)="e5b45b477ae4e1ca7865144a148a375a8f928e606a072081aaeb0dc7bf5016c48e9b815cb9c7b8dec8ba71c7eae78e1dfa89fb74b6a62afeea69a73c15a1b457feea8b672490e61ad26f6e09052455f3b62d84abe7533253bf75d2af62d1597bc144845ecc54ad14d2faf42b928666725dab5a4c84ebebbc1f04656f6c449214c5ba3046e4a52560e3e30e96724226f82dc548a9bfb2cf1154d5ae37b52454e25dd63f8d73", 0xa5}, {&(0x7f0000000840)="9c6b46c14ed8c327440b1647676996a5ed1945d19366590d504e024c6879b43294381bba9c0007edb3375c1aa77a89b89d9e87e623379e684cc8222f8d4309e154be8034cefc602a2399b954befe2fa39f0a8d0e66329e0367f1fb6040a456e06792de1a23af8843c86ac19e71bb753d756064cae2a677ed0a8041d592ed43b07745d57359207cc39d573031a421d2890ef509534bffd39c25db5eb41ca06b0af052547ad82151718ee2ba2eef552902c6bb4950fdc1eed36ec6", 0xba}], 0xa, &(0x7f0000000b00)=[@cred={{0x1c, 0x1, 0x2, {r6, 0xffffffffffffffff, r7}}}, @cred={{0x1c, 0x1, 0x2, {r8, r9, 0xee00}}}], 0x40, 0x20000880}}], 0x1, 0x4000800) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xffffff81}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}, @IFLA_MASTER={0x8}]}, 0x40}}, 0x0) 05:44:27 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000240)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_TRIGGER_SCAN(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)={0x1c, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}}, 0x1c}}, 0x0) 05:44:27 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet6_int(r0, 0x29, 0x4c, &(0x7f0000000000), 0x4) 05:44:27 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet6_int(r0, 0x84, 0x18, 0x0, 0x0) 05:44:27 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x2, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}]}, 0x7ffff000}}, 0x0) 05:44:27 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet6(r0, &(0x7f0000000280)={&(0x7f0000000040)={0xa, 0x0, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c, &(0x7f00000001c0)=[{&(0x7f0000000080)="ad", 0x1}], 0x1, &(0x7f0000000200)=[@hoplimit={{0x14}}], 0x18}, 0x0) [ 333.748797][T18249] syz-executor.3 (18249) used greatest stack depth: 9976 bytes left 05:44:27 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x3, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x2, 0xa0, &(0x7f0000000100)=""/160, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:44:27 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000007f100000f8ffffff95"], &(0x7f0000000040)='syzkaller\x00', 0x2, 0xa0, &(0x7f0000000100)=""/160, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:44:27 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)={0x2, 0x3, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 05:44:27 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet6_int(r0, 0x29, 0x3a, 0x0, 0x0) 05:44:27 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000000)=@framed={{}, [], {0x95, 0x91}}, &(0x7f0000000040)='syzkaller\x00', 0x2, 0xa0, &(0x7f0000000100)=""/160, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:44:27 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet6_int(r0, 0x29, 0x4d, 0x0, 0x0) [ 333.975539][T18301] wireguard3: entered promiscuous mode [ 333.981138][T18301] wireguard3: entered allmulticast mode 05:44:28 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000012c0)=@base={0x13, 0x8, 0x24000}, 0x48) 05:44:28 executing program 2: syz_open_procfs$namespace(0x0, &(0x7f0000000a00)='ns/user\x00') 05:44:28 executing program 0: socketpair(0x1d, 0x0, 0x0, &(0x7f0000000580)) 05:44:28 executing program 5: r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f0000000140)={0x18, 0x2, {0x0, @broadcast}}, 0x1e) connect$pptp(r0, &(0x7f0000000040)={0x18, 0x2, {0x1, @local}}, 0x1e) 05:44:28 executing program 3: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) sendmsg$inet6(r0, &(0x7f00000017c0)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000000340)="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", 0x219}], 0x1}, 0x0) 05:44:28 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet6_int(r0, 0x29, 0x3c, 0x0, 0x0) 05:44:28 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet6_int(r0, 0x29, 0x31, 0x0, 0x0) 05:44:28 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@union={0x6}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/223, 0x2b, 0xdf, 0x1}, 0x20) 05:44:28 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet6_int(r0, 0x29, 0x48, &(0x7f0000000000)=0xfff, 0x4) 05:44:28 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000880)={0x18, 0x3, &(0x7f00000004c0)=@framed, &(0x7f0000000580)='syzkaller\x00', 0x1, 0xca, &(0x7f00000005c0)=""/202, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:44:28 executing program 5: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000400), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000180)={'wpan1\x00', 0x0}) sendmsg$NL802154_CMD_SET_BACKOFF_EXPONENT(r1, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x2c, r0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}, @NL802154_ATTR_MIN_BE={0x5, 0x11, 0x3}, @NL802154_ATTR_MAX_BE={0x5, 0x10, 0xe7}]}, 0x2c}}, 0x0) [ 334.684706][ T23] audit: type=1400 audit(1677995068.765:399): avc: denied { bind } for pid=18308 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 05:44:28 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5}}]}}, &(0x7f0000000380)=""/220, 0x32, 0xdc, 0x1}, 0x20) 05:44:28 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:44:28 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet6_int(r0, 0x84, 0x6, 0x0, 0x0) 05:44:28 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000000040)="90aa1d7c23cae4c4f10d18c7da3302c3619b5c59d43f1ca2db9f717c52f3e1e06937c64cc15b70203bc5771ab6ecf230af5ce8b0007711b482c7988f772d81102752108449b5e600e2b8f8a538273d22f758266d1b99eec3c0ff387de49d6ba048b88e6aafad30705cb8903b9f5b175d7c898af11ccc3ef680f74ef94724985e6f2a61a5250169c5e6c69c9849d1ec0e", 0x90) 05:44:28 executing program 5: pselect6(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080)={0x4}, &(0x7f0000000100), 0x0) 05:44:28 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet6_int(r0, 0x84, 0x65, &(0x7f0000000000), 0x4) 05:44:28 executing program 0: pselect6(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000340)={0x0, 0x989680}, 0x0) 05:44:28 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x5, &(0x7f0000000080)=@framed={{}, [@map_fd={0x18, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8000000}]}, &(0x7f0000000040)='syzkaller\x00', 0x2, 0xa0, &(0x7f0000000100)=""/160, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:44:28 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet6_int(r0, 0x29, 0x6, 0x0, 0x0) [ 334.748648][T18309] can: request_module (can-proto-0) failed. 05:44:28 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0045878, 0x0) 05:44:28 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet6(r0, &(0x7f0000000180)={&(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c, &(0x7f0000000140)=[{&(0x7f0000000040)="8e", 0x1}], 0x1}, 0x4000024) 05:44:28 executing program 3: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) sendmsg$inet6(r0, &(0x7f00000017c0)={0x0, 0x0, 0x0}, 0x0) 05:44:28 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet6(r0, &(0x7f0000000280)={&(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c, 0x0, 0x0, &(0x7f0000000200)=[@hoplimit={{0x14}}], 0x18}, 0x0) 05:44:28 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@dellinkprop={0x24, 0x6d, 0x1, 0x0, 0x0, {}, [@IFLA_XDP={0x4}]}, 0x24}}, 0x0) 05:44:28 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x13, &(0x7f00000001c0)=@bpf_lsm={0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:44:28 executing program 0: symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00') lsetxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, 0x0, 0x2) 05:44:28 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000c80)=""/209, &(0x7f0000000d80)=0xd1) 05:44:28 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000003c80)={0x0, 0x0, &(0x7f0000003c40)=[{&(0x7f0000003a00)={0x10, 0x29}, 0x10}], 0x1}, 0x0) 05:44:28 executing program 1: symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00') readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/16, 0x10) 05:44:28 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f00000005c0), 0x201c0, 0x0) 05:44:29 executing program 4: timer_create(0xf64389e5c9ebaf26, 0x0, 0x0) 05:44:29 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$packet(r0, 0x0, 0x0) 05:44:29 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000b00), 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x2) 05:44:29 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0xb, 0x0, &(0x7f0000000280)) 05:44:29 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000880), 0x325002, 0x0) ioctl$RNDGETENTCNT(r0, 0x80045200, 0x0) 05:44:29 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) shutdown(r0, 0x0) 05:44:29 executing program 4: timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x1, @tid=0xffffffffffffffff}, &(0x7f0000000040)) timer_settime(0x0, 0x1, &(0x7f0000000080)={{0x0, 0x3938700}, {0x0, 0x3938700}}, &(0x7f0000000140)) 05:44:29 executing program 1: r0 = shmget(0x0, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) shmctl$SHM_STAT_ANY(r0, 0xf, 0x0) 05:44:29 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000b00), 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x8, 0x2) 05:44:29 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000b00), 0x0, 0x0) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000000), &(0x7f0000000040), 0x2, 0x2) 05:44:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f0000000040), &(0x7f0000000080)=0x4) 05:44:29 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x1a, 0x0, &(0x7f0000000040)=0x30) 05:44:29 executing program 2: socketpair(0x1, 0x0, 0xff, 0x0) 05:44:29 executing program 5: openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x10042, 0x0) 05:44:29 executing program 1: r0 = eventfd(0x0) write$P9_RLCREATE(r0, &(0x7f0000003b00)={0x18}, 0x18) 05:44:29 executing program 3: pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0xb82e336200000000) close(r0) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, 0x0, 0x0) 05:44:29 executing program 4: keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000013c0)=[{&(0x7f0000000140)="a702fec58f379a", 0x7}], 0x1, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="b3d1bd447e748eb84fb19ea93122ebe2b7e47383b78aa6e3c342a2a8f11751acf66fa5c587c98c20bb93dd1f241935cf824cb8e980e452d786187848cdb84dfc422dde81b4f5e270e3fc9413d909785f0a2e56b195f9219115d83d8a665af485471621f520461bedcb9d686cb211128ab49b3d729b665191ecdd8edc4a1ffdd107e0987c3107b4446d6f8cf99e774373a0da8bb997d31470c24d52fdde57c7a1239f5f59eba89a5da35d94f51a401c74207289ab786ea2e0aa4a60818f9e1ad5c7d1848dd0c27312ae0e54d220ef66e1ea6169aff1ce3269caf93868d1"}], 0x43, 0x0) 05:44:29 executing program 2: mknod(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000380)={[{@mpol={'mpol', 0x3d, {'interleave', '', @val={0x3a, [0x3a, 0x37]}}}}]}) 05:44:29 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000b00), 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x5450, 0x0) 05:44:29 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000b00), 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fdinfo/4\x00') ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x5450, 0x0) 05:44:29 executing program 1: pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0xb82e336200000000) close(r0) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_udp_int(r0, 0x11, 0x0, 0x0, 0x0) 05:44:29 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000b00), 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 05:44:29 executing program 0: pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0xb82e336200000000) close(r0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000040), &(0x7f0000000080)=0x8) 05:44:29 executing program 4: r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x5450, 0x0) 05:44:29 executing program 5: r0 = gettid() rt_sigqueueinfo(r0, 0x0, &(0x7f00000007c0)) 05:44:29 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1}, 0x1c) [ 335.802936][T18404] tmpfs: Bad value for 'mpol' 05:44:29 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_EMULATED_HOST(r0, 0x2203, &(0x7f00000002c0)) 05:44:29 executing program 3: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), r0) 05:44:29 executing program 1: bpf$MAP_CREATE(0xd, &(0x7f0000000200)=@bloom_filter, 0x48) 05:44:29 executing program 0: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x89b1, &(0x7f0000000480)={'gre0\x00'}) 05:44:30 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000100)={'syztnl1\x00', &(0x7f0000000080)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @private1}}) 05:44:30 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000b00), 0x0, 0x0) ioctl$AUTOFS_IOC_SETTIMEOUT(r0, 0x5451, 0x0) 05:44:30 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) fcntl$dupfd(r0, 0xa, 0xffffffffffffffff) 05:44:30 executing program 5: msync(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x3) 05:44:30 executing program 2: prctl$PR_GET_UNALIGN(0x1d, 0x0) 05:44:30 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6, 0x0, 0x84) 05:44:30 executing program 1: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) sendmsg$NL80211_CMD_DEL_INTERFACE(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[], 0x20}}, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x541b, &(0x7f0000000480)={'team0\x00'}) 05:44:30 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_TX_POWER(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_PHY={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}]}, 0x30}}, 0x0) 05:44:30 executing program 5: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x1, 0x0) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)) pselect6(0x40, &(0x7f0000000380), &(0x7f00000003c0)={0x71}, 0x0, 0x0, 0x0) read$snapshot(r0, &(0x7f0000000080)=""/132, 0x84) [ 335.884611][ T23] audit: type=1400 audit(1677995069.965:400): avc: denied { ioctl } for pid=18421 comm="syz-executor.0" path="socket:[65241]" dev="sockfs" ino=65241 ioctlcmd=0x89b1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 335.979481][ T23] audit: type=1400 audit(1677995069.965:401): avc: denied { read } for pid=18419 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 05:44:30 executing program 3: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8915, 0x0) 05:44:30 executing program 5: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x1, 0x0) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)) pselect6(0x40, &(0x7f0000000380), &(0x7f00000003c0)={0x71}, 0x0, 0x0, 0x0) read$snapshot(r0, &(0x7f0000000080)=""/132, 0x84) 05:44:30 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in={0x2, 0x0, @empty}], 0x20000010) 05:44:30 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x34, r1, 0x1, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'nicvf0\x00'}}}}}, 0x34}}, 0x0) 05:44:30 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000001a80)={'wpan1\x00', 0x0}) sendmsg$NL802154_CMD_SET_BACKOFF_EXPONENT(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 05:44:30 executing program 4: openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x280, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) 05:44:30 executing program 3: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), r0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000040), r0) 05:44:30 executing program 2: socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$BATADV_CMD_GET_GATEWAYS(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[], 0x33fe0}}, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x1c000, 0x0) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000140), r0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'syztnl1\x00', &(0x7f0000000180)={'syztnl2\x00', 0x0, 0x80, 0x68, 0x6, 0xffff, {{0x15, 0x4, 0x2, 0x2e, 0x54, 0x67, 0x0, 0x5, 0x2f, 0x0, @loopback, @rand_addr=0x64010100, {[@generic={0x82, 0x7, "188e8423f4"}, @end, @rr={0x7, 0xb, 0xb9, [@multicast2, @multicast2]}, @rr={0x7, 0xb, 0x19, [@multicast1, @multicast1]}, @ssrr={0x89, 0xb, 0x5f, [@empty, @broadcast]}, @noop, @noop, @timestamp_prespec={0x44, 0xc, 0x16, 0x3, 0x7, [{@private=0xa010102, 0x75d}]}, @generic={0x88, 0x9, "79a8c86bbfc1a8"}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000280)={'sit0\x00', &(0x7f0000000240)={'syztnl0\x00', 0x0, 0x1, 0x80, 0x800, 0x6, {{0x8, 0x4, 0x2, 0x6, 0x20, 0x66, 0x0, 0x0, 0x29, 0x0, @local, @broadcast, {[@end, @timestamp={0x44, 0x8, 0x3c, 0x0, 0x3, [0x5]}]}}}}}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'veth0\x00', 0x0}) r7 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r7, 0x8933, &(0x7f0000000040)={'vxcan1\x00', 0x0}) sendmsg$nl_route_sched(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@gettfilter={0x24, 0x2e, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r8, {}, {0x0, 0xfff2}, {0x0, 0x2}}}, 0x24}}, 0x0) sendmsg$ETHTOOL_MSG_TSINFO_GET(r2, &(0x7f0000000480)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000300)={0x13c, r3, 0x8, 0x70bd2b, 0x25dfdbfb, {}, [@HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_macvtap\x00'}]}, @HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x10}, 0x40000040) 05:44:30 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_REG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_REG_ALPHA2={0x6, 0x21, 'a\x00'}]}, 0x1c}}, 0x0) 05:44:30 executing program 5: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x1, 0x0) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)) pselect6(0x40, &(0x7f0000000380), &(0x7f00000003c0)={0x71}, 0x0, 0x0, 0x0) read$snapshot(r0, &(0x7f0000000080)=""/132, 0x84) 05:44:30 executing program 5: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x1, 0x0) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)) pselect6(0x40, &(0x7f0000000380), &(0x7f00000003c0)={0x71}, 0x0, 0x0, 0x0) read$snapshot(r0, &(0x7f0000000080)=""/132, 0x84) 05:44:30 executing program 0: add_key$user(&(0x7f0000000200), 0x0, 0x0, 0x10000000, 0xfffffffffffffff9) 05:44:30 executing program 4: add_key$fscrypt_v1(&(0x7f0000000140), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f0000000200)={0x0, "7032c065ed283485a34ed2c7d308a83948dd2d878bed05b037903f4cc382cd7f28573e8af595c00c1b6b603c565a3ec6cdbe5d9554daeefcb43599c3f1ddc466"}, 0x48, 0xfffffffffffffffd) [ 336.741179][ T23] audit: type=1400 audit(1677995070.825:402): avc: denied { write } for pid=18449 comm="syz-executor.4" name="nvram" dev="devtmpfs" ino=98 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nvram_device_t tclass=chr_file permissive=1 [ 336.768475][T18455] tipc: Enabling of bearer rejected, failed to enable media 05:44:30 executing program 0: r0 = syz_open_dev$sg(&(0x7f00000000c0), 0x0, 0x0) ioctl$SG_SET_FORCE_PACK_ID(r0, 0x227b, 0x0) 05:44:30 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x0, @empty}], 0x20000010) 05:44:30 executing program 5: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x1, 0x0) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)) read$snapshot(r0, &(0x7f0000000080)=""/132, 0x84) 05:44:30 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), r0) sendmsg$IEEE802154_SET_MACPARAMS(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x20, r2, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}]}, 0x20}}, 0x0) 05:44:30 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000740), r1) sendmsg$IEEE802154_ADD_IFACE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000400)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000ffffffff2000000009001f0070687930"], 0x20}}, 0x0) 05:44:31 executing program 3: bpf$BPF_PROG_GET_NEXT_ID(0x10, &(0x7f00000004c0)={0xfffffff9}, 0x8) 05:44:31 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0), 0xffffffffffffffff) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000400)={0x14, r1, 0x301}, 0x14}}, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640), r0) 05:44:31 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x7d, &(0x7f0000000000)=[@in={0x2, 0x0, @empty}], 0x10) 05:44:31 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000740), r1) sendmsg$IEEE802154_ADD_IFACE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="1fffffff0000000009001f"], 0x28}}, 0x0) 05:44:31 executing program 5: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x1, 0x0) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)) read$snapshot(r0, &(0x7f0000000080)=""/132, 0x84) 05:44:31 executing program 1: r0 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000002c0)={'syz', 0x2}, &(0x7f0000000300)="fb", 0x1, 0xfffffffffffffffb) keyctl$revoke(0x3, r0) 05:44:31 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) getsockopt$llc_int(r0, 0x10c, 0x0, 0x0, &(0x7f0000000100)) 05:44:31 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000480)={'veth0_to_batadv\x00'}) 05:44:31 executing program 5: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x1, 0x0) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)) read$snapshot(r0, &(0x7f0000000080)=""/132, 0x84) 05:44:31 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x54, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x40, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x0, @dev}}, {0x14, 0x2, @in={0x2, 0x0, @broadcast}}}}]}]}, 0x54}}, 0x0) 05:44:31 executing program 5: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x1, 0x0) pselect6(0x40, &(0x7f0000000380), &(0x7f00000003c0)={0x71}, 0x0, 0x0, 0x0) read$snapshot(r0, &(0x7f0000000080)=""/132, 0x84) 05:44:31 executing program 3: keyctl$dh_compute(0x17, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)={'cmac(aes)\x00'}}) 05:44:31 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, r1, 0x1, 0x0, 0x0, {0x2}, [@L2TP_ATTR_CONN_ID={0x8}]}, 0x1c}}, 0x0) [ 337.646452][T18501] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 05:44:31 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x77, &(0x7f0000000000)=[@in={0x2, 0x0, @empty}], 0x10) 05:44:31 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), r0) sendmsg$IEEE802154_SET_MACPARAMS(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x20, r2, 0x1, 0x0, 0x0, {0x22}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}]}, 0x20}}, 0x0) 05:44:31 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SET_TUNSRC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x18, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRET={0x4}]}, 0x18}}, 0x0) 05:44:31 executing program 5: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x1, 0x0) pselect6(0x40, &(0x7f0000000380), &(0x7f00000003c0)={0x71}, 0x0, 0x0, 0x0) read$snapshot(r0, &(0x7f0000000080)=""/132, 0x84) 05:44:31 executing program 2: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) sendmsg$NL80211_CMD_DEL_INTERFACE(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[], 0x20}}, 0x0) 05:44:31 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r1) sendmsg$NLBL_MGMT_C_ADD(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x1c, r2, 0xc38b680b0e9d2873, 0x0, 0x0, {}, [@NLBL_MGMT_A_DOMAIN={0x5, 0x1, '\x00'}]}, 0x1c}}, 0x0) 05:44:31 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, r1, 0x1, 0x0, 0x0, {0x2}, [@L2TP_ATTR_CONN_ID={0x8}]}, 0x1c}}, 0x0) 05:44:31 executing program 5: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x1, 0x0) pselect6(0x40, &(0x7f0000000380), &(0x7f00000003c0)={0x71}, 0x0, 0x0, 0x0) read$snapshot(r0, &(0x7f0000000080)=""/132, 0x84) [ 337.711790][T18509] tipc: Started in network mode [ 337.716702][T18509] tipc: Node identity ac1414, cluster identity 4711 [ 337.746728][T18509] tipc: New replicast peer: 255.255.255.255 [ 337.752834][T18509] tipc: Enabled bearer , priority 10 05:44:31 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000740), r1) sendmsg$IEEE802154_ADD_IFACE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="20d5c85766753b4f19a29ece000000", @ANYRES16=r2, @ANYBLOB="010000000000ffffffff2000000009001f"], 0x20}}, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f0000001640), r3) sendmsg$NET_DM_CMD_STOP(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, r4, 0x1, 0x70bd2d, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4085}, 0x0) 05:44:31 executing program 5: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)) pselect6(0x40, &(0x7f0000000380), &(0x7f00000003c0)={0x71}, 0x0, 0x0, 0x0) read$snapshot(0xffffffffffffffff, &(0x7f0000000080)=""/132, 0x84) 05:44:31 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x3c, r1, 0x1, 0x0, 0x0, {{}, {}, {0x20, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'veth0_virt_wifi\x00'}}}}}, 0x3c}}, 0x0) 05:44:31 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, r1, 0x1, 0x0, 0x0, {0x2}, [@L2TP_ATTR_CONN_ID={0x8}]}, 0x1c}}, 0x0) 05:44:31 executing program 1: keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000600), &(0x7f0000000880), &(0x7f00000008c0)={0x0, "6641e05f0a103283467e3b6fd3aef72f7c9daba9722df0c383788827e26d041b1bccebaa1bec91366d24c0668a24fe1238b6264edeeb4cf1f9368cdf6bfb6949"}, 0x48, 0xffffffffffffffff) 05:44:31 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000000c0)="04", 0x1, 0x20000845, &(0x7f0000b63fe4), 0x1c) 05:44:31 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, r1, 0x1, 0x0, 0x0, {0x2}, [@L2TP_ATTR_CONN_ID={0x8}]}, 0x1c}}, 0x0) 05:44:31 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000c80), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_TX_POWER(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0xf}]}, 0x1c}}, 0x0) 05:44:31 executing program 5: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)) pselect6(0x40, &(0x7f0000000380), &(0x7f00000003c0)={0x71}, 0x0, 0x0, 0x0) read$snapshot(0xffffffffffffffff, &(0x7f0000000080)=""/132, 0x84) 05:44:31 executing program 1: add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc4}, &(0x7f0000000180)={0x0, "fcf2edd10830df2e0e9c4ffbcb91aba0798c525dad7fa9437eb974be4e6b7816e974da6e312752605086e315b563320ac5a0a25277e9c7b8524ce7b1b5062d31"}, 0x48, 0xffffffffffffffff) request_key(&(0x7f0000000580)='pkcs7_test\x00', &(0x7f00000005c0)={'syz', 0x2}, &(0x7f0000000600)='keyring\x00', 0x0) 05:44:31 executing program 3: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000c80), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_SEC_KEY(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x20, r0, 0xca0c30c5fdceef7d, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}]}, 0x20}}, 0x0) 05:44:31 executing program 1: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000200)={0x1a, 0x10f}, 0x10) 05:44:31 executing program 5: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)) pselect6(0x40, &(0x7f0000000380), &(0x7f00000003c0)={0x71}, 0x0, 0x0, 0x0) read$snapshot(0xffffffffffffffff, &(0x7f0000000080)=""/132, 0x84) 05:44:31 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x65, &(0x7f0000000000)=[@in={0x2, 0x0, @empty}], 0x10) [ 337.869573][T18547] tipc: Started in network mode [ 337.874495][T18547] tipc: Node identity aaaaaaaaaa2d, cluster identity 4711 [ 337.881672][T18547] tipc: Enabled bearer , priority 0 05:44:32 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x19, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000540)={r0, 0x0, 0x0}, 0x20) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r1) 05:44:32 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x1, 0x0) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)) pselect6(0x40, &(0x7f0000000380), &(0x7f00000003c0)={0x71}, 0x0, 0x0, 0x0) read$snapshot(r0, &(0x7f0000000080)=""/132, 0x84) 05:44:32 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in={0xa, 0x0, @empty}], 0x10) 05:44:32 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000740), r1) sendmsg$IEEE802154_ADD_IFACE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001440)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000000000002000000009001f0070687930c1"], 0x20}}, 0x0) 05:44:32 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) ioctl$sock_SIOCGIFINDEX(r0, 0x8919, &(0x7f0000000480)={'veth0_to_batadv\x00'}) 05:44:32 executing program 3: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000c80), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_SEC_KEY(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x20, r0, 0xca0c30c5fdceef7d, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}]}, 0x20}}, 0x0) 05:44:32 executing program 0: syz_open_procfs$namespace(0x0, &(0x7f0000001280)='ns/pid_for_children\x00') 05:44:32 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x1, 0x0) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)) pselect6(0x40, &(0x7f0000000380), &(0x7f00000003c0)={0x71}, 0x0, 0x0, 0x0) read$snapshot(r0, &(0x7f0000000080)=""/132, 0x84) 05:44:32 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0xe, 0x38, &(0x7f0000000080)="05804ab382844306d758e60803dc", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 05:44:32 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r0, 0x8982, &(0x7f00000001c0)) socketpair(0x0, 0x0, 0x0, &(0x7f00000000c0)) 05:44:32 executing program 3: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000c80), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_SEC_KEY(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x20, r0, 0xca0c30c5fdceef7d, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}]}, 0x20}}, 0x0) 05:44:32 executing program 0: r0 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, r0) add_key(&(0x7f0000000000)='ceph\x00', 0x0, &(0x7f0000000240)="793312a27a3a5c9e09bbdd17", 0xc, r1) 05:44:32 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r0) 05:44:32 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x1, 0x0) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)) pselect6(0x40, &(0x7f0000000380), &(0x7f00000003c0)={0x71}, 0x0, 0x0, 0x0) read$snapshot(r0, &(0x7f0000000080)=""/132, 0x84) 05:44:32 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="b702000000000080bfa30000000000000703000000feffff7a0af0fff8ffff1971a4f0ff00000000b7060000080000001e6400000000000045040400010000001704000001000a00b7040000000100006a0af2fe00000000850000001a000000b70000000000000095000000000000009e17f199a68b061b93d83298a8cdda1ce784909b849d5550ad855dab54d8877a6db61d69f2ffcaa10350e11cb97ce8df1bc9a0c4eeceb9971e43405d621ffbc9b0d8ca56b50f0c010d631f6dbc8486bc5d5bf2ca8285056892db03cf1c62d57c08a90b189d190c341035de53a9a53608c10556e5734eb84049761451ce540c772e069f80cb201b2de17dfdb4b60939d5d6aed4062049b87e03e2cd18568136207304e26f7fcc059c062234d5595f6fbaa187b81d1106000000000f0000fd9ac3d09e29a9d542ca9d85a5c9c88474895d679838def0a83a733dc6a39b63a5ed69d32394c53361d7480884bd8000000000000000b91c61ccd106cb937b450f859ce8292a79c3e40000b59b0fc46d6cec3c080a882add4e1179bd4a44f231a2d73148be428ba953df4aece69311687f4122073a236c3a32efa04137d4524847d2638da3261c8162bb7c7824be6195a66d2e17e122040e11001131ce319045e5b3334e68475ac3f46aa2837f9004600daded9b19b35eebe52613c346e255421b23a278fd61303618bc9657ffbb3bdb4270b1cd5fc9aa2286ccca37db965d9dd366598f5e52c0097d25ebe19deccb8de4c993cb0cf127e2a46cfbdf63eea190d86a4d1b75ae9848117ebd5828954a7d093a54f7e75b3753508ca3c41685d1e407315e59d626c23b3f89a926e9382966853774e7dd1f1a2177cdf2802237c177d543e8da47a01f05e113e53518270239b69c117e2637c31085f4d8a596b6edab26afaf6605b231199f38a6fc7eb8371438e8077450ea18eafbace8eec18a4b2c442e7b88a7611c1283bec84e1715fb9f4fcaf52c08058fc4f21c0ad71adabdd850aed3eeec6eaab347bdf474e17b9aa345d1e6e3bb83f90230bdf53e7d0e5c3f914d905422b83f30936674ba8f0bffaf2305c0972df71fe5f4e01506471e897b9a4099f86438ac2bbcbdbd1d9db21a1d5c065567fd70aae68096827fa5c2d9bd20292344c7dcf6241447cfbb05b5d0fdb4e08afbac5397b64aa369922ed7ed8918f97294b6854210d2b93aaf92159dbaa2f186d4a420c68d6baf1c31de4f0bf478bfd51b77b1e94ea849a80ae5a89be7e38474c7aade344d68324f9e12a6b9770e6bd12ae69efffaee58040753701af84c2924c1b5aea1650f42c9ae9820a30bd8cc3095f062fb88313d035ea4a0515a61a4be64f9fa0985c5be592090cc48291004609fdac2ab6100000000000000a84570c7c00d647daf8af334050b61e9b2d3f0adad1d1ff47be19b8da2799e9ecef8efabe73f92dbd0760f8bbd9c710bd1371e2b5d9a2ea2190f5e4f5cd641cdfe5d89f84a368ef7e6ff1eacdc0ec9e97b8f9c9e314661ea0aa8a104008d188b66b3a4aedeed9df4238a08fc2fb1007233cc2c87fcaa0cccd8ec03444471c1dd660c73acc17bff740d199a7c0c52c63c0408b5158e0000000c275eedb02f141113cf2c55b2c08c2c68cc99d2bb5840fba332e1c82862ec9b90106248f81d32a47ac94ddee815dba8aeb5381b6241ab15476cbc"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0x2000008e, 0x2, &(0x7f0000000080)="05804ab382844306d758e60803dc", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 05:44:32 executing program 3: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000c80), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_SEC_KEY(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x20, r0, 0xca0c30c5fdceef7d, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}]}, 0x20}}, 0x0) 05:44:32 executing program 1: perf_event_open(&(0x7f0000001480)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:44:32 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001300), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000001100)={'macvtap0\x00', 0x4002}) 05:44:32 executing program 5: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x1, 0x0) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)) pselect6(0x40, &(0x7f0000000380), &(0x7f00000003c0)={0x71}, 0x0, 0x0, 0x0) read$snapshot(r0, &(0x7f0000000080)=""/132, 0x84) 05:44:32 executing program 0: bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0xe, 0x2, &(0x7f0000000080)="05804ab382844306d758e60803dc", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 05:44:32 executing program 4: perf_event_open(&(0x7f0000001480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 05:44:32 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='q'], 0x78}}, 0x0) 05:44:32 executing program 3: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000c80), 0xffffffffffffffff) sendmsg$NL802154_CMD_GET_SEC_KEY(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x20, r0, 0xca0c30c5fdceef7d, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}]}, 0x20}}, 0x0) 05:44:32 executing program 4: pipe2(0x0, 0x0) syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 05:44:32 executing program 2: perf_event_open(&(0x7f0000001480)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a59, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:44:32 executing program 5: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x1, 0x0) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)) pselect6(0x40, &(0x7f0000000380), &(0x7f00000003c0)={0x71}, 0x0, 0x0, 0x0) read$snapshot(r0, &(0x7f0000000080)=""/132, 0x84) 05:44:32 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000380)={'syztnl1\x00', 0x0}) 05:44:32 executing program 0: mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000000), 0xff80, 0x0) 05:44:32 executing program 3: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000c80), 0xffffffffffffffff) sendmsg$NL802154_CMD_GET_SEC_KEY(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x20, r0, 0xca0c30c5fdceef7d, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}]}, 0x20}}, 0x0) 05:44:32 executing program 5: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x1, 0x0) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)) pselect6(0x40, &(0x7f0000000380), &(0x7f00000003c0)={0x71}, 0x0, 0x0, 0x0) read$snapshot(r0, &(0x7f0000000080)=""/132, 0x84) 05:44:32 executing program 2: syz_clone(0x18842400, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)='|') socketpair(0x18, 0x0, 0x1, &(0x7f0000000240)) 05:44:32 executing program 0: socketpair(0x11, 0x2, 0xdc86, &(0x7f0000000000)) 05:44:32 executing program 3: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000c80), 0xffffffffffffffff) sendmsg$NL802154_CMD_GET_SEC_KEY(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x20, r0, 0xca0c30c5fdceef7d, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}]}, 0x20}}, 0x0) 05:44:32 executing program 4: socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$nbd(&(0x7f0000002880), 0xffffffffffffffff) 05:44:32 executing program 0: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$PPPIOCGL2TPSTATS(r0, 0x40086602, 0x0) 05:44:32 executing program 5: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) r0 = syz_open_dev$vcsa(0x0, 0x1, 0x0) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)) pselect6(0x40, &(0x7f0000000380), &(0x7f00000003c0)={0x71}, 0x0, 0x0, 0x0) read$snapshot(r0, &(0x7f0000000080)=""/132, 0x84) 05:44:32 executing program 2: openat$nvram(0xffffffffffffff9c, &(0x7f0000000580), 0x105000, 0x0) 05:44:32 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_SEC_KEY(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x20, 0x0, 0xca0c30c5fdceef7d, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}]}, 0x20}}, 0x0) 05:44:32 executing program 1: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) bind(r0, 0x0, 0x0) 05:44:32 executing program 4: mknod(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) mount$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='uid=', @ANYRESHEX=0x0, @ANYRESHEX]) 05:44:32 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000002040)=@bloom_filter, 0x48) 05:44:32 executing program 0: syz_open_dev$vcsa(&(0x7f00000026c0), 0x0, 0x0) 05:44:32 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_SEC_KEY(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x20, 0x0, 0xca0c30c5fdceef7d, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}]}, 0x20}}, 0x0) 05:44:32 executing program 1: socketpair(0xa, 0x1, 0xbab3, &(0x7f00000000c0)) 05:44:32 executing program 5: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) r0 = syz_open_dev$vcsa(0x0, 0x1, 0x0) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)) pselect6(0x40, &(0x7f0000000380), &(0x7f00000003c0)={0x71}, 0x0, 0x0, 0x0) read$snapshot(r0, &(0x7f0000000080)=""/132, 0x84) [ 338.265196][ T23] audit: type=1400 audit(1677995072.345:403): avc: denied { setattr } for pid=18635 comm="syz-executor.0" path="socket:[66672]" dev="sockfs" ino=66672 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 05:44:32 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:44:32 executing program 5: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) r0 = syz_open_dev$vcsa(0x0, 0x1, 0x0) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)) pselect6(0x40, &(0x7f0000000380), &(0x7f00000003c0)={0x71}, 0x0, 0x0, 0x0) read$snapshot(r0, &(0x7f0000000080)=""/132, 0x84) 05:44:32 executing program 2: pipe2$watch_queue(&(0x7f0000000000), 0x80) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) 05:44:32 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_SEC_KEY(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x20, 0x0, 0xca0c30c5fdceef7d, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}]}, 0x20}}, 0x0) 05:44:32 executing program 4: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000080), 0xc8a82, 0x0) 05:44:32 executing program 1: pipe2(&(0x7f0000001b40)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) pidfd_getfd(r0, 0xffffffffffffffff, 0x0) [ 338.320267][T18646] tmpfs: Bad value for 'uid' 05:44:32 executing program 0: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCGIFMTU(r0, 0x89a0, &(0x7f0000000000)={'gre0\x00'}) 05:44:32 executing program 1: syz_open_dev$vcsa(&(0x7f0000000300), 0x0, 0x80160) 05:44:32 executing program 2: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$PPPIOCGL2TPSTATS(r0, 0x8933, 0x0) 05:44:32 executing program 3: r0 = syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_SEC_KEY(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x20, r0, 0xca0c30c5fdceef7d, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}]}, 0x20}}, 0x0) 05:44:32 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x14}}, 0x0) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14}, 0x14}}, 0x0) 05:44:32 executing program 5: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x0, 0x0) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)) pselect6(0x40, &(0x7f0000000380), &(0x7f00000003c0)={0x71}, 0x0, 0x0, 0x0) read$snapshot(r0, &(0x7f0000000080)=""/132, 0x84) 05:44:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000080)={'ip_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x7800, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @private}}}}) 05:44:32 executing program 2: pipe2$watch_queue(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$PPPIOCGL2TPSTATS(r0, 0x541b, 0x0) [ 338.369979][ T23] audit: type=1400 audit(1677995072.375:404): avc: denied { bind } for pid=18636 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 05:44:32 executing program 3: r0 = syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_SEC_KEY(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x20, r0, 0xca0c30c5fdceef7d, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}]}, 0x20}}, 0x0) 05:44:32 executing program 4: openat$nvram(0xffffffffffffff9c, 0x0, 0x105080, 0x0) 05:44:32 executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$PPPIOCGL2TPSTATS(r0, 0x5460, 0x0) 05:44:32 executing program 0: openat$nvram(0xffffffffffffff9c, &(0x7f00000001c0), 0x105080, 0x0) 05:44:32 executing program 5: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x0, 0x0) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)) pselect6(0x40, &(0x7f0000000380), &(0x7f00000003c0)={0x71}, 0x0, 0x0, 0x0) read$snapshot(r0, &(0x7f0000000080)=""/132, 0x84) 05:44:32 executing program 2: pselect6(0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x77359400}, &(0x7f00000001c0)={&(0x7f0000000180)={[0x1ff]}, 0x8}) 05:44:32 executing program 4: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$sock_ifreq(r0, 0x8932, &(0x7f0000000040)={'vxcan1\x00', @ifru_mtu}) 05:44:32 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000300), 0x0, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, 0x0) 05:44:32 executing program 3: r0 = syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_SEC_KEY(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x20, r0, 0xca0c30c5fdceef7d, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}]}, 0x20}}, 0x0) 05:44:32 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001e40)={0x6, 0x0, 0x0, &(0x7f0000001c00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:44:32 executing program 5: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x0, 0x0) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)) pselect6(0x40, &(0x7f0000000380), &(0x7f00000003c0)={0x71}, 0x0, 0x0, 0x0) read$snapshot(r0, &(0x7f0000000080)=""/132, 0x84) 05:44:32 executing program 3: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000c80), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_SEC_KEY(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x20, r0, 0xca0c30c5fdceef7d, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}]}, 0x20}}, 0x0) 05:44:32 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f0000001e80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 05:44:32 executing program 1: pselect6(0x40, &(0x7f0000000080), &(0x7f00000000c0), 0x0, 0x0, 0x0) 05:44:32 executing program 0: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$PPPIOCGL2TPSTATS(r0, 0x8906, 0x0) 05:44:32 executing program 3: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000c80), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_SEC_KEY(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x20, r0, 0xca0c30c5fdceef7d, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}]}, 0x20}}, 0x0) 05:44:32 executing program 5: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x1, 0x0) socketpair(0x0, 0x3, 0x0, &(0x7f0000000000)) pselect6(0x40, &(0x7f0000000380), &(0x7f00000003c0)={0x71}, 0x0, 0x0, 0x0) read$snapshot(r0, &(0x7f0000000080)=""/132, 0x84) [ 338.868797][ T3332] tipc: Node number set to 2886996992 [ 338.878787][ T886] tipc: Node number set to 8891050 05:44:33 executing program 2: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f0000000100)={'nr0\x00'}) 05:44:33 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000002040)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) 05:44:33 executing program 3: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000c80), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_SEC_KEY(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x20, r0, 0xca0c30c5fdceef7d, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}]}, 0x20}}, 0x0) 05:44:33 executing program 0: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCGIFMTU(r0, 0x8971, &(0x7f0000000000)={'gre0\x00'}) 05:44:33 executing program 5: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x1, 0x0) socketpair(0x0, 0x3, 0x0, &(0x7f0000000000)) pselect6(0x40, &(0x7f0000000380), &(0x7f00000003c0)={0x71}, 0x0, 0x0, 0x0) read$snapshot(r0, &(0x7f0000000080)=""/132, 0x84) 05:44:33 executing program 4: syz_open_dev$vcsa(&(0x7f0000000880), 0x0, 0x4d8c00) 05:44:33 executing program 0: pipe2$watch_queue(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) recvmsg$kcm(r0, 0x0, 0x0) 05:44:33 executing program 3: syz_genetlink_get_family_id$nl802154(&(0x7f0000000c80), 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_SEC_KEY(r0, 0x0, 0x0) 05:44:33 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[], 0x68}}, 0x0) 05:44:33 executing program 4: socket$pppl2tp(0x18, 0x1, 0x1) socketpair(0x1d, 0x0, 0x0, &(0x7f0000000100)) 05:44:33 executing program 5: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x1, 0x0) socketpair(0x0, 0x3, 0x0, &(0x7f0000000000)) pselect6(0x40, &(0x7f0000000380), &(0x7f00000003c0)={0x71}, 0x0, 0x0, 0x0) read$snapshot(r0, &(0x7f0000000080)=""/132, 0x84) 05:44:33 executing program 0: r0 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0x0) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, r2) add_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)="c0d43ad8cd34561719fd8de83491b62029f99af0b620ccb86ab746bd955e808115e82b41ada3b623920a2a47b1c6d770d3f930a0d6fd8fabbe58cd77d519c1778eb4b730204f559aff2dbffa98966bbebb9bc8f62cf8635bb511cf09c23538bc241695de359bbb66c53edb86e3f29c4cc13d602cd5bf5d033532e0ebfb5888ac1b", 0x81, 0xfffffffffffffffe) request_key(&(0x7f0000000340)='id_legacy\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='syz', r1) 05:44:33 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000000)={0x0, 0xfff}) 05:44:33 executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) bind(r0, 0x0, 0x0) 05:44:33 executing program 3: syz_genetlink_get_family_id$nl802154(&(0x7f0000000c80), 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_SEC_KEY(r0, 0x0, 0x0) 05:44:33 executing program 0: pselect6(0x40, &(0x7f0000000080), &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x77359400}, &(0x7f00000001c0)={&(0x7f0000000180)={[0x1ff]}, 0x8}) 05:44:33 executing program 5: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x1, 0x0) socketpair(0x1, 0x0, 0x0, &(0x7f0000000000)) pselect6(0x40, &(0x7f0000000380), &(0x7f00000003c0)={0x71}, 0x0, 0x0, 0x0) read$snapshot(r0, &(0x7f0000000080)=""/132, 0x84) 05:44:33 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='GPL\x00', 0x1, 0xe7, &(0x7f00000000c0)=""/231, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:44:33 executing program 3: syz_genetlink_get_family_id$nl802154(&(0x7f0000000c80), 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_SEC_KEY(r0, 0x0, 0x0) 05:44:33 executing program 2: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$PPPIOCGL2TPSTATS(r0, 0x5451, 0x0) 05:44:33 executing program 4: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/kernel/notes', 0x200, 0x0) 05:44:33 executing program 5: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x1, 0x0) socketpair(0x1, 0x0, 0x0, &(0x7f0000000000)) pselect6(0x40, &(0x7f0000000380), &(0x7f00000003c0)={0x71}, 0x0, 0x0, 0x0) read$snapshot(r0, &(0x7f0000000080)=""/132, 0x84) 05:44:33 executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) sendmmsg(r0, &(0x7f000000bd80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x1068}}], 0x1, 0x0) [ 339.442195][T18740] can: request_module (can-proto-0) failed. 05:44:33 executing program 2: syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) syz_open_procfs$userns(0x0, 0x0) syz_genetlink_get_family_id$gtp(0x0, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 05:44:33 executing program 4: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$PPPIOCGL2TPSTATS(r0, 0x8982, 0x0) 05:44:33 executing program 3: syz_genetlink_get_family_id$nl802154(&(0x7f0000000c80), 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_SEC_KEY(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) 05:44:33 executing program 5: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x1, 0x0) socketpair(0x1, 0x0, 0x0, &(0x7f0000000000)) pselect6(0x40, &(0x7f0000000380), &(0x7f00000003c0)={0x71}, 0x0, 0x0, 0x0) read$snapshot(r0, &(0x7f0000000080)=""/132, 0x84) 05:44:34 executing program 0: mkdir(&(0x7f0000000580)='./file0\x00', 0xaa6f6396d0ed07f2) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x0, 0x0) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0xb) 05:44:34 executing program 4: getsockopt$WPAN_WANTLQI(0xffffffffffffffff, 0x0, 0x3, 0x0, 0x0) 05:44:34 executing program 3: syz_genetlink_get_family_id$nl802154(&(0x7f0000000c80), 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_SEC_KEY(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) 05:44:34 executing program 1: io_setup(0x1000, &(0x7f0000000000)=0x0) r1 = socket$unix(0x1, 0x5, 0x0) io_submit(r0, 0x2, &(0x7f0000000980)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}, 0x0]) 05:44:34 executing program 5: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x1, 0x0) socketpair(0x1, 0x3, 0x0, 0x0) pselect6(0x40, &(0x7f0000000380), &(0x7f00000003c0)={0x71}, 0x0, 0x0, 0x0) read$snapshot(r0, &(0x7f0000000080)=""/132, 0x84) 05:44:34 executing program 2: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCGIFMTU(r0, 0x8930, &(0x7f0000000000)={'gre0\x00'}) 05:44:34 executing program 4: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000580), 0x8002, 0x0) 05:44:34 executing program 2: pselect6(0x40, &(0x7f0000000080), 0x0, &(0x7f0000000100)={0x65d6}, 0x0, &(0x7f00000001c0)={&(0x7f0000000180), 0x8}) 05:44:34 executing program 5: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x1, 0x0) socketpair(0x1, 0x3, 0x0, 0x0) pselect6(0x40, &(0x7f0000000380), &(0x7f00000003c0)={0x71}, 0x0, 0x0, 0x0) read$snapshot(r0, &(0x7f0000000080)=""/132, 0x84) 05:44:34 executing program 3: syz_genetlink_get_family_id$nl802154(&(0x7f0000000c80), 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_SEC_KEY(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) 05:44:34 executing program 5: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x1, 0x0) socketpair(0x1, 0x3, 0x0, 0x0) pselect6(0x40, &(0x7f0000000380), &(0x7f00000003c0)={0x71}, 0x0, 0x0, 0x0) read$snapshot(r0, &(0x7f0000000080)=""/132, 0x84) 05:44:34 executing program 4: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$PPPIOCGL2TPSTATS(r0, 0x2, 0x0) [ 340.437382][T15228] udevd[15228]: inotify_add_watch(7, /dev/loop11, 10) failed: No such file or directory 05:44:35 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000180), r1) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB='h'], 0x68}}, 0x0) 05:44:35 executing program 3: syz_genetlink_get_family_id$nl802154(&(0x7f0000000c80), 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_SEC_KEY(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) 05:44:35 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0x0, 0x0) socketpair(0x39, 0x0, 0x0, &(0x7f0000000280)) 05:44:35 executing program 5: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x1, 0x0) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)) pselect6(0x0, 0x0, &(0x7f00000003c0)={0x71}, 0x0, 0x0, 0x0) read$snapshot(r0, &(0x7f0000000080)=""/132, 0x84) 05:44:35 executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCGIFMTU(r0, 0x40086602, &(0x7f0000000000)={'gre0\x00'}) 05:44:35 executing program 4: r0 = socket$pppl2tp(0x18, 0x1, 0x1) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) 05:44:35 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f0000001e80)=[{{&(0x7f0000000140)=@in={0x2, 0x0, @broadcast}, 0x80, 0x0}}], 0x1, 0x0) 05:44:35 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001e40)={0x6, 0xa, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000100000000193357245f00001a00000007ef09000300000985200000020000005d59f4ffffffffff70060200f0caff", @ANYRES32, @ANYBLOB="0000000000000000850000006d00000095"], &(0x7f0000001c00)='GPL\x00', 0x7, 0xc7, &(0x7f0000001c40)=""/199, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:44:35 executing program 0: openat$nvram(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 05:44:35 executing program 3: syz_genetlink_get_family_id$nl802154(&(0x7f0000000c80), 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_SEC_KEY(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) 05:44:35 executing program 4: pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) write$P9_RSETATTR(r0, &(0x7f0000000040)={0x7}, 0x7) 05:44:35 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0x3, 0x2) 05:44:35 executing program 1: pselect6(0x40, &(0x7f0000000000)={0x7fffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000001c0), &(0x7f0000000140)={&(0x7f0000000100)={[0x9]}, 0x8}) 05:44:35 executing program 0: socketpair(0x28, 0x0, 0xd487, &(0x7f0000000380)) 05:44:35 executing program 4: r0 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r0, &(0x7f0000000040)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x32) 05:44:36 executing program 5: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x1, 0x0) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)) pselect6(0x0, 0x0, &(0x7f00000003c0)={0x71}, 0x0, 0x0, 0x0) read$snapshot(r0, &(0x7f0000000080)=""/132, 0x84) 05:44:36 executing program 3: syz_genetlink_get_family_id$nl802154(&(0x7f0000000c80), 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_SEC_KEY(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) 05:44:36 executing program 2: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$PPPIOCGL2TPSTATS(r0, 0x8941, 0x0) 05:44:36 executing program 0: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f0000000000)={'gre0\x00'}) 05:44:36 executing program 1: syz_open_dev$vcsa(&(0x7f0000000000), 0x0, 0x4200) 05:44:36 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001e40)={0x6, 0xa, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000100000000193357245f00001a00000007ef09000300000985200000020000005d59f4ffffffffff70060200f0caff", @ANYRES32, @ANYBLOB="0000000000000000850000006d00000095"], &(0x7f0000001c00)='GPL\x00', 0x7, 0xc7, &(0x7f0000001c40)=""/199, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d80), 0x10}, 0x80) 05:44:36 executing program 4: syz_genetlink_get_family_id$nbd(0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000180), r0) 05:44:36 executing program 2: sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000002880), 0xffffffffffffffff) r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r0, 0x0, 0x0, &(0x7f0000002c80), 0x4) 05:44:36 executing program 3: syz_genetlink_get_family_id$nl802154(&(0x7f0000000c80), 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_SEC_KEY(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x20, 0x0, 0xca0c30c5fdceef7d, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}]}, 0x20}}, 0x0) 05:44:36 executing program 0: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCGIFMTU(r0, 0x4020940d, &(0x7f0000000000)={'gre0\x00'}) 05:44:36 executing program 1: openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0xe682, 0x0) 05:44:36 executing program 3: syz_genetlink_get_family_id$nl802154(&(0x7f0000000c80), 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_SEC_KEY(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x20, 0x0, 0xca0c30c5fdceef7d, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}]}, 0x20}}, 0x0) [ 342.067548][ T23] audit: type=1400 audit(1677995076.145:405): avc: denied { append } for pid=18854 comm="syz-executor.1" name="nvram" dev="devtmpfs" ino=98 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nvram_device_t tclass=chr_file permissive=1 05:44:36 executing program 5: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x1, 0x0) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)) pselect6(0x0, 0x0, &(0x7f00000003c0)={0x71}, 0x0, 0x0, 0x0) read$snapshot(r0, &(0x7f0000000080)=""/132, 0x84) 05:44:36 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='GPL\x00', 0x1, 0xe7, &(0x7f00000000c0)=""/231, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1]}, 0x80) 05:44:36 executing program 1: syz_genetlink_get_family_id$team(0x0, 0xffffffffffffffff) pipe2(&(0x7f0000002480)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000002600), r0) 05:44:36 executing program 4: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$PPPIOCGL2TPSTATS(r0, 0x8912, 0x0) 05:44:36 executing program 2: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f0000000200)={'pimreg\x00'}) 05:44:36 executing program 3: syz_genetlink_get_family_id$nl802154(&(0x7f0000000c80), 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_SEC_KEY(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x20, 0x0, 0xca0c30c5fdceef7d, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}]}, 0x20}}, 0x0) 05:44:37 executing program 3: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000c80), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_SEC_KEY(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x20, r0, 0x0, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}]}, 0x20}}, 0x0) 05:44:37 executing program 4: syz_open_dev$vcsa(&(0x7f0000000080), 0x0, 0x410001) 05:44:37 executing program 1: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) bind(r0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80) 05:44:37 executing program 0: getsockopt$WPAN_WANTLQI(0xffffffffffffffff, 0x0, 0x3, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) 05:44:37 executing program 1: socket$packet(0x11, 0x0, 0x300) syz_genetlink_get_family_id$nbd(&(0x7f0000002880), 0xffffffffffffffff) syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) 05:44:37 executing program 0: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) 05:44:37 executing program 5: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x1, 0x0) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)) pselect6(0x40, &(0x7f0000000380), 0x0, 0x0, 0x0, 0x0) read$snapshot(r0, &(0x7f0000000080)=""/132, 0x84) 05:44:37 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) sendmsg$inet(r0, &(0x7f0000000680)={&(0x7f0000000040)={0x2, 0x0, @local}, 0x10, 0x0}, 0x0) 05:44:37 executing program 3: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000c80), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_SEC_KEY(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x20, r0, 0x0, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}]}, 0x20}}, 0x0) 05:44:37 executing program 0: socketpair(0x23, 0x0, 0x400, &(0x7f0000000000)) 05:44:37 executing program 2: syz_open_dev$vcsa(&(0x7f0000000300), 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 05:44:37 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f0000001e80)=[{{&(0x7f0000000140)=@in={0x2, 0x4e20, @broadcast}, 0x80, 0x0, 0x0, &(0x7f0000000640)=[{0x10, 0x10c}, {0x10, 0x118}], 0x20}}], 0x1, 0x0) 05:44:37 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_RINGS_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x18, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) 05:44:37 executing program 4: syz_genetlink_get_family_id$team(&(0x7f0000000280), 0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f0000002600), 0xffffffffffffffff) 05:44:37 executing program 1: mknod(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) mount$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB=',']) 05:44:37 executing program 3: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000c80), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_SEC_KEY(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x20, r0, 0x0, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}]}, 0x20}}, 0x0) 05:44:37 executing program 4: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000040), 0xa8040, 0x0) 05:44:37 executing program 0: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$PPPIOCGL2TPSTATS(r0, 0x80047453, 0x0) [ 343.839985][ T23] audit: type=1400 audit(1677995077.925:406): avc: denied { mount } for pid=18907 comm="syz-executor.1" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 05:44:38 executing program 5: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x1, 0x0) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)) pselect6(0x40, &(0x7f0000000380), 0x0, 0x0, 0x0, 0x0) read$snapshot(r0, &(0x7f0000000080)=""/132, 0x84) 05:44:38 executing program 2: r0 = socket$pppl2tp(0x18, 0x1, 0x1) accept$packet(r0, 0x0, 0x0) 05:44:38 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000004a8b13"], 0x14}}, 0x0) 05:44:38 executing program 4: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000002c0)={'team0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x1, &(0x7f0000000200)=@raw=[@exit], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:44:38 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000240)={'wlan1\x00', 0x0}) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$eventfd(0xffffffffffffffff, &(0x7f0000000240), 0xffffff14) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="48040000", @ANYRES16=r3, @ANYBLOB="01edff000000000004003b1c210008000300", @ANYRES32=r2, @ANYBLOB="2c0433005000de295b3acba52ee4080211000001505050505050"], 0x448}}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000000)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r4, 0x0) sendmsg$NL80211_CMD_UPDATE_CONNECT_PARAMS(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f00000002c0)={0x164, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_IE={0x121, 0x2a, [@fast_bss_trans={0x37, 0xe3, {0x0, 0x8, "84205e07ac6af6f509674c8ce09750ec", "ee23b09cd40dc91e9f9ee9edd9b537abef048dcfb49c718a4f1a01ce0754ea55", "429d43506ccb41131fa242b3fa5318b314d219fd336171801ad273ddb84478d1", [{0x0, 0x23, "ea7c0d0020607cd7daef5a25aad914febadfb2b7e606f5b7f01d00a33ad4c6a54f50fc"}, {0x0, 0x8, "ea21a98a6a52594f"}, {0x0, 0x21, "b8ce609e73492f9ff9376285d0e464e14da813a48b19e223955e0d6076e51930b6"}, {0x0, 0x18, "3922c89532b870d995b81965095ad4b6b1ea1f4b15160bfd"}, {0x0, 0x15, "3f32a564da17ee946b74e7e30d036cb392ed1cac20"}, {0x0, 0x6, "ca63e0012314"}, {}, {0x0, 0x2, "0002"}]}}, @ht={0x2d, 0x1a}, @ht={0x2d, 0x1a}]}, @fils_params=[@NL80211_ATTR_FILS_ERP_REALM={0x21, 0xfa, "d91499b2bb69b84f0bdf1c76e4493f80f0f68de16fd7f78be83183794a"}]]}, 0x164}}, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r6, r5, 0x0, 0x10000a006) 05:44:38 executing program 3: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000c80), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_SEC_KEY(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x14, r0, 0xca0c30c5fdceef7d}, 0x14}}, 0x0) 05:44:38 executing program 0: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$PPPIOCGL2TPSTATS(r0, 0xc020660b, 0x0) 05:44:38 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) sendto$packet(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) 05:44:38 executing program 2: pipe2$watch_queue(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) connect$pppl2tp(r0, 0x0, 0x0) 05:44:38 executing program 3: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000000)={'geneve0\x00', 0xffffffc1}) 05:44:38 executing program 0: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCGIFMTU(r0, 0x8982, &(0x7f0000000000)={'gre0\x00'}) 05:44:38 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001180)={0x6, 0x4, &(0x7f0000000000)=@raw=[@jmp, @func, @initr0], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x1000, &(0x7f0000000080)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 344.707565][T18937] net_ratelimit: 5 callbacks suppressed [ 344.707581][T18937] geneve0: mtu less than device minimum 05:44:39 executing program 5: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x1, 0x0) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)) pselect6(0x40, &(0x7f0000000380), 0x0, 0x0, 0x0, 0x0) read$snapshot(r0, &(0x7f0000000080)=""/132, 0x84) 05:44:39 executing program 4: syz_open_dev$vcsa(&(0x7f00000026c0), 0x2, 0x0) 05:44:39 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$WPAN_SECURITY_LEVEL(r0, 0x0, 0x2, &(0x7f00000000c0)=0x5, 0x4) getsockopt$WPAN_SECURITY_LEVEL(r0, 0x0, 0x2, 0x0, &(0x7f0000000040)) 05:44:39 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_buf(r0, 0x107, 0x0, 0x0, &(0x7f0000002c40)) 05:44:39 executing program 0: r0 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r0, &(0x7f0000000100)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}}, 0x3a) 05:44:39 executing program 1: syz_genetlink_get_family_id$nbd(&(0x7f0000002880), 0xffffffffffffffff) 05:44:39 executing program 2: setsockopt$pppl2tp_PPPOL2TP_SO_SENDSEQ(0xffffffffffffffff, 0x111, 0x3, 0x0, 0xfffffffffffffd76) 05:44:39 executing program 0: openat$nvram(0xffffffffffffff9c, &(0x7f0000007280), 0x400, 0x0) 05:44:39 executing program 4: pipe2$watch_queue(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='GPL\x00', 0x1, 0xe7, &(0x7f00000000c0)=""/231, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x80) 05:44:39 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_RINGS_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pim6reg1\x00'}]}]}, 0x2c}}, 0x0) 05:44:39 executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) sendmmsg(r0, &(0x7f000000bd80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f000000c000)=ANY=[], 0x1068}}], 0x1, 0x0) 05:44:39 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001180)={0x6, 0x1, &(0x7f0000000000)=@raw=[@func], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x1000, &(0x7f0000000080)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:44:40 executing program 5: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x1, 0x0) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)) pselect6(0x40, &(0x7f0000000380), &(0x7f00000003c0), 0x0, 0x0, 0x0) read$snapshot(r0, &(0x7f0000000080)=""/132, 0x84) 05:44:40 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 05:44:40 executing program 4: r0 = socket$pppl2tp(0x18, 0x1, 0x1) sendmmsg(r0, &(0x7f000000bd80)=[{{&(0x7f0000000000)=@nl=@proc, 0x80, 0x0, 0x0, &(0x7f000000c000)=ANY=[], 0x1068}}], 0x1, 0x0) 05:44:40 executing program 0: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000080)={'bond_slave_1\x00'}) 05:44:40 executing program 2: bpf$PROG_LOAD_XDP(0x16, &(0x7f0000001e40)={0x6, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:44:40 executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$PPPIOCGL2TPSTATS(r0, 0x5452, 0x0) 05:44:40 executing program 1: socket$pppl2tp(0x18, 0x1, 0x1) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 05:44:40 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_GET(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) 05:44:40 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001180)={0x6, 0x4, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff4}, @func, @initr0], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x1000, &(0x7f0000000080)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:44:40 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) sendmsg$inet(r0, &(0x7f0000000680)={0x0, 0x0, 0x0}, 0x0) 05:44:40 executing program 4: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$PPPIOCGL2TPSTATS(r0, 0x80108906, 0x0) 05:44:40 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x14, 0x0, 0x1}, 0x14}}, 0x0) [ 346.407074][T18976] bond_slave_1: mtu less than device minimum 05:44:40 executing program 3: mknod(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='huge=always,mpol=interleave,n']) [ 346.503831][T18998] tmpfs: Unsupported parameter 'huge' 05:44:41 executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r0, &(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x8a) 05:44:41 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000080)={0x1, &(0x7f0000000180)=[{0x6}]}) pipe(0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) 05:44:41 executing program 2: pipe2(0x0, 0xc880) 05:44:41 executing program 4: bpf$PROG_LOAD_XDP(0x2, &(0x7f0000001e40)={0x6, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:44:41 executing program 0: socketpair(0x18, 0x0, 0x3f, &(0x7f0000000100)) 05:44:41 executing program 5: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x1, 0x0) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)) pselect6(0x40, &(0x7f0000000380), &(0x7f00000003c0), 0x0, 0x0, 0x0) read$snapshot(r0, &(0x7f0000000080)=""/132, 0x84) 05:44:41 executing program 2: socketpair(0x1, 0x0, 0x18, &(0x7f0000000000)) 05:44:41 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_RINGS_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x14, r1, 0x1}, 0x14}}, 0x0) 05:44:41 executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$PPPIOCGL2TPSTATS(r0, 0x8903, 0x0) 05:44:41 executing program 4: openat$nvram(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) 05:44:41 executing program 2: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$PPPIOCGL2TPSTATS(r0, 0x541b, 0x0) 05:44:41 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000002040)=@bloom_filter={0x1e, 0x0, 0x486cc6f5, 0xffff1f8b, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, 0x48) 05:44:41 executing program 2: pselect6(0x40, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) [ 347.291057][ T23] audit: type=1326 audit(1677995081.375:407): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19001 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fb0995570f9 code=0x0 05:44:42 executing program 5: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x1, 0x0) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)) pselect6(0x40, &(0x7f0000000380), &(0x7f00000003c0), 0x0, 0x0, 0x0) read$snapshot(r0, &(0x7f0000000080)=""/132, 0x84) 05:44:42 executing program 1: syz_io_uring_setup(0x63d2, &(0x7f0000000100)={0x0, 0x7708, 0x8, 0x0, 0x2a1}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000000180), 0x0) syz_io_uring_setup(0x25d2, &(0x7f0000000240), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0, 0x0) 05:44:42 executing program 4: recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001e40)={0x6, 0x1, &(0x7f0000001bc0)=@raw=[@call], &(0x7f0000001c00)='GPL\x00', 0x7, 0xc7, &(0x7f0000001c40)=""/199, 0x40f00, 0x6, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:44:42 executing program 0: pipe2$watch_queue(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) accept$packet(r0, 0x0, 0x0) 05:44:42 executing program 3: r0 = socket$pppl2tp(0x18, 0x1, 0x1) getsockopt$PNPIPE_HANDLE(r0, 0x113, 0x3, 0x0, 0x0) 05:44:42 executing program 4: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$PPPIOCGL2TPSTATS(r0, 0x401c5820, 0x0) 05:44:42 executing program 0: r0 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) 05:44:42 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='GPL\x00', 0x1, 0xe7, &(0x7f00000000c0)=""/231, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:44:42 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f0000001e80)=[{{&(0x7f0000000140)=@in={0x2, 0x4e20, @broadcast}, 0x80, 0x0, 0x0, &(0x7f0000000640)=[{0x10, 0x10c}, {0x10}], 0x20}}], 0x1, 0x0) 05:44:42 executing program 2: r0 = socket$pppl2tp(0x18, 0x1, 0x1) sendmmsg(r0, &(0x7f000000bd80)=[{{&(0x7f0000000000)=@nl=@proc, 0x80, &(0x7f0000002480)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, &(0x7f000000c000)=ANY=[], 0x1068}}], 0x1, 0x0) 05:44:42 executing program 0: openat$nvram(0xffffffffffffff9c, &(0x7f00000002c0), 0x202, 0x0) 05:44:42 executing program 4: bpf$PROG_LOAD_XDP(0x21, &(0x7f0000001e40)={0x6, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:44:43 executing program 5: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) syz_open_dev$vcsa(&(0x7f0000000040), 0x1, 0x0) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)) pselect6(0x40, &(0x7f0000000380), &(0x7f00000003c0)={0x71}, 0x0, 0x0, 0x0) read$snapshot(0xffffffffffffffff, &(0x7f0000000080)=""/132, 0x84) 05:44:43 executing program 1: sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, 0x0, 0x0) 05:44:43 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f0000001e80)=[{{&(0x7f0000000140)=@in={0x2, 0x4e20, @broadcast}, 0x80, 0x0, 0x0, &(0x7f0000000640)=[{0x10, 0x10c}, {0x10}], 0x20}}], 0x1, 0x0) 05:44:43 executing program 0: syz_open_dev$vcsa(&(0x7f0000000000), 0x10001, 0x0) 05:44:43 executing program 4: pipe2$watch_queue(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='GPL\x00', 0x1, 0xe7, &(0x7f00000000c0)=""/231, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1]}, 0x80) 05:44:43 executing program 2: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$PPPIOCGL2TPSTATS(r0, 0x4020940d, 0x0) 05:44:43 executing program 0: pipe2$watch_queue(&(0x7f0000000280), 0x80) 05:44:43 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f0000001e80)=[{{&(0x7f0000000140)=@in={0x2, 0x4e20, @broadcast}, 0x80, 0x0, 0x0, &(0x7f0000000640)=[{0x10, 0x10c}, {0x10}], 0x20}}], 0x1, 0x0) 05:44:43 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000005000)={0x6, 0x1, &(0x7f0000004dc0)=@raw=[@call], &(0x7f0000004e00)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:44:43 executing program 4: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) ioctl$sock_ifreq(r0, 0x0, 0x0) 05:44:43 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000080)={'vxcan1\x00'}) 05:44:43 executing program 2: pipe2(&(0x7f0000001b40), 0x0) 05:44:43 executing program 5: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) syz_open_dev$vcsa(&(0x7f0000000040), 0x1, 0x0) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)) pselect6(0x40, &(0x7f0000000380), &(0x7f00000003c0)={0x71}, 0x0, 0x0, 0x0) read$snapshot(0xffffffffffffffff, &(0x7f0000000080)=""/132, 0x84) 05:44:43 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f0000001e80)=[{{&(0x7f0000000140)=@in={0x2, 0x4e20, @broadcast}, 0x80, 0x0, 0x0, &(0x7f0000000640)=[{0x10, 0x10c}, {0x10}], 0x20}}], 0x1, 0x0) 05:44:43 executing program 4: r0 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x4, 0x0, 0x0, 0x3}}, 0x26) 05:44:43 executing program 1: pselect6(0x40, &(0x7f0000000080), 0x0, &(0x7f0000000100)={0x65d6}, 0x0, 0x0) 05:44:43 executing program 5: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) syz_open_dev$vcsa(&(0x7f0000000040), 0x1, 0x0) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)) pselect6(0x40, &(0x7f0000000380), &(0x7f00000003c0)={0x71}, 0x0, 0x0, 0x0) read$snapshot(0xffffffffffffffff, &(0x7f0000000080)=""/132, 0x84) 05:44:43 executing program 0: socketpair(0x39, 0x0, 0x0, &(0x7f0000000280)) 05:44:43 executing program 1: pselect6(0x0, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000140)={0x77359400}, &(0x7f00000001c0)={&(0x7f0000000180)={[0x1ff]}, 0x8}) 05:44:43 executing program 4: mknod(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)={[{@huge_advise}, {@size={'size', 0x3d, [0x6b, 0x25]}}]}) 05:44:43 executing program 3: sendmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{&(0x7f0000000140)=@in={0x2, 0x4e20, @broadcast}, 0x80, 0x0, 0x0, &(0x7f0000000640)=[{0x10, 0x10c}, {0x10}], 0x20}}], 0x1, 0x0) 05:44:43 executing program 2: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$PPPIOCGL2TPSTATS(r0, 0x40049409, 0x0) 05:44:43 executing program 0: bpf$PROG_LOAD_XDP(0x12, &(0x7f0000001e40)={0x6, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:44:43 executing program 5: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x1, 0x0) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)) pselect6(0x40, &(0x7f0000000380), &(0x7f00000003c0)={0x71}, 0x0, 0x0, 0x0) read$snapshot(r0, 0x0, 0x0) 05:44:43 executing program 3: sendmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{&(0x7f0000000140)=@in={0x2, 0x4e20, @broadcast}, 0x80, 0x0, 0x0, &(0x7f0000000640)=[{0x10, 0x10c}, {0x10}], 0x20}}], 0x1, 0x0) 05:44:43 executing program 5: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x1, 0x0) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)) pselect6(0x40, &(0x7f0000000380), &(0x7f00000003c0)={0x71}, 0x0, 0x0, 0x0) read$snapshot(r0, 0x0, 0x0) 05:44:43 executing program 2: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r0, 0x0, 0x0, &(0x7f0000002c80), 0x4) 05:44:43 executing program 4: pipe2$watch_queue(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='GPL\x00', 0x1, 0xe7, &(0x7f00000000c0)=""/231, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000001c0), 0x8, 0x10, 0x0}, 0x80) 05:44:43 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='q.'], 0x78}}, 0x0) [ 349.157665][T19089] tmpfs: Unsupported parameter 'huge' 05:44:43 executing program 3: sendmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{&(0x7f0000000140)=@in={0x2, 0x4e20, @broadcast}, 0x80, 0x0, 0x0, &(0x7f0000000640)=[{0x10, 0x10c}, {0x10}], 0x20}}], 0x1, 0x0) 05:44:44 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000002040)=@bloom_filter={0x1e, 0x0, 0x486cc6f5, 0xffff1f8b, 0x2}, 0x48) 05:44:44 executing program 2: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$WPAN_WANTACK(r0, 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000080)=0x4) 05:44:44 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001e40)={0x6, 0x1, &(0x7f0000001bc0)=@raw=[@call], &(0x7f0000001c00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:44:44 executing program 0: mknod(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='huge=always,mpol=interleave']) 05:44:44 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{&(0x7f0000000140)=@in={0x2, 0x4e20, @broadcast}, 0x80, 0x0, 0x0, &(0x7f0000000640)=[{0x10, 0x10c}, {0x10}], 0x20}}], 0x1, 0x0) 05:44:44 executing program 5: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x1, 0x0) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)) pselect6(0x40, &(0x7f0000000380), &(0x7f00000003c0)={0x71}, 0x0, 0x0, 0x0) read$snapshot(r0, 0x0, 0x0) 05:44:44 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x2, &(0x7f0000000000)=@raw=[@map_fd], &(0x7f0000000040)='GPL\x00', 0x9, 0x9d, &(0x7f0000000080)=""/157, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:44:44 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f0000001e80)=[{{&(0x7f0000000140)=@in={0x2, 0x4e20, @broadcast}, 0x80, 0x0, 0x0, &(0x7f0000000640)=[{0x10}], 0x10}}], 0x1, 0x0) 05:44:44 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{&(0x7f0000000140)=@in={0x2, 0x4e20, @broadcast}, 0x80, 0x0, 0x0, &(0x7f0000000640)=[{0x10, 0x10c}, {0x10}], 0x20}}], 0x1, 0x0) 05:44:44 executing program 1: syz_genetlink_get_family_id$nbd(&(0x7f0000002880), 0xffffffffffffffff) r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r0, 0x0, 0x0, &(0x7f0000002c80), 0x4) 05:44:44 executing program 5: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$PPPIOCGL2TPSTATS(r0, 0x8940, 0x0) 05:44:44 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_RINGS_GET(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x28}}, 0x0) 05:44:44 executing program 2: mknod(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) mount$9p_virtio(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000180), 0x0, &(0x7f0000000280)={'trans=virtio,', {[{@version_u}]}}) [ 350.025683][ T23] audit: type=1400 audit(1677995084.105:408): avc: denied { getopt } for pid=19113 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 350.053922][T19124] tmpfs: Unsupported parameter 'huge' 05:44:44 executing program 4: openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x8001, 0x0) 05:44:44 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000002040)=@bloom_filter={0x1e, 0x1}, 0x48) 05:44:44 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{&(0x7f0000000140)=@in={0x2, 0x4e20, @broadcast}, 0x80, 0x0, 0x0, &(0x7f0000000640)=[{0x10, 0x10c}, {0x10}], 0x20}}], 0x1, 0x0) 05:44:44 executing program 1: mkdir(&(0x7f0000000580)='./file0\x00', 0xaa6f6396d0ed07f2) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0xb) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0xb) 05:44:44 executing program 2: r0 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, r0) 05:44:44 executing program 5: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$PPPIOCGL2TPSTATS(r0, 0x801c581f, 0x0) 05:44:44 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000300), 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, 0x0) 05:44:44 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg(r0, 0x0, 0x0, 0x0) 05:44:44 executing program 4: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$sock_ifreq(r0, 0x89a2, &(0x7f0000000000)={'veth1_macvtap\x00', @ifru_names='wg2\x00'}) 05:44:44 executing program 5: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$PPPIOCGL2TPSTATS(r0, 0x8904, 0x0) 05:44:44 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg(r0, 0x0, 0x0, 0x0) 05:44:44 executing program 2: r0 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, r0) 05:44:44 executing program 5: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCGIFMTU(r0, 0x401c5820, &(0x7f0000000000)={'gre0\x00'}) 05:44:44 executing program 0: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$PPPIOCGL2TPSTATS(r0, 0x80047437, 0x0) 05:44:44 executing program 4: r0 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}, 0x3, 0x4}}, 0x2e) 05:44:45 executing program 1: shmget(0x1, 0x1000, 0x97b8ad73b1356e67, &(0x7f0000ffd000/0x1000)=nil) 05:44:45 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCGVERSION(r0, 0x80044501, &(0x7f00000001c0)=""/153) 05:44:45 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_DEL(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x20, 0x3, 0x7, 0x0, 0x0, 0x0, {}, [@NFACCT_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x9}}, 0x0) 05:44:45 executing program 2: r0 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, r0) 05:44:45 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg(r0, 0x0, 0x0, 0x0) 05:44:45 executing program 5: mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x0, &(0x7f00000001c0)={[{@mpol={'mpol', 0x3d, {'default', '', @void}}}]}) 05:44:45 executing program 2: r0 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, r0) 05:44:45 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f0000001e80), 0x0, 0x0) 05:44:45 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='GPL\x00', 0x1, 0xe7, &(0x7f00000000c0)=""/231, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=[0xffffffffffffffff, 0x1]}, 0x80) 05:44:45 executing program 0: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000480), 0x20822, 0x0) write$vga_arbiter(r0, &(0x7f00000004c0)=@other={'decodes', ' ', 'io'}, 0xeb) 05:44:45 executing program 4: io_setup(0x1000, &(0x7f0000000000)=0x0) r1 = socket$unix(0x1, 0x5, 0x0) io_submit(r0, 0x2, &(0x7f0000000180)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x7, 0x0, r1, &(0x7f0000000100)="e0cdacc2a0bd", 0x6}]) 05:44:45 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140), r0) sendmsg$NLBL_CALIPSO_C_REMOVE(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x1}, 0x14}}, 0x0) 05:44:45 executing program 2: r0 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, r0) 05:44:45 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f0000001e80), 0x0, 0x0) 05:44:45 executing program 1: io_setup(0x35, &(0x7f0000001000)=0x0) io_submit(r0, 0x0, 0x0) io_destroy(r0) 05:44:45 executing program 2: r0 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, r0) 05:44:45 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCGPHYS(r0, 0x80404507, &(0x7f0000000080)=""/177) 05:44:45 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0x80404509, &(0x7f0000000000)=""/48) [ 351.042555][ T23] audit: type=1400 audit(1677995085.125:409): avc: denied { write } for pid=19188 comm="syz-executor.0" name="vga_arbiter" dev="devtmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 05:44:45 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000400), 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(r0, 0x80e85411, 0x0) 05:44:45 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f0000001e80), 0x0, 0x0) 05:44:45 executing program 2: r0 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, r0) 05:44:45 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000700)={0x1c, 0x1, 0x4, 0x101, 0x0, 0x0, {}, [@NFULA_CFG_FLAGS={0x6}]}, 0x1c}}, 0x0) 05:44:45 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000008c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x14, 0x0, 0xa, 0x301, 0x0, 0x0, {0xa}}, @NFT_MSG_NEWSET={0x20, 0x9, 0xa, 0x801, 0x0, 0x0, {}, [@NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}]}, @NFT_MSG_NEWSETELEM={0x24, 0xc, 0xa, 0x401, 0x0, 0x0, {0x7}, [@NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x4}]}], {0x14}}, 0x80}}, 0x0) 05:44:45 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f0000001e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=[{0x10, 0x10c}, {0x10}], 0x20}}], 0x1, 0x0) 05:44:45 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000440), r0) sendmsg$NLBL_MGMT_C_ADD(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r2, 0x409}, 0x14}}, 0x0) 05:44:45 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$OSF_MSG_ADD(r0, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000001540)={&(0x7f0000000280)={0x268, 0x0, 0x5, 0x401, 0x0, 0x0, {}, [{{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', "f33bf1914ab85a8fa3acdbbcaa16ef42d9b251243da0e5f9318ca9e6fac347e7", "533c5d9742d8998f260ddb7139f0fd068317d2de761771f9331b5e96cd7ec55f"}}}]}, 0x268}}, 0x0) 05:44:45 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)={0x8336, 0x0, 0x0, 0x0, 0x0, "9ba44a62bdeb7e24c9d917a5e8820c65939133"}) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000140)) 05:44:45 executing program 4: syz_emit_ethernet(0xe, &(0x7f0000000040)={@broadcast, @empty, @void, {@generic={0x88f5}}}, 0x0) 05:44:45 executing program 2: keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0x0) 05:44:45 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f0000001e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=[{0x10, 0x10c}, {0x10}], 0x20}}], 0x1, 0x0) 05:44:45 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000008c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x14, 0x0, 0xa, 0x301, 0x0, 0x0, {0xa}}, @NFT_MSG_NEWSET={0x20, 0x9, 0xa, 0x801, 0x0, 0x0, {}, [@NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}]}, @NFT_MSG_DELTABLE={0x20, 0x2, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}]}, @NFT_MSG_NEWTABLE={0x14, 0x0, 0xa, 0x3}, @NFT_MSG_NEWSETELEM={0x14, 0xc, 0xa, 0x401}], {0x14}}, 0xa4}}, 0x0) 05:44:45 executing program 1: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, r0, 0x7, 0xffffffffffffffff, 0x0) 05:44:45 executing program 2: keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0x0) 05:44:45 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001b40)={&(0x7f0000000040)={0x14, 0xa, 0xa, 0x401}, 0x14}}, 0x0) 05:44:45 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f0000001e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=[{0x10, 0x10c}, {0x10}], 0x20}}], 0x1, 0x0) 05:44:45 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x1c, 0x0, 0x2, 0x3, 0x0, 0x0, {}, [@CTA_EXPECT_FN={0x8, 0xb, 'sip\x00'}]}, 0x1c}}, 0x0) 05:44:45 executing program 5: r0 = socket(0x11, 0x2, 0x0) sendmsg$TIPC_NL_MON_SET(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={0x0}}, 0x0) 05:44:45 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000140), 0xffffffffffffffff) r2 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000080)={'wg0\x00', 0x0}) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000d00)={&(0x7f00000003c0)={0x50, r1, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_PEERS={0x34, 0x8, 0x0, 0x1, [{0x30, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24}, @WGPEER_A_FLAGS={0x8, 0x3, 0x5}]}]}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r3}]}, 0x50}}, 0x0) 05:44:45 executing program 0: msgsnd(0x0, &(0x7f0000000100)={0x1}, 0x8, 0x0) 05:44:45 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f0000001e80)=[{{&(0x7f0000000140)=@in={0x2, 0x0, @broadcast}, 0x80, 0x0, 0x0, &(0x7f0000000640)=[{0x10, 0x10c}, {0x10}], 0x20}}], 0x1, 0x0) 05:44:45 executing program 2: keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0x0) 05:44:45 executing program 1: io_setup(0x1000, &(0x7f0000000000)=0x0) r1 = socket$unix(0x1, 0x5, 0x0) io_submit(r0, 0x2, &(0x7f0000000980)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x3, 0x0, r1, 0x0}]) 05:44:45 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f0000001e80)=[{{&(0x7f0000000140)=@in={0x2, 0x0, @broadcast}, 0x80, 0x0, 0x0, &(0x7f0000000640)=[{0x10, 0x10c}, {0x10}], 0x20}}], 0x1, 0x0) 05:44:45 executing program 4: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4800004) 05:44:45 executing program 2: r0 = add_key$keyring(0x0, &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, r0) 05:44:45 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000140)) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000040)) 05:44:45 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)={{0x14}, [@NFT_MSG_DELTABLE={0x20, 0x2, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x48}}, 0x0) 05:44:45 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f0000001e80)=[{{&(0x7f0000000140)=@in={0x2, 0x0, @broadcast}, 0x80, 0x0, 0x0, &(0x7f0000000640)=[{0x10, 0x10c}, {0x10}], 0x20}}], 0x1, 0x0) 05:44:45 executing program 2: r0 = add_key$keyring(0x0, &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, r0) 05:44:45 executing program 5: io_setup(0x1000, &(0x7f0000000000)=0x0) r1 = socket$unix(0x1, 0x5, 0x0) io_getevents(r0, 0x1, 0x1, &(0x7f0000000100)=[{}], 0x0) io_submit(r0, 0x1, &(0x7f0000000980)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 05:44:46 executing program 0: io_setup(0x35, &(0x7f0000001000)) io_setup(0xffff, &(0x7f0000000040)) io_setup(0x100, &(0x7f0000000080)=0x0) io_destroy(r0) 05:44:46 executing program 2: r0 = add_key$keyring(0x0, &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, r0) 05:44:46 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f0000001e80)=[{{&(0x7f0000000140)=@in={0x2, 0x4e20, @broadcast}, 0x80, 0x0}}], 0x1, 0x0) 05:44:46 executing program 4: shmat(0x0, &(0x7f0000ffc000/0x1000)=nil, 0x6000) clock_gettime(0x7, &(0x7f0000000000)) 05:44:46 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x5, 0x0, 0x0, {0xa}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x48}}, 0x0) 05:44:46 executing program 5: io_setup(0x1000, &(0x7f0000000000)=0x0) r1 = socket$unix(0x1, 0x5, 0x0) io_getevents(r0, 0x1, 0x1, &(0x7f0000000100)=[{}], 0x0) io_submit(r0, 0x1, &(0x7f0000000980)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 05:44:46 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f0000001e80)=[{{&(0x7f0000000140)=@in={0x2, 0x4e20, @broadcast}, 0x80, 0x0}}], 0x1, 0x0) 05:44:46 executing program 4: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000480), 0x20822, 0x0) write$vga_arbiter(r0, &(0x7f0000000100)=@other={'lock', ' ', 'io'}, 0x8) 05:44:46 executing program 2: r0 = add_key$keyring(&(0x7f0000000100), 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, r0) 05:44:46 executing program 1: r0 = epoll_create1(0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000240)) 05:44:46 executing program 2: r0 = add_key$keyring(&(0x7f0000000100), 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, r0) 05:44:46 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f0000001e80)=[{{&(0x7f0000000140)=@in={0x2, 0x4e20, @broadcast}, 0x80, 0x0}}], 0x1, 0x0) 05:44:46 executing program 0: msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000080)={{0x3, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) 05:44:46 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000580)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 05:44:46 executing program 2: r0 = add_key$keyring(&(0x7f0000000100), 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, r0) 05:44:46 executing program 1: mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) mprotect(&(0x7f0000ffa000/0x1000)=nil, 0x1000, 0x0) munmap(&(0x7f0000ff9000/0x3000)=nil, 0x3000) 05:44:46 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f0000001e80)=[{{&(0x7f0000000140)=@in={0x2, 0x4e20, @broadcast}, 0x80, 0x0, 0x0, &(0x7f0000000640)=[{0x10, 0x10c}], 0x10}}], 0x1, 0x0) 05:44:46 executing program 5: io_setup(0x1000, &(0x7f0000000000)=0x0) r1 = socket$unix(0x1, 0x5, 0x0) io_getevents(r0, 0x1, 0x1, &(0x7f0000000100)=[{}], 0x0) io_submit(r0, 0x1, &(0x7f0000000980)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 05:44:46 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000340)={&(0x7f0000000080)=@id, 0x10, 0x0}, 0x0) 05:44:46 executing program 0: r0 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffd000/0x1000)=nil) shmat(r0, &(0x7f0000ffd000/0x3000)=nil, 0x0) 05:44:46 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f0000001e80)=[{{&(0x7f0000000140)=@in={0x2, 0x4e20, @broadcast}, 0x80, 0x0, 0x0, &(0x7f0000000640)=[{0x10, 0x10c}], 0x10}}], 0x1, 0x0) 05:44:46 executing program 1: io_setup(0x4, &(0x7f0000000140)=0x0) io_pgetevents(r0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={&(0x7f00000004c0), 0x8}) 05:44:46 executing program 2: r0 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, r0) 05:44:46 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xa, 0x7, 0x8, 0x370}, 0x48) 05:44:46 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f0000001e80)=[{{&(0x7f0000000140)=@in={0x2, 0x4e20, @broadcast}, 0x80, 0x0, 0x0, &(0x7f0000000640)=[{0x10, 0x10c}], 0x10}}], 0x1, 0x0) 05:44:46 executing program 2: r0 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, r0) 05:44:46 executing program 0: io_setup(0xc5e3, &(0x7f0000000000)=0x0) io_submit(r0, 0x0, 0x0) 05:44:46 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f0000001e80)=[{{&(0x7f0000000140)=@in={0x2, 0x4e20, @broadcast}, 0x80, 0x0, 0x0, &(0x7f0000000640)=[{0x10}], 0x10}}], 0x1, 0x0) 05:44:46 executing program 4: syz_emit_ethernet(0x42, &(0x7f0000000100)={@local, @remote, @void, {@ipv4={0x800, @tcp={{0x8, 0x4, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x5, 0x0, @private=0xa010102, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@timestamp_addr={0x7, 0xc, 0x5, 0x3, 0x0, [{@broadcast}]}]}}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x6, 0x5}}}}}}, 0x0) 05:44:46 executing program 5: io_setup(0x1000, &(0x7f0000000000)=0x0) r1 = socket$unix(0x1, 0x5, 0x0) io_getevents(r0, 0x1, 0x1, &(0x7f0000000100)=[{}], 0x0) io_submit(r0, 0x1, &(0x7f0000000980)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 05:44:46 executing program 2: r0 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, r0) 05:44:46 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20, @local}, 0x10) 05:44:46 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f0000001e80)=[{{&(0x7f0000000140)=@in={0x2, 0x4e20, @broadcast}, 0x80, 0x0, 0x0, &(0x7f0000000640)=[{0x10}], 0x10}}], 0x1, 0x0) 05:44:46 executing program 4: sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000240)=0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r0, 0x8, &(0x7f00000002c0)=0x81) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r4 = accept4$vsock_stream(r3, &(0x7f0000000100)={0x28, 0x0, 0x2711, @host}, 0x10, 0x0) write$binfmt_script(r4, &(0x7f0000000800)=ANY=[], 0x1129) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ppoll(0x0, 0x0, &(0x7f0000000180), &(0x7f00000001c0)={[0x8]}, 0x8) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000) write(r1, &(0x7f0000000380)="21badad2f54c6a8330e5b812f93b3d3efe795ac485204c1089e395ceb5212ab39fa7d5d84340c5e6a567f26dcdb4053d26eb9291dc269c3266b91f4a99efafda41bc113b3bb1a87cca63a1983394e26aecd389147f69bb93a0dd4faf2f7341d6cdcf2415b646e51308098acb9e18bd351dec", 0x72) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000007c0)={'erspan0\x00', &(0x7f0000000100)=ANY=[]}) r5 = openat$loop_ctrl(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x4e1e, 0x0, @local}, 0x1c) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r6, 0x8918, &(0x7f0000000080)={@loopback={0x0, 0x3fc}, 0x0, r7}) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@bloom_filter={0x1e, 0x1000, 0x0, 0xffff7fff, 0xc, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x0, 0xd}, 0x48) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0) 05:44:46 executing program 1: r0 = syz_open_dev$vcsu(&(0x7f0000006640), 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r0) 05:44:46 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f0000001e80)=[{{&(0x7f0000000140)=@in={0x2, 0x4e20, @broadcast}, 0x80, 0x0, 0x0, &(0x7f0000000640)=[{0x10}], 0x10}}], 0x1, 0x0) 05:44:46 executing program 0: syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file1\x00', 0x410, &(0x7f0000000180)=ANY=[], 0x45, 0x4c9, &(0x7f0000000a00)="$eJzs3cFvG1kZAPBvJk2TZrObLOwBELBlKRRU1U7cNqp6oVxAqKqEqDhxaEPiRlHsOIqd0oQe0v8BiUqc4E/ggMQBqSfu3ODGpRyQClSgBomD0YwnaZrYTSipvYp/P+nJ8+Y5/t6zNfPGX5J5AQyt8xGxHRFnI+JeREwV+5OixM1OyZ738sWjhZ0XjxaSaLfv/D3J27N9se9nMu8VrzkeET/4bsSPk8Nxm5tbK/O1WnW9qJdb9bVyc3Pr8nJ9fqm6VF2tVOZm52auX7lWObGxflz/9fPvLN/64e9++6Vnf9j+5k+zbk0WbfvHcZI6Qx/di5M5ExG33kWwARgpxnN20B3hraQR8ZmI+CQ//qdiJP80AYDTrN2eivbU/joAcNqleQ4sSUtFLmAy0rRU6uTwPoqJtNZoti7db2ysLnZyZdMxmt5frlVnilzhdIwmWX02335VrxT19kinfiUiPoyIn42dy+ulhUZtcZAXPgAwxN47MP//a6wz/wMAp9z4oDsAAPSd+R8Aho/5HwCGj/kfAIaP+R8Ahs+B+f/coPoBAPSP7/8AMFS+f/t2Vto7xf2vFx9sbqw0HlxerDZXSvWNhdJCY32ttNRoLOX37Kkf9Xq1RmNt9mpsPCy3qs1Wubm5dbfe2Fht3c3v6323OtqXUQEAb/Lhx0//lETE9o1zeYl9azmYq+F0SwfdAWBgRgbdAWBgrPYFw8t3fKDLEr2v6fknQk9Ovi9Af1z8vPw/DCv5fxheb5f//9aJ9wPoP/l/GF7tdmLNfwAYMnL8gN//AwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwP9uMi9JWirWAp+MNC2VIt6PiOkYTe4v16ozEfFBRPxxbHQsq88OutMAwP8p/WtSrP91cerC5MHWs8m/x/LHiPjJL+78/OF8q7U+m+3/x97+1pNif6VrAEuMA0C/HVifc3ee3p3Hd7188Whht/Sze8+/3VlcNIu7U5ROy5niwmE8RiNi4p/JaxcS2fXKyAnE334cEZ/rNv4kz41MFyufHoyfxX6/r/HT1+KneVvnMXsvPnsCfYFh8zQ7/9zsdvylcT5/7H78j5/QF5vd89/OofNfunf+G+lx/jt/3BhXf/+9QzvbU522xxFfONMtfrIXP+kR/8Ix4//5i1/+pFdb+5cRF6N7/P2xyq36Wrm5uXV5uT6/VF2qrlYqc7NzM9evXKuU8xx1eTdTfdjfblz6oFf8bPwTXeJnox4/YvxfO+b4f/Wfez/6yhvif+Or3T//j94QP5sTv37M+PMTv+m5fHcWf7HH+3/U53/pmPGf/WVr8ZhPBQD6oLm5tTJfq1XXbdiw8S43Itq5T0t/jtgY9JkJeNdeHfSD7gkAAAAAAAAAAAAAANBLP/6daNBjBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4PT6bwAAAP//PhDevw==") creat(&(0x7f0000000040)='./file1\x00', 0x0) 05:44:46 executing program 2: r0 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, r0) 05:44:46 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f0000001e80)=[{{&(0x7f0000000140)=@in={0x2, 0x4e20, @broadcast}, 0x80, 0x0, 0x0, &(0x7f0000000640)=[{0x10}, {0x10}], 0x20}}], 0x1, 0x0) 05:44:46 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20, @local}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x7}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0x8000000000003) write(r2, 0x0, 0x0) 05:44:46 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "850e32db99baeb0600"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000100)=0xffffffff) read(r0, &(0x7f0000000300)=""/252, 0xfc) r1 = syz_open_pts(r0, 0x0) r2 = dup2(r1, r0) ioctl$TCSETSF(r2, 0x5437, 0x0) 05:44:46 executing program 2: r0 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, r0) 05:44:46 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f0000001e80)=[{{&(0x7f0000000140)=@in={0x2, 0x4e20, @broadcast}, 0x80, 0x0, 0x0, &(0x7f0000000640)=[{0x10}, {0x10}], 0x20}}], 0x1, 0x0) 05:44:46 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x24}}, 0x0) getsockname$packet(r2, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=ANY=[@ANYBLOB="3800000024001d0f00"/20, @ANYRES32=r3, @ANYBLOB="00000900f1ffffff000008000d00010066715f636f64656c"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000900)=@delchain={0x24, 0x2e, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0x0, 0xffff}, {0x0, 0x8}}}, 0x24}}, 0x0) 05:44:46 executing program 5: pselect6(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080)={0xfffffffffffffffe}, &(0x7f00000000c0)={0x0, 0x989680}, 0x0) [ 352.701954][T19367] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 352.768631][T19367] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 05:44:47 executing program 4: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001780)={&(0x7f0000001740)='./file0\x00'}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001840)={0x6, 0x1, &(0x7f0000000600)=@raw=[@jmp], &(0x7f0000000640)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000018c0)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) openat$tun(0xffffffffffffff9c, &(0x7f0000001b80), 0x2c0, 0x0) 05:44:47 executing program 2: r0 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, r0) 05:44:47 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f0000001e80)=[{{&(0x7f0000000140)=@in={0x2, 0x4e20, @broadcast}, 0x80, 0x0, 0x0, &(0x7f0000000640)=[{0x10}, {0x10}], 0x20}}], 0x1, 0x0) 05:44:47 executing program 5: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000000740), 0x0, 0x0, &(0x7f00000007c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000240)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = openat$loop_ctrl(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000b00)={0x77359400}) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x309901, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) openat$vcsu(0xffffffffffffff9c, 0x0, 0x515200, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4000880) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, 0x0) 05:44:47 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x7fff0001}]}) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) 05:44:47 executing program 2: r0 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, r0) 05:44:47 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000240)=0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = accept4$vsock_stream(r2, &(0x7f0000000100)={0x28, 0x0, 0x2711, @host}, 0x10, 0x0) write$binfmt_script(r3, &(0x7f0000000800)=ANY=[], 0x1129) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ppoll(0x0, 0x0, &(0x7f0000000180), &(0x7f00000001c0)={[0x8]}, 0x8) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000) write(r1, &(0x7f0000000380)="21badad2f54c6a8330e5b812f93b3d3efe795ac485204c1089e395ceb5212ab39fa7d5d84340c5e6a567f26dcdb4053d26eb9291dc269c3266b91f4a99efafda41bc113b3bb1a87cca63a1983394e26aecd389147f69bb93a0dd4faf2f7341d6cdcf2415", 0x64) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000007c0)={'erspan0\x00', &(0x7f0000000100)=ANY=[]}) r4 = openat$loop_ctrl(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x4e1e, 0x0, @local}, 0x1c) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r5, 0x8918, &(0x7f0000000080)={@loopback={0x0, 0x3fc}, 0x0, r6}) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@bloom_filter={0x1e, 0x1000, 0x0, 0xffff7fff, 0xc, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x0, 0xd}, 0x48) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) 05:44:47 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "850e32db99baeb0600"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000100)=0xffffffff) read(r0, &(0x7f0000000300)=""/252, 0xfc) r1 = syz_open_pts(r0, 0x0) r2 = dup2(r1, r0) ioctl$TCSETSF(r2, 0x5437, 0x0) 05:44:47 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000240)=0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = accept4$vsock_stream(r2, &(0x7f0000000100)={0x28, 0x0, 0x2711, @host}, 0x10, 0x0) write$binfmt_script(r3, &(0x7f0000000800)=ANY=[], 0x1129) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ppoll(0x0, 0x0, &(0x7f0000000180), &(0x7f00000001c0)={[0x8]}, 0x8) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000) write(r1, &(0x7f0000000380)="21badad2f54c6a8330e5b812f93b3d3efe795ac485204c1089e395ceb5212ab39fa7d5d84340c5e6a567f26dcdb4053d26eb9291dc269c3266b91f4a99efafda41bc113b3bb1a87cca63a1983394e26aecd389147f69bb93a0dd4faf2f7341d6cdcf2415b646e51308098acb9e18bd351dec", 0x72) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000007c0)={'erspan0\x00', &(0x7f0000000100)=ANY=[]}) r4 = openat$loop_ctrl(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x4e1e, 0x0, @local}, 0x1c) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r5, 0x8918, &(0x7f0000000080)={@loopback={0x0, 0x3fc}, 0x0, r6}) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@bloom_filter={0x1e, 0x1000, 0x0, 0xffff7fff, 0xc, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x0, 0xd}, 0x48) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) 05:44:47 executing program 4: openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x4080, 0x0) 05:44:47 executing program 2: r0 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, r0) 05:44:47 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0x891c, 0x0) 05:44:47 executing program 2: r0 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, r0) 05:44:47 executing program 2: r0 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0x0) 05:44:47 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x14, r1, 0x911, 0x0, 0x0, {0x15}}, 0x14}}, 0x0) 05:44:48 executing program 5: sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "850e32db99baeb0600"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000100)=0xffffffff) read(r0, &(0x7f0000000300)=""/252, 0xfc) r1 = syz_open_pts(r0, 0x0) r2 = dup2(r1, r0) ioctl$TCSETSF(r2, 0x5404, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "8a24566b00"}) 05:44:48 executing program 2: r0 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0x0) 05:44:48 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000100)=0xffffffff) 05:44:48 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "850e32db99baeb0600"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000100)=0xffffffff) read(r0, &(0x7f0000000300)=""/252, 0xfc) r1 = syz_open_pts(r0, 0x0) r2 = dup2(r1, r0) ioctl$TCSETSF(r2, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "8a24566b00"}) 05:44:48 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "850e32db99baeb0600"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000100)=0xffffffff) read(r0, &(0x7f0000000300)=""/252, 0xfc) r1 = syz_open_pts(r0, 0x0) r2 = dup2(r1, r0) ioctl$TCSETSF(r2, 0x5437, 0x0) 05:44:48 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000240)=0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = accept4$vsock_stream(r2, &(0x7f0000000100)={0x28, 0x0, 0x2711, @host}, 0x10, 0x0) write$binfmt_script(r3, &(0x7f0000000800)=ANY=[], 0x1129) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000) write(r1, &(0x7f0000000380)="21badad2f54c6a8330e5b812f93b3d3efe795ac485204c1089e395ceb5212ab39fa7d5d84340c5e6a567f26dcdb4053d26eb9291dc269c3266b91f4a99efafda41bc113b3bb1a87cca63a1983394e26aecd389147f69bb93a0dd4faf2f7341d6cdcf2415b646e51308098acb9e18bd351dec", 0x72) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000007c0)={'erspan0\x00', &(0x7f0000000100)=ANY=[]}) r4 = openat$loop_ctrl(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x4e1e, 0x0, @local}, 0x1c) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r5, 0x8918, &(0x7f0000000080)={@loopback={0x0, 0x3fc}, 0x0, r6}) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@bloom_filter={0x1e, 0x1000, 0x0, 0xffff7fff, 0xc, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x0, 0xd}, 0x48) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) 05:44:48 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r0, 0x29, 0x1b, 0x0, 0x0) 05:44:48 executing program 2: r0 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0x0) 05:44:48 executing program 5: sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "850e32db99baeb0600"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000100)=0xffffffff) read(r0, &(0x7f0000000300)=""/252, 0xfc) r1 = syz_open_pts(r0, 0x0) r2 = dup2(r1, r0) ioctl$TCSETSF(r2, 0x5404, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "8a24566b00"}) 05:44:48 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xe2, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:48 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "850e32db99baeb0600"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000100)=0xffffffff) read(r0, &(0x7f0000000300)=""/252, 0xfc) r1 = syz_open_pts(r0, 0x0) r2 = dup2(r1, r0) ioctl$TCSETSF(r2, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "8a24566b00"}) 05:44:48 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "850e32db99baeb0600"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000100)=0xffffffff) read(r0, &(0x7f0000000300)=""/252, 0xfc) r1 = syz_open_pts(r0, 0x0) r2 = dup2(r1, r0) ioctl$TCSETSF(r2, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "8a24566b00"}) 05:44:48 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xe2, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:48 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "850e32db99baeb0600"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000100)=0xffffffff) read(r0, &(0x7f0000000300)=""/252, 0xfc) r1 = syz_open_pts(r0, 0x0) r2 = dup2(r1, r0) ioctl$TCSETSF(r2, 0x5437, 0x0) 05:44:48 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xbc, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:48 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "850e32db99baeb0600"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000100)=0xffffffff) read(r0, &(0x7f0000000300)=""/252, 0xfc) r1 = syz_open_pts(r0, 0x0) r2 = dup2(r1, r0) ioctl$TCSETSF(r2, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "8a24566b00"}) [ 354.356673][ T23] audit: type=1400 audit(1677995088.435:410): avc: denied { getopt } for pid=19427 comm="syz-executor.4" laddr=172.20.20.10 lport=53532 faddr=172.20.20.187 fport=20000 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 05:44:48 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "850e32db99baeb0600"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000100)=0xffffffff) read(r0, &(0x7f0000000300)=""/252, 0xfc) r1 = syz_open_pts(r0, 0x0) r2 = dup2(r1, r0) ioctl$TCSETSF(r2, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "8a24566b00"}) 05:44:49 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000240)=0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = accept4$vsock_stream(r2, &(0x7f0000000100)={0x28, 0x0, 0x2711, @host}, 0x10, 0x0) write$binfmt_script(r3, &(0x7f0000000800)=ANY=[], 0x1129) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000) write(r1, &(0x7f0000000380)="21badad2f54c6a8330e5b812f93b3d3efe795ac485204c1089e395ceb5212ab39fa7d5d84340c5e6a567f26dcdb4053d26eb9291dc269c3266b91f4a99efafda41bc113b3bb1a87cca63a1983394e26aecd389147f69bb93a0dd4faf2f7341d6cdcf2415b646e51308098acb9e18bd351dec", 0x72) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000007c0)={'erspan0\x00', &(0x7f0000000100)=ANY=[]}) r4 = openat$loop_ctrl(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x4e1e, 0x0, @local}, 0x1c) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r5, 0x8918, &(0x7f0000000080)={@loopback={0x0, 0x3fc}, 0x0, r6}) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@bloom_filter={0x1e, 0x1000, 0x0, 0xffff7fff, 0xc, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x0, 0xd}, 0x48) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) 05:44:49 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xe2, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:49 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "850e32db99baeb0600"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000100)=0xffffffff) read(r0, &(0x7f0000000300)=""/252, 0xfc) r1 = syz_open_pts(r0, 0x0) r2 = dup2(r1, r0) ioctl$TCSETSF(r2, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "8a24566b00"}) 05:44:49 executing program 1: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x10, &(0x7f0000000000), 0x0, 0x465, &(0x7f00000004c0)="$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") 05:44:49 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "850e32db99baeb0600"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000100)=0xffffffff) read(r0, &(0x7f0000000300)=""/252, 0xfc) r1 = syz_open_pts(r0, 0x0) r2 = dup2(r1, r0) ioctl$TCSETSF(r2, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "8a24566b00"}) 05:44:49 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xe2, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:49 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0xe2, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:49 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0xe2, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:49 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0xe2, &(0x7f0000000080), &(0x7f0000000000)=0x4) [ 355.170407][T19456] loop1: detected capacity change from 0 to 512 [ 355.183399][T19456] EXT4-fs warning (device loop1): ext4_init_metadata_csum:4550: metadata_csum and uninit_bg are redundant flags; please run fsck. [ 355.196894][T19456] EXT4-fs (loop1): VFS: Found ext4 filesystem with unknown checksum algorithm. 05:44:49 executing program 5: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000000740), 0x0, 0x0, &(0x7f00000007c0)) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x800000005) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000240)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = openat$loop_ctrl(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000b00)={0x77359400}) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x309901, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) openat$vcsu(0xffffffffffffff9c, 0x0, 0x515200, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) socket$phonet_pipe(0x23, 0x5, 0x2) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, 0x0) 05:44:49 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(0xffffffffffffffff, 0x10d, 0xe2, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:49 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r0, &(0x7f0000000200)='Q', 0xbb00, 0xff00, &(0x7f0000000040)={0x2, 0x4e22, @remote}, 0x10) 05:44:50 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000240)=0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = accept4$vsock_stream(r2, &(0x7f0000000100)={0x28, 0x0, 0x2711, @host}, 0x10, 0x0) write$binfmt_script(r3, &(0x7f0000000800)=ANY=[], 0x1129) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000) write(r1, &(0x7f0000000380)="21badad2f54c6a8330e5b812f93b3d3efe795ac485204c1089e395ceb5212ab39fa7d5d84340c5e6a567f26dcdb4053d26eb9291dc269c3266b91f4a99efafda41bc113b3bb1a87cca63a1983394e26aecd389147f69bb93a0dd4faf2f7341d6cdcf2415b646e51308098acb9e18bd351dec", 0x72) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000007c0)={'erspan0\x00', &(0x7f0000000100)=ANY=[]}) r4 = openat$loop_ctrl(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x4e1e, 0x0, @local}, 0x1c) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r5, 0x8918, &(0x7f0000000080)={@loopback={0x0, 0x3fc}, 0x0, r6}) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@bloom_filter={0x1e, 0x1000, 0x0, 0xffff7fff, 0xc, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x0, 0xd}, 0x48) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) 05:44:50 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x9, 0x4d, 0x3, 0x3}, 0x48) 05:44:50 executing program 2: prctl$PR_GET_THP_DISABLE(0x2a) msgrcv(0x0, &(0x7f0000000040)={0x0, ""/196}, 0xcc, 0x2, 0x3000) 05:44:50 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(0xffffffffffffffff, 0x10d, 0xe2, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:50 executing program 3: syz_open_dev$char_usb(0xc, 0xb4, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) 05:44:50 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(0xffffffffffffffff, 0x10d, 0xe2, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:50 executing program 1: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x10, &(0x7f0000000000), 0x0, 0x465, &(0x7f00000004c0)="$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") 05:44:50 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xb8, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:50 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xe2, &(0x7f0000000080), &(0x7f0000000000)=0x4) [ 356.059931][T19494] loop1: detected capacity change from 0 to 512 [ 356.071650][T19494] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 356.086565][T19494] EXT4-fs error (device loop1): ext4_free_branches:1022: inode #13: comm syz-executor.1: invalid indirect mapped block 2 (level 0) 05:44:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x10, &(0x7f0000000000)={[], [], 0x3d}, 0x0, 0x465, &(0x7f00000004c0)="$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") 05:44:50 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xe2, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:50 executing program 3: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = socket$pptp(0x18, 0x1, 0x2) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), r1) ioctl$TIOCGICOUNT(r0, 0x545d, 0x0) [ 356.100659][T19494] EXT4-fs error (device loop1): ext4_clear_blocks:875: inode #13: comm syz-executor.1: attempt to clear invalid blocks 2 len 1 [ 356.115348][T19494] EXT4-fs error (device loop1): ext4_validate_block_bitmap:399: comm syz-executor.1: bg 0: block 5: invalid block bitmap [ 356.133708][T19494] EXT4-fs error (device loop1) in ext4_mb_clear_bb:6071: Corrupt filesystem [ 356.157410][T19494] EXT4-fs error (device loop1): ext4_free_branches:1022: inode #13: comm syz-executor.1: invalid indirect mapped block 1819239214 (level 0) [ 356.173656][T19507] loop5: detected capacity change from 0 to 512 [ 356.176209][T19494] EXT4-fs error (device loop1): ext4_free_branches:1022: inode #13: comm syz-executor.1: invalid indirect mapped block 1819239214 (level 1) [ 356.182914][T19507] EXT4-fs error (device loop5): ext4_free_branches:1022: inode #13: comm syz-executor.5: invalid indirect mapped block 2 (level 0) [ 356.196316][T19494] EXT4-fs (loop1): 1 truncate cleaned up [ 356.208634][T19507] EXT4-fs error (device loop5): ext4_clear_blocks:875: inode #13: comm syz-executor.5: attempt to clear invalid blocks 2 len 1 [ 356.213938][T19494] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 356.239563][T19507] EXT4-fs error (device loop5): ext4_validate_block_bitmap:399: comm syz-executor.5: bg 0: block 5: invalid block bitmap [ 356.239708][ T4131] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 356.253868][T19507] EXT4-fs error (device loop5) in ext4_mb_clear_bb:6071: Corrupt filesystem [ 356.271435][T19507] EXT4-fs error (device loop5): ext4_free_branches:1022: inode #13: comm syz-executor.5: invalid indirect mapped block 1819239214 (level 0) [ 356.286240][T19507] EXT4-fs error (device loop5): ext4_free_branches:1022: inode #13: comm syz-executor.5: invalid indirect mapped block 1819239214 (level 1) [ 356.301672][T19507] EXT4-fs (loop5): 1 truncate cleaned up [ 356.307362][T19507] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 356.328581][ T3151] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. 05:44:50 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xe2, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:50 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000240)=0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = accept4$vsock_stream(r2, &(0x7f0000000100)={0x28, 0x0, 0x2711, @host}, 0x10, 0x0) write$binfmt_script(r3, &(0x7f0000000800)=ANY=[], 0x1129) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000) write(r1, &(0x7f0000000380)="21badad2f54c6a8330e5b812f93b3d3efe795ac485204c1089e395ceb5212ab39fa7d5d84340c5e6a567f26dcdb4053d26eb9291dc269c3266b91f4a99efafda41bc113b3bb1a87cca63a1983394e26aecd389147f69bb93a0dd4faf2f7341d6cdcf2415b646e51308098acb9e18bd351dec", 0x72) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000007c0)={'erspan0\x00', &(0x7f0000000100)=ANY=[]}) r4 = openat$loop_ctrl(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x4e1e, 0x0, @local}, 0x1c) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r5, 0x8918, &(0x7f0000000080)={@loopback={0x0, 0x3fc}, 0x0, r6}) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@bloom_filter={0x1e, 0x1000, 0x0, 0xffff7fff, 0xc, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x0, 0xd}, 0x48) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) 05:44:50 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0x93, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:50 executing program 1: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x10, &(0x7f0000000000), 0x0, 0x465, &(0x7f00000004c0)="$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") 05:44:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x10, &(0x7f0000000000)={[], [], 0x3d}, 0x0, 0x465, &(0x7f00000004c0)="$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") 05:44:50 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0x8f, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:50 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xe2, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:50 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xda, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:51 executing program 2: syz_mount_image$vfat(&(0x7f0000000100), &(0x7f00000000c0)='./file0\x00', 0xa00008, &(0x7f0000000180)={[{@utf8no}, {@shortname_lower}, {@shortname_mixed}, {@fat=@usefree}, {@uni_xlate}, {@uni_xlateno}, {@numtail}, {@utf8}, {@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@fat=@codepage={'codepage', 0x3d, '855'}}, {@uni_xlate}, {@rodir}, {@shortname_win95}, {@fat=@check_normal}], [{@smackfsroot={'smackfsroot', 0x3d, '\xcf\x00\x04\xdf8e\x0e\xb1\xca\xa9\x89j\xd2Qn>RK~\x10\xfa\x1d\x90Cj\xe4uk\xdfX\xc2\xc8vVJ\xfe\xd2\x9e\x8fK\xb0\x94\xa3\xac\x8ekp\xc5f\xbb\'*\x81\xf6~\xd8Yi\x95\x9fb\xc9B\xc5\x14Yq\xd2\x99\rja\xd2\b\xdf\xa7?\xde\xf1@[H\xbaYE\xae\xf1\x8b\x94\x1c\x01\xae\x9d\x87\xaf\xa9\x83x\x80\x85j\x8b\x1c\xd8\xfe\xee\x86_\xbb}\xfc\xdb\xdeX{\xacqE\x8a\x8c\v.\xefG\xe9\x14\xab2\xcde'}}]}, 0xa, 0x21e, &(0x7f0000000440)="$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") 05:44:51 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xe2, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:51 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) listen(r0, 0x0) [ 356.896204][T19515] loop1: detected capacity change from 0 to 512 [ 356.902734][T19512] loop5: detected capacity change from 0 to 512 [ 356.919011][T19515] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 356.942792][T19512] EXT4-fs error (device loop5): ext4_free_branches:1022: inode #13: comm syz-executor.5: invalid indirect mapped block 2 (level 0) [ 356.944067][T19529] loop2: detected capacity change from 0 to 256 [ 356.969321][T19515] EXT4-fs error (device loop1): ext4_free_branches:1022: inode #13: comm syz-executor.1: invalid indirect mapped block 2 (level 0) [ 356.972410][T19529] FAT-fs (loop2): Unrecognized mount option "smackfsroot=Ï" or missing value 05:44:51 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xe2, &(0x7f0000000080), &(0x7f0000000000)=0x4) [ 356.991333][T19515] EXT4-fs error (device loop1): ext4_clear_blocks:875: inode #13: comm syz-executor.1: attempt to clear invalid blocks 2 len 1 [ 356.995735][T19512] EXT4-fs error (device loop5): ext4_clear_blocks:875: inode #13: comm syz-executor.5: attempt to clear invalid blocks 2 len 1 [ 357.023769][T19512] EXT4-fs error (device loop5): ext4_validate_block_bitmap:399: comm syz-executor.5: bg 0: block 5: invalid block bitmap [ 357.030792][T19515] EXT4-fs error (device loop1): ext4_validate_block_bitmap:399: comm syz-executor.1: bg 0: block 5: invalid block bitmap [ 357.041495][T19512] EXT4-fs error (device loop5) in ext4_mb_clear_bb:6071: Corrupt filesystem [ 357.051899][T19515] EXT4-fs error (device loop1) in ext4_mb_clear_bb:6071: Corrupt filesystem [ 357.058217][T19512] EXT4-fs error (device loop5): ext4_free_branches:1022: inode #13: comm syz-executor.5: invalid indirect mapped block 1819239214 (level 0) [ 357.074154][T19515] EXT4-fs error (device loop1): ext4_free_branches:1022: inode #13: comm syz-executor.1: invalid indirect mapped block 1819239214 (level 0) [ 357.095218][T19512] EXT4-fs error (device loop5): ext4_free_branches:1022: inode #13: comm syz-executor.5: invalid indirect mapped block 1819239214 (level 1) [ 357.095815][T19515] EXT4-fs error (device loop1): ext4_free_branches:1022: inode #13: comm syz-executor.1: invalid indirect mapped block 1819239214 (level 1) [ 357.111138][T19512] EXT4-fs (loop5): 1 truncate cleaned up [ 357.124337][T19515] EXT4-fs (loop1): 1 truncate cleaned up [ 357.129415][T19512] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 357.135041][T19515] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 357.176746][ T3151] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 357.186261][ T4131] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 05:44:51 executing program 4: bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(0xffffffffffffffff, 0x200007) r0 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r0, 0x10d, 0xe2, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:51 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xe, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:51 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xc0, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:51 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000240)=0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = accept4$vsock_stream(r2, &(0x7f0000000100)={0x28, 0x0, 0x2711, @host}, 0x10, 0x0) write$binfmt_script(r3, &(0x7f0000000800)=ANY=[], 0x1129) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000) write(r1, &(0x7f0000000380)="21badad2f54c6a8330e5b812f93b3d3efe795ac485204c1089e395ceb5212ab39fa7d5d84340c5e6a567f26dcdb4053d26eb9291dc269c3266b91f4a99efafda41bc113b3bb1a87cca63a1983394e26aecd389147f69bb93a0dd4faf2f7341d6cdcf2415b646e51308098acb9e18bd351dec", 0x72) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000007c0)={'erspan0\x00', &(0x7f0000000100)=ANY=[]}) r4 = openat$loop_ctrl(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x4e1e, 0x0, @local}, 0x1c) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r5, 0x8918, &(0x7f0000000080)={@loopback={0x0, 0x3fc}, 0x0, r6}) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@bloom_filter={0x1e, 0x1000, 0x0, 0xffff7fff, 0xc, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x0, 0xd}, 0x48) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) 05:44:51 executing program 5: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x10, &(0x7f0000000000)={[], [], 0x3d}, 0x0, 0x465, &(0x7f00000004c0)="$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") 05:44:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x10, &(0x7f0000000000), 0x0, 0x465, &(0x7f00000004c0)="$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") 05:44:51 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xc0, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:51 executing program 4: bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(0xffffffffffffffff, 0x200007) r0 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r0, 0x10d, 0xe2, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:51 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xef, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:51 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xc0, &(0x7f0000000080), &(0x7f0000000000)=0x4) [ 357.746890][T19544] loop5: detected capacity change from 0 to 512 [ 357.755253][T19547] loop1: detected capacity change from 0 to 512 [ 357.777430][T19544] EXT4-fs error (device loop5): ext4_free_branches:1022: inode #13: comm syz-executor.5: invalid indirect mapped block 2 (level 0) 05:44:51 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000340)=@broute={'broute\x00', 0x20, 0x0, 0x90, [], 0x0, 0x0, 0x0}, 0x108) 05:44:51 executing program 4: bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(0xffffffffffffffff, 0x200007) r0 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r0, 0x10d, 0xe2, &(0x7f0000000080), &(0x7f0000000000)=0x4) [ 357.793606][T19544] EXT4-fs error (device loop5): ext4_clear_blocks:875: inode #13: comm syz-executor.5: attempt to clear invalid blocks 2 len 1 [ 357.810495][T19544] EXT4-fs error (device loop5): ext4_validate_block_bitmap:399: comm syz-executor.5: bg 0: block 5: invalid block bitmap [ 357.813371][T19547] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode 05:44:51 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xe2, &(0x7f0000000080), &(0x7f0000000000)=0x4) [ 357.841490][T19544] EXT4-fs error (device loop5) in ext4_mb_clear_bb:6071: Corrupt filesystem [ 357.854566][T19547] EXT4-fs error (device loop1): ext4_free_branches:1022: inode #13: comm syz-executor.1: invalid indirect mapped block 2 (level 0) [ 357.868469][T19544] EXT4-fs error (device loop5): ext4_free_branches:1022: inode #13: comm syz-executor.5: invalid indirect mapped block 1819239214 (level 0) [ 357.878905][T19547] EXT4-fs error (device loop1): ext4_clear_blocks:875: inode #13: comm syz-executor.1: attempt to clear invalid blocks 2 len 1 [ 357.893485][T19544] EXT4-fs error (device loop5): ext4_free_branches:1022: inode #13: comm syz-executor.5: invalid indirect mapped block 1819239214 (level 1) [ 357.910035][T19547] EXT4-fs error (device loop1): ext4_validate_block_bitmap:399: comm syz-executor.1: bg 0: block 5: invalid block bitmap [ 357.915839][T19544] EXT4-fs (loop5): 1 truncate cleaned up [ 357.928891][T19547] EXT4-fs error (device loop1) in ext4_mb_clear_bb:6071: Corrupt filesystem [ 357.929298][T19547] EXT4-fs error (device loop1): ext4_free_branches:1022: inode #13: comm syz-executor.1: invalid indirect mapped block 1819239214 (level 0) [ 357.938109][T19544] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 357.955411][T19547] EXT4-fs error (device loop1): ext4_free_branches:1022: inode #13: comm syz-executor.1: invalid indirect mapped block 1819239214 (level 1) [ 357.984382][T19547] EXT4-fs (loop1): 1 truncate cleaned up [ 357.990119][T19547] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 358.007071][ T3151] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 358.025502][ T4131] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 05:44:52 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000240)=0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = accept4$vsock_stream(r2, &(0x7f0000000100)={0x28, 0x0, 0x2711, @host}, 0x10, 0x0) write$binfmt_script(r3, &(0x7f0000000800)=ANY=[], 0x1129) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000) write(r1, &(0x7f0000000380)="21badad2f54c6a8330e5b812f93b3d3efe795ac485204c1089e395ceb5212ab39fa7d5d84340c5e6a567f26dcdb4053d26eb9291dc269c3266b91f4a99efafda41bc113b3bb1a87cca63a1983394e26aecd389147f69bb93a0dd4faf2f7341d6cdcf2415b646e51308098acb9e18bd351dec", 0x72) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000007c0)={'erspan0\x00', &(0x7f0000000100)=ANY=[]}) openat$loop_ctrl(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x4e1e, 0x0, @local}, 0x1c) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r4, 0x8918, &(0x7f0000000080)={@loopback={0x0, 0x3fc}, 0x0, r5}) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@bloom_filter={0x1e, 0x1000, 0x0, 0xffff7fff, 0xc, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x0, 0xd}, 0x48) 05:44:52 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xc0, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x10, &(0x7f0000000000), 0x0, 0x465, &(0x7f00000004c0)="$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") 05:44:52 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xe2, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x10, &(0x7f0000000000)={[], [], 0x3d}, 0x0, 0x465, &(0x7f00000004c0)="$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") 05:44:52 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xe3, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:52 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xe3, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:52 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0xc0, &(0x7f0000000080), &(0x7f0000000000)=0x4) [ 358.594335][T19575] loop5: detected capacity change from 0 to 512 [ 358.597093][T19577] loop3: detected capacity change from 0 to 512 [ 358.615827][T19575] EXT4-fs error (device loop5): ext4_free_branches:1022: inode #13: comm syz-executor.5: invalid indirect mapped block 2 (level 0) 05:44:52 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xe3, &(0x7f0000000080), &(0x7f0000000000)=0x4) [ 358.635112][T19575] EXT4-fs error (device loop5): ext4_clear_blocks:875: inode #13: comm syz-executor.5: attempt to clear invalid blocks 2 len 1 [ 358.660182][T19575] EXT4-fs error (device loop5): ext4_validate_block_bitmap:399: comm syz-executor.5: bg 0: block 5: invalid block bitmap [ 358.674022][T19577] EXT4-fs error (device loop3): ext4_free_branches:1022: inode #13: comm syz-executor.3: invalid indirect mapped block 2 (level 0) 05:44:52 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0xc0, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:52 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xe3, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:52 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xe2, &(0x7f0000000080), &(0x7f0000000000)=0x4) [ 358.674042][T19575] EXT4-fs error (device loop5) in ext4_mb_clear_bb:6071: Corrupt filesystem [ 358.674218][T19575] EXT4-fs error (device loop5): ext4_free_branches:1022: inode #13: comm syz-executor.5: invalid indirect mapped block 1819239214 (level 0) [ 358.708628][T19577] EXT4-fs error (device loop3): ext4_clear_blocks:875: inode #13: comm syz-executor.3: attempt to clear invalid blocks 2 len 1 [ 358.727025][T19575] EXT4-fs error (device loop5): ext4_free_branches:1022: inode #13: comm syz-executor.5: invalid indirect mapped block 1819239214 (level 1) [ 358.738950][T19577] EXT4-fs error (device loop3): ext4_validate_block_bitmap:399: comm syz-executor.3: bg 0: block 5: invalid block bitmap [ 358.754029][T19575] EXT4-fs (loop5): 1 truncate cleaned up [ 358.754049][T19575] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 358.778928][T19577] EXT4-fs error (device loop3) in ext4_mb_clear_bb:6071: Corrupt filesystem [ 358.789105][T19577] EXT4-fs error (device loop3): ext4_free_branches:1022: inode #13: comm syz-executor.3: invalid indirect mapped block 1819239214 (level 0) [ 358.809323][ T3151] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 358.813693][T19577] EXT4-fs error (device loop3): ext4_free_branches:1022: inode #13: comm syz-executor.3: invalid indirect mapped block 1819239214 (level 1) [ 358.837929][T19577] EXT4-fs (loop3): 1 truncate cleaned up [ 358.843705][T19577] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 358.866050][ T3150] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. 05:44:53 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000240)=0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = accept4$vsock_stream(r2, &(0x7f0000000100)={0x28, 0x0, 0x2711, @host}, 0x10, 0x0) write$binfmt_script(r3, &(0x7f0000000800)=ANY=[], 0x1129) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000) write(r1, &(0x7f0000000380)="21badad2f54c6a8330e5b812f93b3d3efe795ac485204c1089e395ceb5212ab39fa7d5d84340c5e6a567f26dcdb4053d26eb9291dc269c3266b91f4a99efafda41bc113b3bb1a87cca63a1983394e26aecd389147f69bb93a0dd4faf2f7341d6cdcf2415b646e51308098acb9e18bd351dec", 0x72) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000007c0)={'erspan0\x00', &(0x7f0000000100)=ANY=[]}) openat$loop_ctrl(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x4e1e, 0x0, @local}, 0x1c) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r4, 0x8918, &(0x7f0000000080)={@loopback={0x0, 0x3fc}, 0x0, r5}) 05:44:53 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0xc0, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:53 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0xe3, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:53 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0x85, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:53 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xe2, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:53 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x200c10, &(0x7f0000000240)={[{@nodiscard}, {@mblk_io_submit}, {@debug}, {@nogrpid}, {@errors_remount}]}, 0x2, 0x4bb, &(0x7f0000000a40)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='pids.events\x00', 0x275a, 0x0) fallocate(r0, 0x0, 0x0, 0xf3fe) r1 = open(&(0x7f0000000180)='./bus\x00', 0x14d27e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4002011, r1, 0x0) fallocate(r1, 0x0, 0x0, 0x1000f4) preadv2(r1, &(0x7f0000000100)=[{&(0x7f0000000000)=""/76, 0x7ffff050}], 0x1, 0x0, 0x0, 0x0) 05:44:53 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xe2, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:53 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0xe3, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:53 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(0xffffffffffffffff, 0x10d, 0xc0, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:53 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xe2, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:53 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0xe3, &(0x7f0000000080), &(0x7f0000000000)=0x4) [ 359.469337][T19608] loop3: detected capacity change from 0 to 512 [ 359.488786][T19608] EXT4-fs: Ignoring removed mblk_io_submit option 05:44:53 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(0xffffffffffffffff, 0x10d, 0xc0, &(0x7f0000000080), &(0x7f0000000000)=0x4) [ 359.522031][T19608] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a802c028, mo2=0002] [ 359.534965][T19608] System zones: 0-2, 18-18, 34-35 [ 359.542728][T19608] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. [ 359.555543][T19608] ext4 filesystem being mounted at /root/syzkaller-testdir52648963/syzkaller.bYYdyc/1180/file0 supports timestamps until 2038 (0x7fffffff) [ 359.574338][ T23] audit: type=1400 audit(1677995093.655:411): avc: denied { execute } for pid=19606 comm="syz-executor.3" path="/root/syzkaller-testdir52648963/syzkaller.bYYdyc/1180/file0/bus" dev="loop3" ino=19 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 359.613872][ T3150] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. 05:44:54 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000240)=0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = accept4$vsock_stream(r2, &(0x7f0000000100)={0x28, 0x0, 0x2711, @host}, 0x10, 0x0) write$binfmt_script(r3, &(0x7f0000000800)=ANY=[], 0x1129) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000) write(r1, &(0x7f0000000380)="21badad2f54c6a8330e5b812f93b3d3efe795ac485204c1089e395ceb5212ab39fa7d5d84340c5e6a567f26dcdb4053d26eb9291dc269c3266b91f4a99efafda41bc113b3bb1a87cca63a1983394e26aecd389147f69bb93a0dd4faf2f7341d6cdcf2415b646e51308098acb9e18bd351dec", 0x72) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000007c0)={'erspan0\x00', &(0x7f0000000100)=ANY=[]}) openat$loop_ctrl(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x4e1e, 0x0, @local}, 0x1c) ioctl$sock_inet6_SIOCSIFDSTADDR(r4, 0x8918, &(0x7f0000000080)={@loopback={0x0, 0x3fc}}) 05:44:54 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, 0x0, 0x0) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xe2, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:54 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(0xffffffffffffffff, 0x10d, 0xe3, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:54 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(0xffffffffffffffff, 0x10d, 0xc0, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:54 executing program 3: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x10, &(0x7f0000000000), 0x0, 0x465, &(0x7f00000004c0)="$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") 05:44:54 executing program 5: syz_mount_image$vfat(&(0x7f0000000100), &(0x7f00000000c0)='./file0\x00', 0xa00008, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0xa, 0x21e, &(0x7f0000000440)="$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") 05:44:54 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xc0, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:54 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, 0x0, 0x0) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xe2, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:54 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(0xffffffffffffffff, 0x10d, 0xe3, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:54 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, 0x0, 0x0) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xe2, &(0x7f0000000080), &(0x7f0000000000)=0x4) [ 360.335932][T19640] loop5: detected capacity change from 0 to 256 [ 360.344239][T19641] loop3: detected capacity change from 0 to 512 [ 360.353311][T19640] FAT-fs (loop5): Unrecognized mount option "smackfsroot=Ï" or missing value 05:44:54 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0), 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xe2, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:54 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0), 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xe2, &(0x7f0000000080), &(0x7f0000000000)=0x4) [ 360.375685][T19641] EXT4-fs error (device loop3): ext4_xattr_ibody_find:2265: inode #12: comm syz-executor.3: corrupted in-inode xattr: overlapping e_value [ 360.393531][T19641] EXT4-fs error (device loop3): ext4_orphan_get:1397: comm syz-executor.3: couldn't read orphan inode 12 (err -117) [ 360.426762][T19641] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 360.446979][ T3150] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. 05:44:55 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000240)=0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = accept4$vsock_stream(r2, &(0x7f0000000100)={0x28, 0x0, 0x2711, @host}, 0x10, 0x0) write$binfmt_script(r3, &(0x7f0000000800)=ANY=[], 0x1129) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000) write(r1, &(0x7f0000000380)="21badad2f54c6a8330e5b812f93b3d3efe795ac485204c1089e395ceb5212ab39fa7d5d84340c5e6a567f26dcdb4053d26eb9291dc269c3266b91f4a99efafda41bc113b3bb1a87cca63a1983394e26aecd389147f69bb93a0dd4faf2f7341d6cdcf2415b646e51308098acb9e18bd351dec", 0x72) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000007c0)={'erspan0\x00', &(0x7f0000000100)=ANY=[]}) openat$loop_ctrl(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x4e1e, 0x0, @local}, 0x1c) ioctl$sock_inet6_SIOCSIFDSTADDR(r4, 0x8918, &(0x7f0000000080)={@loopback={0x0, 0x3fc}}) 05:44:55 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xc0, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:55 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xd3, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:55 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(0xffffffffffffffff, 0x10d, 0xe3, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:55 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0), 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xe2, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:55 executing program 3: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x10, &(0x7f0000000000), 0x0, 0x465, &(0x7f00000004c0)="$eJzs289vFFUcAPDvTLdAgdqK+IMfahWNjT9aWlA5eNFowkETEz3gsZaFVBZqaE2EEEFj8GhIPGs8mvgXeFIPRj2ZeNW7ISGGi+BpzezOlIXulm3Z7Rb380m2vLfzdt73OzNv9+28JYC+NZb9SSK2R8QfETFSr97SaKjW7trVc7PXr56bTaJafevvpNbun6vnZotmxeu25ZXxNCL9NIk9TfpdOHP2xEylUj6d1ycXT74/uXDm7HNzJ2eOl4+XT00fOnTwwNSLL0w/35E8h7NYd380v3fX4XcuvTF75NK7v3ybxbs9396YR6eMxdjyY5l7stOd9djw5hvlpFT/d1PPoqFdAxGRna7B2vgfiYEoLW0bidc+6WlwQFedr9a12HyiCvyPZbN5oB8VH/TZ99/isX6zj9678nL9C1CW97X8Ud9SijRvM9jF/sci4siFf7/KHtGl+xAAAI2+z+Y/zzab/6XxQEO7e/K1odGIuDcidkTEfRGxMyLuj6i1fTAiHrpp77dfARi7pb58/pNeXnNybcjmfy/la1s3z/+K2V+MDuS14Vr+g8mxuUp5f35MxmNwc1afWqGPH179/fNW2xrnf9kj67+YC+ZxXC4tra1sqf09OrM4c6d5F658HLG71Cz/ZGklIIkfY1dE7F7Ffoujlx2zuae/2duq3e3zX0FpFQG1UP064qn6+b8Qt+RfSFZen5zcEpXy/sniqlju198uvpl11WwtsJ7/l2vLvwOy87+16fW/FO1o0rheu7D6Pi7++VnL7zSru/7rsut/U/J2rVy8w3w4s7h4eipiU/L68uenb7y2qBfts/zH9zUf/zvixpHYExHZRfxwRDwSEY/msT8WEY9HxL4V8v/5lSfeW3v+3ZXlf7Sd858W5//MqgsDJ376rlX/7Z3/g7XSeP5MO+9/7QZ4J8cOAAAA7hZp7TfwSTqxVE7TiYn6b/h3xta0Mr+w+Myx+Q9OHa3/Vn40BtNjc5Xy9Wq1OtJwP3QqYijfZa0+nd8rLrYfyO8bfzEwVKtPzM5XhnucO/S7bS3Gf+avgV5HB3RdB9bRgLuU8Q/9y/iH/pWP/6FexwGsP5//0L+ajf/zEdd6EAqwznz+Q/8y/qF/Gf/Qv4x/6Etr+O/8lfLpwSie2dyizY7Da9vzBiyUNkYYG60Q6YYIQ6FLhV6/MwEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHTGfwEAAP//jmDs6g==") 05:44:55 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xe3, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:55 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(0xffffffffffffffff, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xe2, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:55 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xc0, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:55 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(0xffffffffffffffff, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xe2, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:55 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xe3, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:55 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(0xffffffffffffffff, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xe2, &(0x7f0000000080), &(0x7f0000000000)=0x4) [ 361.182334][T19665] loop3: detected capacity change from 0 to 512 [ 361.196433][T19665] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 05:44:56 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xe2, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:56 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xc0, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:56 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xe3, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:56 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000240)=0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = accept4$vsock_stream(r2, &(0x7f0000000100)={0x28, 0x0, 0x2711, @host}, 0x10, 0x0) write$binfmt_script(r3, &(0x7f0000000800)=ANY=[], 0x1129) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000) write(r1, &(0x7f0000000380)="21badad2f54c6a8330e5b812f93b3d3efe795ac485204c1089e395ceb5212ab39fa7d5d84340c5e6a567f26dcdb4053d26eb9291dc269c3266b91f4a99efafda41bc113b3bb1a87cca63a1983394e26aecd389147f69bb93a0dd4faf2f7341d6cdcf2415b646e51308098acb9e18bd351dec", 0x72) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000007c0)={'erspan0\x00', &(0x7f0000000100)=ANY=[]}) openat$loop_ctrl(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x4e1e, 0x0, @local}, 0x1c) ioctl$sock_inet6_SIOCSIFDSTADDR(r4, 0x8918, &(0x7f0000000080)={@loopback={0x0, 0x3fc}}) 05:44:56 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xbd, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:56 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x7, [@typedef={0x5}, @func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0xa}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000001c0)=""/166, 0x47, 0xa6, 0x1}, 0x20) 05:44:56 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xc0, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:56 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xe3, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:56 executing program 3: syz_mount_image$vfat(&(0x7f0000000100), &(0x7f00000000c0)='./file0\x00', 0xa00008, &(0x7f00000002c0)={[{@utf8no}, {@shortname_lower}, {@shortname_mixed}, {@fat=@usefree}, {@uni_xlate}, {@uni_xlateno}, {@numtail}, {@utf8}, {@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@fat=@codepage={'codepage', 0x3d, '855'}}, {@iocharset={'iocharset', 0x3d, 'iso8859-14'}}, {@rodir}, {@shortname_win95}, {@fat=@showexec}], [{@smackfsroot={'smackfsroot', 0x3d, '\xcf\x00\x04\xdf8e\x0e\xb1\xca\xa9\x89j\xd2Qn>RK~\x10\xfa\x1d\x90Cj\xe4uk\xdfX\xc2\xc8vVJ\xfe\xd2\x9e\x8fK\xb0\x94\xa3\xac\x8ekp\xc5f\xbb\'*\x81\xf6~\xd8Yi\x95\x9fb\xc9B\xc5\x14Yq\xd2\x99\rja\xd2\b\xdf\xa7?\xde\xf1@[H\xbaYE\xae\xf1\x8b\x94\x1c\x01\xae\x9d\x87\xaf\xa9\x83x\x80\x85j\x8b\x1c\xd8\xfe\xee\x86_\xbb}\xfc\xdb\xdeX{\xacqE\x8a\x8c\v.\xefG\xe9\x14\xab2\xcde'}}]}, 0xa, 0x21e, &(0x7f0000000440)="$eJzs3b9qU1EcB/DfbdMadUgGJ3G4oINTafsEDVJBzKRkUActtgVJQsFCwD8YO/kEPpaLb+ADCG52KFy5uUkTIUWj+VPr57P0B+d87/kdekKme/LsRru5e3C4f/T2S5TLSSxtxVYcJ1GNpRh4HwDARXKcZfEtK0yWLC3NqicAYLb+/PsfAPhXPXz0+H6tXt9+kKbliPaHTiOJ4m8xXtuPF9GKvViPSpxEZKeK+u69+naU0lw1brW7nUaebD/91H9+7WtEL78RlaiOz2+khZF8t9NYiSv99bfy/GZU4tr4/OaYfDRW4/bNkf7XohKfn8dBtGI38uww/24jTe9kH7+/eZJ3nOeTbqdxqTdvKFue+z8HAAAAAAAAAAAAAAAAAAAAAIALay09Vf35/p3lk9742lnjRf6s+4G6I/frrKdpmiXF/GG+FNdLUVrk3gEAAAAAAAAAAAAAAAAAAOC8OHz1urnTau29nGoxeK1/+k/+2yKW+621kohz0E+vuJz3M7dFV2a/1uB0NXeS+MXk8owOSTbR8Vud0uqrV6e7i2SCXaxM+ZMCAAAAAAAAAAAAAAAAAADM2fCl3zGDRwtoCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAWYPj7/xMU3X74N1ML3iIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD/gR8BAAD//4hvfFQ=") 05:44:56 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xe2, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x10, &(0x7f0000000000), 0x0, 0x465, &(0x7f00000004c0)="$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") 05:44:56 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xe3, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:56 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xe2, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:56 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xc0, &(0x7f0000000080), &(0x7f0000000000)=0x4) [ 362.085292][T19703] loop5: detected capacity change from 0 to 512 [ 362.085370][T19704] loop3: detected capacity change from 0 to 256 [ 362.105932][T19704] FAT-fs (loop3): Unrecognized mount option "smackfsroot=Ï" or missing value [ 362.128147][T19703] [EXT4 FS bs=1024, gc=1, bpg=256, ipg=32, mo=a802c018, mo2=0000] [ 362.136564][T19703] System zones: 1-12 [ 362.146261][T19703] EXT4-fs error (device loop5): ext4_free_branches:1022: inode #13: comm syz-executor.5: invalid indirect mapped block 2 (level 0) [ 362.160241][T19703] EXT4-fs error (device loop5): ext4_clear_blocks:875: inode #13: comm syz-executor.5: attempt to clear invalid blocks 2 len 1 [ 362.175538][T19703] EXT4-fs error (device loop5): ext4_validate_block_bitmap:399: comm syz-executor.5: bg 0: block 5: invalid block bitmap [ 362.188546][T19703] EXT4-fs error (device loop5) in ext4_mb_clear_bb:6071: Corrupt filesystem [ 362.197652][T19703] EXT4-fs error (device loop5): ext4_free_branches:1022: inode #13: comm syz-executor.5: invalid indirect mapped block 1819239214 (level 0) [ 362.213038][T19703] EXT4-fs error (device loop5): ext4_free_branches:1022: inode #13: comm syz-executor.5: invalid indirect mapped block 1819239214 (level 1) [ 362.227879][T19703] EXT4-fs (loop5): 1 truncate cleaned up [ 362.233598][T19703] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 362.253531][ T3151] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. 05:44:56 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000240)=0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = accept4$vsock_stream(r2, &(0x7f0000000100)={0x28, 0x0, 0x2711, @host}, 0x10, 0x0) write$binfmt_script(r3, &(0x7f0000000800)=ANY=[], 0x1129) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000) write(r1, &(0x7f0000000380)="21badad2f54c6a8330e5b812f93b3d3efe795ac485204c1089e395ceb5212ab39fa7d5d84340c5e6a567f26dcdb4053d26eb9291dc269c3266b91f4a99efafda41bc113b3bb1a87cca63a1983394e26aecd389147f69bb93a0dd4faf2f7341d6cdcf2415b646e51308098acb9e18bd351dec", 0x72) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000007c0)={'erspan0\x00', &(0x7f0000000100)=ANY=[]}) openat$loop_ctrl(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r4, 0x8918, &(0x7f0000000080)={@loopback={0x0, 0x3fc}, 0x0, r5}) 05:44:56 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xe3, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:56 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xe2, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:56 executing program 2: bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(0xffffffffffffffff, 0x200007) r0 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r0, 0x10d, 0xc0, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:56 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) 05:44:56 executing program 5: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="6000000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000450800010074626600340002"], 0x60}}, 0x0) 05:44:57 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xb6, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:57 executing program 2: bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(0xffffffffffffffff, 0x200007) r0 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r0, 0x10d, 0xc0, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:57 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xe2, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:57 executing program 1: bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(0xffffffffffffffff, 0x200007) r0 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r0, 0x10d, 0xe3, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:57 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x8}, 0x1c) 05:44:57 executing program 1: bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(0xffffffffffffffff, 0x200007) r0 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r0, 0x10d, 0xe3, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:57 executing program 2: bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(0xffffffffffffffff, 0x200007) r0 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r0, 0x10d, 0xc0, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:57 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_buf(r0, 0x0, 0x5, 0x0, 0x0) 05:44:57 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xe2, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:57 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000240)=0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = accept4$vsock_stream(r2, &(0x7f0000000100)={0x28, 0x0, 0x2711, @host}, 0x10, 0x0) write$binfmt_script(r3, &(0x7f0000000800)=ANY=[], 0x1129) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000) write(r1, &(0x7f0000000380)="21badad2f54c6a8330e5b812f93b3d3efe795ac485204c1089e395ceb5212ab39fa7d5d84340c5e6a567f26dcdb4053d26eb9291dc269c3266b91f4a99efafda41bc113b3bb1a87cca63a1983394e26aecd389147f69bb93a0dd4faf2f7341d6cdcf2415b646e51308098acb9e18bd351dec", 0x72) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000007c0)={'erspan0\x00', &(0x7f0000000100)=ANY=[]}) openat$loop_ctrl(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@loopback={0x0, 0x3fc}, 0x0, r4}) 05:44:57 executing program 1: bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(0xffffffffffffffff, 0x200007) r0 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r0, 0x10d, 0xe3, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:57 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, 0x0, 0x0) getsockopt$inet_int(r1, 0x10d, 0xe2, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:57 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xb6, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:57 executing program 3: bpf$PROG_LOAD_XDP(0x3, &(0x7f0000001580)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:44:57 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xc0, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:57 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xe3, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:57 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, 0x0, 0x0) getsockopt$inet_int(r1, 0x10d, 0xe2, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:57 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, 0x0, 0x0) getsockopt$inet_int(r1, 0x10d, 0xe2, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:57 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000002100)='attr/sockcreate\x00') write$binfmt_elf32(r0, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 05:44:58 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000240)=0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = accept4$vsock_stream(r2, &(0x7f0000000100)={0x28, 0x0, 0x2711, @host}, 0x10, 0x0) write$binfmt_script(r3, &(0x7f0000000800)=ANY=[], 0x1129) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000) write(r1, &(0x7f0000000380)="21badad2f54c6a8330e5b812f93b3d3efe795ac485204c1089e395ceb5212ab39fa7d5d84340c5e6a567f26dcdb4053d26eb9291dc269c3266b91f4a99efafda41bc113b3bb1a87cca63a1983394e26aecd389147f69bb93a0dd4faf2f7341d6cdcf2415b646e51308098acb9e18bd351dec", 0x72) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000007c0)={'erspan0\x00', &(0x7f0000000100)=ANY=[]}) openat$loop_ctrl(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@loopback={0x0, 0x3fc}, 0x0, r4}) 05:44:58 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xe2, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:58 executing program 3: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x4020940d, &(0x7f0000000140)) 05:44:58 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xe3, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:58 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xc0, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:58 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xb6, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:58 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xe2, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:58 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r0, 0x29, 0x23, 0x0, 0x0) 05:44:58 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xe3, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:58 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xc0, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:58 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xe2, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:58 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout_data(r0, 0x107, 0x13, 0x0, 0x0) 05:44:59 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000240)=0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = accept4$vsock_stream(r2, &(0x7f0000000100)={0x28, 0x0, 0x2711, @host}, 0x10, 0x0) write$binfmt_script(r3, &(0x7f0000000800)=ANY=[], 0x1129) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000) write(r1, &(0x7f0000000380)="21badad2f54c6a8330e5b812f93b3d3efe795ac485204c1089e395ceb5212ab39fa7d5d84340c5e6a567f26dcdb4053d26eb9291dc269c3266b91f4a99efafda41bc113b3bb1a87cca63a1983394e26aecd389147f69bb93a0dd4faf2f7341d6cdcf2415b646e51308098acb9e18bd351dec", 0x72) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000007c0)={'erspan0\x00', &(0x7f0000000100)=ANY=[]}) openat$loop_ctrl(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@loopback={0x0, 0x3fc}, 0x0, r4}) 05:44:59 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(0xffffffffffffffff, 0x10d, 0xe2, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:59 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_RTHDR(r0, 0x29, 0x39, &(0x7f0000000200), 0x8) 05:44:59 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xc0, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:59 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xe3, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:59 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xb6, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:59 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xe3, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:59 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xc0, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:59 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000640), r0) connect(r0, &(0x7f0000000000)=@generic={0x10, "6e2d2415f0b09dd91eb27d406ea3f82d4e2eec96d702e1ca2a28b511d66a464b74f955d526b2005f674e758aa56e3c413cf19c86fa4c662590e521d1a53fda55ce816ed4b0f7e02275eac001dc636f6bf1dd907b61d7be8aa175071ab11d95eb9b1ec226690309dcd0feb935fce556bb158d5096d5c99edf05afac2bd231"}, 0x80) 05:44:59 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(0xffffffffffffffff, 0x10d, 0xe2, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:44:59 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x8) unshare(0x40000000) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) writev(r0, &(0x7f0000001680)=[{&(0x7f0000000380)="db87f2ddd2806e316c58999a9f1372aa45680d1fde3fb07b0ebfa9b38b0b51c465e0e19c3c9107672331e681ffc641b2d77a312cf9ff6820c38418a760bc2d1b1b54f19fef0f98c8082fb1d442fbcbc3d3069e86096029e340f294742087399219ecb8ad9b2f078b87c2c0e42ab7595a5f8d8ba12413ab7d217a022e797c0d6b07054f18fc60a66fa82fce268a53c62ef390c4f047250702693a24b66207f933b86a66e8a2240a190373cf6bf13451d4de7ea916a9061f62dc51b0200a811b350d4dc3154b67f1fa47448e6adf82342ae9f854dc472b72ec291eb8f6ec0848ee9472732a32fa860969c0848e8dd0831e6ee2e41a2b3b7cefbca70bf7692a1ac80ef12241b2d5f84dd8d5cb38066af870d6ce284ecb33a5585a7ba7530c1841b86be328b928ac7ff95d0c34340a9e9ec52db79ea067a31d246b915bb4d4c72caec88fb1000a3c72bed42e801daf19ae35703a74135795970256dcfb515ea4a3bae02efb2aeb99b9fe8f45c6bd8be4798fd35f79399cfda80afb26f1d7d89e2229c2f4e4dd85fb0baa2fb9b5ad99e4ebfcf2001048a865ca617ef0b585476e60c258f0cfd40b107ea489c07c77da9b7ec8d0f5e77733c71391d14e7b42efd6325e68d0295e25a0bc0e5e4365a26a049342d1253344b19d5dcdb53850a6433da8f3312b981023366d0cdf0791943d82b0c11db23aa90616a410931b1b4d6f02f3cb9f9091311f1445c8a5ec61bd33697fdf21b16458535963621005f92e98d6eb01f83e5b9e28d558db0c5c1e5a5991cda7825247a248b100060533516829238fc95060fe320828e35a745a26b55f237cd053219dce80fb2b82acf6c0aaf8c33989bc62174693c5c7045bf0769b65d04ee923ed4eda699c15c7bd38f852c8dda8de70b4fbb6cba465cb3ce1a7f09d1950faa3f420deddee1bce2e4861166ac6000651e39fff58412dd2912fc4f780133134c8f676d93435f4bf971d359cff142e97b588a283a63b529a539132a5fa493091ebf3724e71d01ddd896171df1e776f9b47213e30a5580d05fc835edbf90a6c9c83f61cdf362a39d74603bef49c37b5682c849bdcce1130a88362870c81c1d6d24a49a63a373f77211a550d6c3e4f9e8d2de5c7b0c04554aaa79f70d8b1cd01d5fa4d1aa2c99bc282fac4530a63a280611af67c799ccfbb69c789c1df38ac41feac347b296e8418a00180528fe07aec8bc1756350a379490358782ec615f0331057e4b1e27a391e217f024383b3a689bacc4ca67686e99673d4f26d02f067a2d5960e546359e8c8d05d97957cb8cac8198954f42a1b4fadf0fcae66112f18fb7040c5f6f695ef4484ae8d80229c24ce1263c4206273ee3384045edbc08078a301f72ec23f814f464dc045690b431c72f385d0d1f8497d7a4d973e0f0bc30973619b576ae7966fb98bf5b109a6495accc48c53ca28f0b5cfc297c37b99901aff865d14fbcfa3e1a201f6fea576e3b31f3fa274a7cbdaf34ed56480f87770d29170b36029794e1d1209e2f846b3155ac03200925e3ed937a7a1898b59918d14649e13549f829041df4f84e2d630e12c78e18e3d669b3eb34dbe8c633d86f95f5a0d3c26cdb6aa07dc5a0951a6c79c00f22c4fb382d9b7d2142b7e9d5d9d15804e0c0c13efef2887f09ba6265a96268030f23694415c8c3d423d2b834cf5a0359b1b3b2723752646d259e6bc595ed468a2b7d3580c8abc5cf39f742529e6f3ea0ef2ffb19e8aff89b6f1bcfdb0a49d295714b6f2e58de3e61a822f68350724941615e7a6aeaee6654ba996f95479d1c310c4453a57c228c4424bbabaa98ab97b8e95bb022dff5de57466e0cc607a", 0x51c}, {0x0}], 0x2) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='pagemap\x00') r2 = pidfd_getfd(r1, r1, 0x0) bind$unix(r2, &(0x7f00000008c0)=@file={0x1, './file0\x00'}, 0x6e) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000140)={0x0, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340)=r3, 0x4) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xef, 0x0, &(0x7f0000000100)="b9ff03076044238cb89e14f08906fee0ffff0000400063fe77fb0800141ae000000162079f4b4d2f87e5feca6aab845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6e", 0x0, 0xfe, 0x60000000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r3, r2}, 0x80) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x1a01, 0x0) ioctl$EVIOCGPROP(r5, 0x40047438, &(0x7f0000000180)=""/246) syz_io_uring_complete(0x0) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) dup(0xffffffffffffffff) r6 = dup(r5) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000340)=0x11) r7 = syz_io_uring_complete(0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$TIOCGICOUNT(0xffffffffffffffff, 0x545d, 0x0) write$P9_RMKDIR(r6, &(0x7f00000000c0)={0x14, 0x49, 0x0, {0x0, 0x2}}, 0x14) accept(r7, &(0x7f0000000100)=@in, &(0x7f0000000000)=0x80) 05:44:59 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xc0, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:45:00 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000240)=0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = accept4$vsock_stream(r2, &(0x7f0000000100)={0x28, 0x0, 0x2711, @host}, 0x10, 0x0) write$binfmt_script(r3, &(0x7f0000000800)=ANY=[], 0x1129) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000) write(r1, &(0x7f0000000380)="21badad2f54c6a8330e5b812f93b3d3efe795ac485204c1089e395ceb5212ab39fa7d5d84340c5e6a567f26dcdb4053d26eb9291dc269c3266b91f4a99efafda41bc113b3bb1a87cca63a1983394e26aecd389147f69bb93a0dd4faf2f7341d6cdcf2415b646e51308098acb9e18bd351dec", 0x72) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000007c0)={'erspan0\x00', &(0x7f0000000100)=ANY=[]}) r4 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r4, 0x8918, &(0x7f0000000080)={@loopback={0x0, 0x3fc}, 0x0, r5}) 05:45:00 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xe3, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:45:00 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(0xffffffffffffffff, 0x10d, 0xe2, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:45:00 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, 0x0, 0x0) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xc0, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:45:00 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x8) unshare(0x40000000) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) writev(r0, &(0x7f0000001680)=[{&(0x7f0000000380)="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", 0x51c}, {0x0}], 0x2) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='pagemap\x00') r2 = pidfd_getfd(r1, r1, 0x0) bind$unix(r2, &(0x7f00000008c0)=@file={0x1, './file0\x00'}, 0x6e) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000140)={0x0, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340)=r3, 0x4) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xef, 0x0, &(0x7f0000000100)="b9ff03076044238cb89e14f08906fee0ffff0000400063fe77fb0800141ae000000162079f4b4d2f87e5feca6aab845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6e", 0x0, 0xfe, 0x60000000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r3, r2}, 0x80) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x1a01, 0x0) ioctl$EVIOCGPROP(r5, 0x40047438, &(0x7f0000000180)=""/246) syz_io_uring_complete(0x0) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) dup(0xffffffffffffffff) r6 = dup(r5) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000340)=0x11) r7 = syz_io_uring_complete(0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$TIOCGICOUNT(0xffffffffffffffff, 0x545d, 0x0) write$P9_RMKDIR(r6, &(0x7f00000000c0)={0x14, 0x49, 0x0, {0x0, 0x2}}, 0x14) accept(r7, &(0x7f0000000100)=@in, &(0x7f0000000000)=0x80) 05:45:00 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0xb6, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:45:00 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, 0x0, 0x0) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xc0, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:45:00 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, 0x0, 0x0) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xe3, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:45:00 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0x0, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:45:00 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) getsockopt$inet_int(0xffffffffffffffff, 0x10d, 0xb6, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:45:00 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0x0, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:45:00 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, 0x0, 0x0) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xe3, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:45:01 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000240)=0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = accept4$vsock_stream(r2, &(0x7f0000000100)={0x28, 0x0, 0x2711, @host}, 0x10, 0x0) write$binfmt_script(r3, &(0x7f0000000800)=ANY=[], 0x1129) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000) write(r1, &(0x7f0000000380)="21badad2f54c6a8330e5b812f93b3d3efe795ac485204c1089e395ceb5212ab39fa7d5d84340c5e6a567f26dcdb4053d26eb9291dc269c3266b91f4a99efafda41bc113b3bb1a87cca63a1983394e26aecd389147f69bb93a0dd4faf2f7341d6cdcf2415b646e51308098acb9e18bd351dec", 0x72) r4 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r4, 0x8918, &(0x7f0000000080)={@loopback={0x0, 0x3fc}, 0x0, r5}) 05:45:01 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) getsockopt$inet_int(0xffffffffffffffff, 0x10d, 0xb6, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:45:01 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, 0x0, 0x0) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xc0, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:45:01 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, 0x0, 0x0) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xe3, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:45:01 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0x0, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:45:01 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x8) unshare(0x40000000) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) writev(r0, &(0x7f0000001680)=[{&(0x7f0000000380)="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", 0x51c}, {0x0}], 0x2) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='pagemap\x00') r2 = pidfd_getfd(r1, r1, 0x0) bind$unix(r2, &(0x7f00000008c0)=@file={0x1, './file0\x00'}, 0x6e) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000140)={0x0, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340)=r3, 0x4) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xef, 0x0, &(0x7f0000000100)="b9ff03076044238cb89e14f08906fee0ffff0000400063fe77fb0800141ae000000162079f4b4d2f87e5feca6aab845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6e", 0x0, 0xfe, 0x60000000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r3, r2}, 0x80) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x1a01, 0x0) ioctl$EVIOCGPROP(r5, 0x40047438, &(0x7f0000000180)=""/246) syz_io_uring_complete(0x0) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) dup(0xffffffffffffffff) r6 = dup(r5) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000340)=0x11) r7 = syz_io_uring_complete(0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$TIOCGICOUNT(0xffffffffffffffff, 0x545d, 0x0) write$P9_RMKDIR(r6, &(0x7f00000000c0)={0x14, 0x49, 0x0, {0x0, 0x2}}, 0x14) accept(r7, &(0x7f0000000100)=@in, &(0x7f0000000000)=0x80) 05:45:01 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) getsockopt$inet_int(0xffffffffffffffff, 0x10d, 0xb6, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:45:01 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0), 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xe3, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:45:01 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0), 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xc0, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:45:01 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xe2, 0x0, &(0x7f0000000000)) 05:45:01 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0xb6, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:45:01 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0), 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xc0, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:45:02 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000240)=0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = accept4$vsock_stream(r2, &(0x7f0000000100)={0x28, 0x0, 0x2711, @host}, 0x10, 0x0) write$binfmt_script(r3, &(0x7f0000000800)=ANY=[], 0x1129) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000) r4 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r4, 0x8918, &(0x7f0000000080)={@loopback={0x0, 0x3fc}, 0x0, r5}) 05:45:02 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0), 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xe3, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:45:02 executing program 5: socket$inet6(0xa, 0x6, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r0, 0x10d, 0xb6, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:45:02 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xe2, 0x0, &(0x7f0000000000)) 05:45:02 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0), 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xc0, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:45:02 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x8) unshare(0x40000000) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) writev(r0, &(0x7f0000001680)=[{&(0x7f0000000380)="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", 0x51c}, {0x0}], 0x2) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='pagemap\x00') r2 = pidfd_getfd(r1, r1, 0x0) bind$unix(r2, &(0x7f00000008c0)=@file={0x1, './file0\x00'}, 0x6e) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000140)={0x0, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340)=r3, 0x4) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xef, 0x0, &(0x7f0000000100)="b9ff03076044238cb89e14f08906fee0ffff0000400063fe77fb0800141ae000000162079f4b4d2f87e5feca6aab845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6e", 0x0, 0xfe, 0x60000000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r3, r2}, 0x80) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x1a01, 0x0) ioctl$EVIOCGPROP(r5, 0x40047438, &(0x7f0000000180)=""/246) syz_io_uring_complete(0x0) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) dup(0xffffffffffffffff) r6 = dup(r5) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000340)=0x11) r7 = syz_io_uring_complete(0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$TIOCGICOUNT(0xffffffffffffffff, 0x545d, 0x0) write$P9_RMKDIR(r6, &(0x7f00000000c0)={0x14, 0x49, 0x0, {0x0, 0x2}}, 0x14) accept(r7, &(0x7f0000000100)=@in, &(0x7f0000000000)=0x80) 05:45:02 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(0xffffffffffffffff, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xc0, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:45:02 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r0, 0x10d, 0xb6, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:45:02 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0), 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xe3, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:45:02 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xe2, 0x0, &(0x7f0000000000)) 05:45:02 executing program 5: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x10d, 0xb6, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:45:02 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(0xffffffffffffffff, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xc0, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:45:02 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(0xffffffffffffffff, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xe3, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:45:02 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xe2, &(0x7f0000000080), 0x0) 05:45:02 executing program 5: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x10d, 0xb6, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:45:02 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000240)=0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = accept4$vsock_stream(r2, &(0x7f0000000100)={0x28, 0x0, 0x2711, @host}, 0x10, 0x0) write$binfmt_script(r3, &(0x7f0000000800)=ANY=[], 0x1129) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r4, 0x8918, &(0x7f0000000080)={@loopback={0x0, 0x3fc}, 0x0, r5}) 05:45:02 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(0xffffffffffffffff, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xc0, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:45:02 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) syz_clone3(0x0, 0x0) fcntl$getown(r0, 0x9) r1 = gettid() process_vm_writev(r1, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x10000000000001b4, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) getpgrp(0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x10000000000001b4, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) gettid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x1}], 0x1, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000002640)='/proc/schedstat\x00', 0x0, 0x0) 05:45:02 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(0xffffffffffffffff, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xe3, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:45:03 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xe2, &(0x7f0000000080), 0x0) 05:45:03 executing program 5: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x10d, 0xb6, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:45:03 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(0xffffffffffffffff, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xe3, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:45:03 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xc0, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:45:03 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r0, 0x10d, 0x0, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:45:03 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xc0, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:45:03 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xe2, &(0x7f0000000080), 0x0) [ 369.013222][T19918] ================================================================== [ 369.021348][T19918] BUG: KCSAN: data-race in copyin / copyin [ 369.027266][T19918] [ 369.029601][T19918] write to 0xffff888115b2f000 of 4096 bytes by task 19937 on cpu 1: [ 369.037576][T19918] copyin+0x67/0x90 [ 369.041391][T19918] _copy_from_iter+0x24b/0x8c0 [ 369.046155][T19918] copy_page_from_iter+0x162/0x290 [ 369.051271][T19918] process_vm_rw+0x5d5/0x8c0 [ 369.055859][T19918] __x64_sys_process_vm_writev+0x7a/0x90 [ 369.061485][T19918] do_syscall_64+0x41/0xc0 [ 369.065899][T19918] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 369.071808][T19918] [ 369.074127][T19918] write to 0xffff888115b2f000 of 4096 bytes by task 19918 on cpu 0: [ 369.082096][T19918] copyin+0x67/0x90 [ 369.085899][T19918] _copy_from_iter+0x24b/0x8c0 [ 369.090660][T19918] copy_page_from_iter+0x162/0x290 [ 369.095769][T19918] process_vm_rw+0x5d5/0x8c0 [ 369.100363][T19918] __x64_sys_process_vm_writev+0x7a/0x90 [ 369.106000][T19918] do_syscall_64+0x41/0xc0 [ 369.110430][T19918] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 369.116327][T19918] [ 369.118725][T19918] Reported by Kernel Concurrency Sanitizer on: [ 369.124866][T19918] CPU: 0 PID: 19918 Comm: syz-executor.3 Not tainted 6.2.0-syzkaller-13534-gb01fe98d34f3-dirty #0 [ 369.135442][T19918] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 [ 369.145485][T19918] ================================================================== 05:45:03 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000240)=0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = accept4$vsock_stream(r2, &(0x7f0000000100)={0x28, 0x0, 0x2711, @host}, 0x10, 0x0) write$binfmt_script(r3, &(0x7f0000000800)=ANY=[], 0x1129) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r4 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r4, 0x8918, &(0x7f0000000080)={@loopback={0x0, 0x3fc}, 0x0, r5}) 05:45:03 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xe3, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:45:03 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r0, 0x10d, 0x0, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:45:03 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xc0, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:45:03 executing program 4: io_uring_setup(0x7, &(0x7f0000001680)) 05:45:03 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) syz_clone3(0x0, 0x0) fcntl$getown(r0, 0x9) r1 = gettid() process_vm_writev(r1, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x10000000000001b4, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) getpgrp(0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x10000000000001b4, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) gettid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x1}], 0x1, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000002640)='/proc/schedstat\x00', 0x0, 0x0) 05:45:03 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xc0, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:45:03 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000009f92f98a609"], 0x20}}, 0x0) 05:45:03 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xe3, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:45:03 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r0, 0x10d, 0x0, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:45:03 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xe3, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:45:03 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r0, 0x10d, 0xb6, 0x0, &(0x7f0000000000)) [ 369.781185][T19953] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 05:45:04 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000240)=0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r3 = accept4$vsock_stream(r2, &(0x7f0000000100)={0x28, 0x0, 0x2711, @host}, 0x10, 0x0) write$binfmt_script(r3, &(0x7f0000000800)=ANY=[], 0x1129) r4 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r4, 0x8918, &(0x7f0000000080)={@loopback={0x0, 0x3fc}, 0x0, r5}) 05:45:04 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xc0, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:45:04 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x7, &(0x7f0000000000)=0xd9b7322, 0x4) 05:45:04 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xe3, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:45:04 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r0, 0x10d, 0xb6, 0x0, &(0x7f0000000000)) 05:45:04 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000440), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_ADD(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x14, r1, 0x1}, 0x14}}, 0x0) 05:45:04 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xc0, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:45:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet(r0, &(0x7f0000002200)='O', 0x1, 0x40084, &(0x7f0000002280)={0x2, 0x4e22, @empty}, 0x10) 05:45:04 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r0, 0x10d, 0xb6, 0x0, &(0x7f0000000000)) 05:45:04 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000001c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x402c5342, &(0x7f0000000200)) 05:45:04 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xe3, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:45:04 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xe3, &(0x7f0000000080), &(0x7f0000000000)=0x4) [ 370.606602][ T23] audit: type=1400 audit(1677995104.685:412): avc: denied { setopt } for pid=19967 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 05:45:05 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r0, 0x10d, 0xb6, &(0x7f0000000080), 0x0) 05:45:05 executing program 3: syz_emit_ethernet(0x5e, &(0x7f0000000080)={@link_local, @remote, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "816dde", 0x28, 0x2c, 0x0, @dev, @mcast2, {[], @ndisc_redir={0x89, 0x0, 0x0, '\x00', @local, @mcast1}}}}}}, 0x0) 05:45:05 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000240)=0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) accept4$vsock_stream(r2, &(0x7f0000000100)={0x28, 0x0, 0x2711, @host}, 0x10, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r3, 0x8918, &(0x7f0000000080)={@loopback={0x0, 0x3fc}, 0x0, r4}) 05:45:05 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0xa, 0x0, &(0x7f0000000300)) 05:45:05 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, 0x0, 0x0) getsockopt$inet_int(r1, 0x10d, 0xc0, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:45:05 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, 0x0, 0x0) getsockopt$inet_int(r1, 0x10d, 0xe3, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:45:05 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000001c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0xc02c5341, &(0x7f0000000000)) 05:45:05 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000001c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x40bc5311, &(0x7f0000000000)={0x80, 0x1, 'client0\x00', 0x0, "80da684950b2eed6", "a7bffd6c0daf37de44801a3078a26f97a610bf8b88249936888dcc2a4c9f44e9"}) 05:45:05 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r0, 0x10d, 0xb6, &(0x7f0000000080), 0x0) 05:45:05 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, 0x0, 0x0) getsockopt$inet_int(r1, 0x10d, 0xe3, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:45:05 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, 0x0, 0x0) getsockopt$inet_int(r1, 0x10d, 0xc0, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:45:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000080)=""/212, 0x1a, 0xd4, 0x1}, 0x20) 05:45:05 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r0, 0x10d, 0xb6, &(0x7f0000000080), 0x0) 05:45:05 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x6, 0x0, &(0x7f0000000300)) 05:45:06 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000240)=0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000080)={@loopback={0x0, 0x3fc}, 0x0, r3}) 05:45:06 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, 0x0, 0x0) getsockopt$inet_int(r1, 0x10d, 0xc0, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:45:06 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, 0x0, 0x0) getsockopt$inet_int(r1, 0x10d, 0xe3, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:45:06 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x7, 0x0, &(0x7f0000000300)) 05:45:06 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000001c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc08c5334, &(0x7f0000000200)) 05:45:06 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1b, 0x0, &(0x7f0000000300)) 05:45:06 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1e, 0x0, &(0x7f0000000300)) 05:45:06 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x76, 0x0, &(0x7f0000000300)) 05:45:06 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xc0, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:45:06 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xe3, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:45:06 executing program 5: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000140), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0bc5351, &(0x7f0000000180)={0x40, 0x0, 'client1\x00', 0x0, "4fdb89d09827b8f8", "c53dbf7565feb90460bd510467696db5af6e2a679902982f52e4e26f38857b53"}) 05:45:06 executing program 4: futex(&(0x7f0000000140), 0xd, 0x0, &(0x7f00000001c0), 0x0, 0x0) 05:45:07 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000240)=0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000080)={@loopback={0x0, 0x3fc}, 0x0, r3}) 05:45:07 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xe3, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:45:07 executing program 3: semctl$SEM_STAT_ANY(0x0, 0x0, 0x14, &(0x7f00000000c0)=""/147) 05:45:07 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0xd, 0x0, &(0x7f0000000300)) 05:45:07 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xc0, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:45:07 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000180)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_NOTIFY_RADAR(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x1c, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}}, 0x1c}}, 0x0) 05:45:07 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000000c0)={@local, @multicast2, 0x0, 0xb, [@private, @remote, @broadcast, @broadcast, @empty, @multicast2, @local, @local, @private, @remote, @local]}, 0x3c) 05:45:07 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0xf, 0x0, &(0x7f0000000300)) 05:45:07 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xc0, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:45:07 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xe3, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:45:07 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000140)={{{@in=@empty, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@private}, 0x0, @in=@multicast2}}, 0xe8) 05:45:07 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(0xffffffffffffffff, 0x10d, 0xc0, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:45:08 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000240)=0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000080)={@loopback={0x0, 0x3fc}, 0x0, r3}) 05:45:08 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x3, 0x0, 0xe82) 05:45:08 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x3, 0x0, &(0x7f0000000300)) 05:45:08 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000080)=""/212, 0x32, 0xd4, 0x1}, 0x20) 05:45:08 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(0xffffffffffffffff, 0x10d, 0xc0, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:45:08 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(0xffffffffffffffff, 0x10d, 0xe3, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:45:08 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x5, 0xfffff800, 0x0, 0x42}, 0x48) 05:45:08 executing program 5: futex(&(0x7f0000000000)=0x1, 0xb, 0x0, &(0x7f0000000080), &(0x7f00000000c0), 0x0) 05:45:08 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x6, 0x0, &(0x7f0000000300)=0x84) 05:45:08 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(0xffffffffffffffff, 0x10d, 0xc0, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:45:08 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(0xffffffffffffffff, 0x10d, 0xe3, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:45:08 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000021c0)={&(0x7f0000002100)={0x14, r1, 0x1, 0x0, 0x0, {{0x7}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) 05:45:08 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000240)=0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000080)={@loopback={0x0, 0x3fc}, 0x0, r3}) 05:45:08 executing program 4: futex(&(0x7f0000000000), 0x5, 0x0, 0x0, &(0x7f00000000c0), 0xfffffff2) 05:45:08 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x73, 0x0, &(0x7f0000000300)) 05:45:08 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0x0, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:45:08 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(0xffffffffffffffff, 0x10d, 0xe3, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:45:08 executing program 5: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000001c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r0, 0xc0105303, &(0x7f0000000140)={0xff}) 05:45:09 executing program 3: syz_io_uring_setup(0x4e0a, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240), &(0x7f0000000280)) 05:45:09 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0x0, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:45:09 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0x0, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:45:09 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000240)=0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) r2 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000080)={@loopback={0x0, 0x3fc}, 0x0, r3}) 05:45:09 executing program 5: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000001c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r0, 0xc0105303, &(0x7f0000000140)={0xff}) 05:45:09 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000240)=0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000080)={@loopback={0x0, 0x3fc}, 0x0, r2}) [ 374.903758][T20106] futex_wake_op: syz-executor.4 tries to shift op by -1; fix this program 05:45:09 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0x0, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:45:09 executing program 4: r0 = socket$rxrpc(0x21, 0x2, 0x2) sendto$rxrpc(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@in4={0x21, 0x0, 0x2, 0x10, {0x3, 0x0, @broadcast}}, 0x24) 05:45:09 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0x0, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:45:09 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xd2, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:45:09 executing program 5: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000001c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r0, 0xc0105303, &(0x7f0000000140)={0xff}) 05:45:09 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000240)=0x1) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000080)={@loopback={0x0, 0x3fc}, 0x0, r2}) 05:45:09 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0x0, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:45:09 executing program 5: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000001c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r0, 0xc0105303, &(0x7f0000000140)={0xff}) 05:45:09 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xc0, 0x0, &(0x7f0000000000)) 05:45:09 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000080)={@loopback={0x0, 0x3fc}, 0x0, r1}) 05:45:09 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000080)=""/212, 0x1a, 0xd4, 0x1}, 0x20) 05:45:09 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xd2, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:45:09 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000080)={@loopback={0x0, 0x3fc}, 0x0, r1}) 05:45:09 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000100)={{0x2, 0x0, @multicast1}, {}, 0x4, {0x2, 0x0, @loopback}, 'ip6gre0\x00'}) 05:45:09 executing program 5: ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000140)={0xff}) 05:45:09 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xe3, 0x0, &(0x7f0000000000)) 05:45:09 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xd2, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:45:09 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xc0, 0x0, &(0x7f0000000000)) 05:45:09 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000001c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x40086602, &(0x7f0000000000)={0x80, 0x0, 'client0\x00', 0x0, "80da684950b2eed6", "a7bffd6c0daf37de44801a3078a26f97a610bf8b88249936888dcc2a4c9f44e9"}) 05:45:09 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000080)={@loopback={0x0, 0x3fc}, 0x0, r1}) 05:45:09 executing program 5: ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000140)={0xff}) 05:45:09 executing program 5: ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000140)={0xff}) 05:45:09 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xc0, 0x0, &(0x7f0000000000)) 05:45:09 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xd2, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:45:09 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000080)={@loopback={0x0, 0x3fc}, 0x0, r1}) 05:45:09 executing program 4: socketpair(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000c40)={'tunl0\x00', &(0x7f0000000b40)={'gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast2, @dev={0xac, 0x14, 0x14, 0x30}}}}}) 05:45:09 executing program 5: r0 = openat$sndseq(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r0, 0xc0105303, &(0x7f0000000140)={0xff}) 05:45:09 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xe3, 0x0, &(0x7f0000000000)) [ 375.128599][ T23] audit: type=1400 audit(1677995109.205:413): avc: denied { setattr } for pid=20157 comm="syz-executor.4" path="/dev/snd/seq" dev="devtmpfs" ino=230 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sound_device_t tclass=chr_file permissive=1 05:45:09 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xc0, &(0x7f0000000080), 0x0) 05:45:09 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0xd2, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:45:09 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0xd2, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:45:09 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$sock(r0, &(0x7f0000000000), 0x4000000000001a2, 0x0) 05:45:09 executing program 5: r0 = openat$sndseq(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r0, 0xc0105303, &(0x7f0000000140)={0xff}) 05:45:09 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000080)={@loopback={0x0, 0x3fc}, 0x0, r1}) 05:45:09 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xc0, &(0x7f0000000080), 0x0) 05:45:09 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xe3, 0x0, &(0x7f0000000000)) 05:45:09 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0xd2, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:45:09 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000080)={@loopback={0x0, 0x3fc}, 0x0, r1}) 05:45:09 executing program 5: r0 = openat$sndseq(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r0, 0xc0105303, &(0x7f0000000140)={0xff}) 05:45:09 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xc0, &(0x7f0000000080), 0x0) 05:45:09 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(0xffffffffffffffff, 0x10d, 0xd2, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:45:09 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xe3, &(0x7f0000000080), 0x0) 05:45:09 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000980)=@broute={'broute\x00', 0x20, 0x5, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=[{}, {0x0, '\x00', 0x1}, {0x0, '\x00', 0x3}]}, 0x108) 05:45:10 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x23, 0x0, 0xe82) 05:45:10 executing program 5: openat$sndseq(0xffffffffffffff9c, &(0x7f00000001c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000140)={0xff}) 05:45:10 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xe3, &(0x7f0000000080), 0x0) 05:45:10 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(0xffffffffffffffff, 0x10d, 0xd2, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:45:10 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r0, &(0x7f0000001240)={&(0x7f0000000fc0)=@hci, 0x80, 0x0, 0x40000}, 0x0) 05:45:10 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000080)={@loopback={0x0, 0x3fc}, 0x0, r1}) 05:45:10 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(0xffffffffffffffff, 0x10d, 0xd2, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:45:10 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000440), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_ADD(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}]}, 0x24}}, 0x0) 05:45:10 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r0, 0x200007) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xe3, &(0x7f0000000080), 0x0) 05:45:10 executing program 5: openat$sndseq(0xffffffffffffff9c, &(0x7f00000001c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000140)={0xff}) 05:45:10 executing program 1: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f00000000c0)={{0x0, 0x40}}) 05:45:10 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x10, 0x0, &(0x7f0000000300)) 05:45:10 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000080)={@loopback={0x0, 0x3fc}, 0x0, r1}) 05:45:10 executing program 5: openat$sndseq(0xffffffffffffff9c, &(0x7f00000001c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000140)={0xff}) 05:45:10 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x9, 0x0, &(0x7f0000000300)) 05:45:10 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xd2, &(0x7f0000000080), &(0x7f0000000000)=0x4) 05:45:10 executing program 4: r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x11e, 0x0, 0x0, &(0x7f0000001100)) 05:45:10 executing program 1: r0 = semget$private(0x0, 0x4, 0x0) semop(r0, &(0x7f0000000000)=[{0x0, 0x8}, {0x3}, {0x0, 0x2}], 0x3) 05:45:10 executing program 2: r0 = socket$rxrpc(0x21, 0x2, 0x2) sendto$rxrpc(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@in4={0x21, 0x0, 0x3, 0x10, {0x2, 0x0, @broadcast}}, 0x24) 05:45:10 executing program 1: pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x16, 0x0, 0x3, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r0, 0x0, 0x5}, 0x48) 05:45:10 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000080)={@loopback={0x0, 0x3fc}, 0x0, r1}) 05:45:10 executing program 5: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000001c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r0, 0xc0105303, 0x0) 05:45:10 executing program 4: syz_io_uring_setup(0x64fb, &(0x7f0000000480), &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000500), &(0x7f0000000540)) syz_io_uring_setup(0x44c0, &(0x7f0000002e40), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000002ec0), &(0x7f0000002f00)) 05:45:10 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8}]}]}, 0x20}}, 0x0) 05:45:10 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x29, 0x22, 0x0, 0x300) 05:45:10 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000080)={@loopback={0x0, 0x3fc}, 0x0, r1}) 05:45:10 executing program 5: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000001c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r0, 0xc0105303, 0x0)