87700][ T3702] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 180.208411][ T37] Bluetooth: hci1: command 0x0409 tx timeout [ 180.218642][ T37] Bluetooth: hci2: command 0x0409 tx timeout [ 180.238541][ T3703] team0: Port device team_slave_0 added [ 180.250697][ T3703] team0: Port device team_slave_1 added [ 180.284749][ T52] Bluetooth: hci3: command 0x0409 tx timeout [ 180.400959][ T3700] device hsr_slave_0 entered promiscuous mode [ 180.408432][ T3700] device hsr_slave_1 entered promiscuous mode [ 180.434783][ T172] Bluetooth: hci0: command 0x0409 tx timeout [ 180.442446][ T3703] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 180.448920][ T3703] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 180.475743][ T3703] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 180.503415][ T3702] device hsr_slave_0 entered promiscuous mode [ 180.511590][ T3702] device hsr_slave_1 entered promiscuous mode [ 180.520816][ T3702] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 180.529129][ T3702] Cannot create hsr debugfs directory [ 180.536847][ T3703] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 180.551043][ T3703] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 180.591200][ T3703] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 180.707436][ T3701] bridge0: port 1(bridge_slave_0) entered blocking state [ 180.720641][ T3701] bridge0: port 1(bridge_slave_0) entered disabled state [ 180.732095][ T3701] device bridge_slave_0 entered promiscuous mode [ 180.741818][ T3701] bridge0: port 2(bridge_slave_1) entered blocking state [ 180.751731][ T3701] bridge0: port 2(bridge_slave_1) entered disabled state [ 180.766358][ T3701] device bridge_slave_1 entered promiscuous mode [ 180.914520][ T3703] device hsr_slave_0 entered promiscuous mode [ 180.924417][ T3703] device hsr_slave_1 entered promiscuous mode [ 180.935245][ T3703] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 180.946056][ T3703] Cannot create hsr debugfs directory [ 181.024293][ T3701] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 181.041884][ T3701] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 181.167765][ T3701] team0: Port device team_slave_0 added [ 181.183247][ T3701] team0: Port device team_slave_1 added [ 181.314012][ T3701] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 181.324298][ T3701] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 181.354118][ T3701] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 181.401885][ T3701] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 181.411925][ T3701] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 181.446915][ T3701] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 181.636101][ T3701] device hsr_slave_0 entered promiscuous mode [ 181.652500][ T3701] device hsr_slave_1 entered promiscuous mode [ 181.660797][ T3701] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 181.675653][ T3701] Cannot create hsr debugfs directory [ 181.871899][ T3702] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 181.908117][ T3702] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 181.931903][ T3702] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 181.965628][ T3702] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 181.988901][ T3700] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 182.019635][ T3700] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 182.034342][ T3700] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 182.052457][ T3700] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 182.133127][ T3703] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 182.147026][ T3703] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 182.158340][ T3703] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 182.171276][ T3703] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 182.275748][ T40] Bluetooth: hci1: command 0x041b tx timeout [ 182.285416][ T27] Bluetooth: hci2: command 0x041b tx timeout [ 182.299003][ T3701] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 182.319911][ T3701] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 182.347816][ T3701] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 182.362489][ T3701] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 182.364850][ T27] Bluetooth: hci3: command 0x041b tx timeout [ 182.399715][ T3702] 8021q: adding VLAN 0 to HW filter on device bond0 [ 182.453828][ T3700] 8021q: adding VLAN 0 to HW filter on device bond0 [ 182.478016][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 182.502841][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 182.516885][ T27] Bluetooth: hci0: command 0x041b tx timeout [ 182.520754][ T3702] 8021q: adding VLAN 0 to HW filter on device team0 [ 182.567048][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 182.576889][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 182.588782][ T52] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.596363][ T52] bridge0: port 1(bridge_slave_0) entered forwarding state [ 182.605309][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 182.618528][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 182.631973][ T52] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.641131][ T52] bridge0: port 2(bridge_slave_1) entered forwarding state [ 182.658669][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 182.670797][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 182.685244][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 182.697858][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 182.710115][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 182.721485][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 182.743177][ T3703] 8021q: adding VLAN 0 to HW filter on device bond0 [ 182.766862][ T3742] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 182.779160][ T3742] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 182.795708][ T3742] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 182.806546][ T3742] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 182.818377][ T3742] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 182.834717][ T3742] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 182.855808][ T3700] 8021q: adding VLAN 0 to HW filter on device team0 [ 182.874722][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 182.887500][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 182.909261][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 182.921273][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 182.938176][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 182.951554][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 182.960048][ T27] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.967244][ T27] bridge0: port 1(bridge_slave_0) entered forwarding state [ 182.982560][ T3703] 8021q: adding VLAN 0 to HW filter on device team0 [ 182.996058][ T3702] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 183.020487][ T3740] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 183.034405][ T3740] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 183.047366][ T3740] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 183.058326][ T3740] bridge0: port 2(bridge_slave_1) entered blocking state [ 183.066510][ T3740] bridge0: port 2(bridge_slave_1) entered forwarding state [ 183.084100][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 183.108919][ T3745] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 183.121028][ T3745] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 183.131743][ T3745] bridge0: port 1(bridge_slave_0) entered blocking state [ 183.140735][ T3745] bridge0: port 1(bridge_slave_0) entered forwarding state [ 183.165817][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 183.175902][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 183.186891][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 183.196481][ T27] bridge0: port 2(bridge_slave_1) entered blocking state [ 183.205309][ T27] bridge0: port 2(bridge_slave_1) entered forwarding state [ 183.213581][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 183.224289][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 183.260360][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 183.275638][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 183.288062][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 183.303987][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 183.315071][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 183.351284][ T3702] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 183.360954][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 183.370635][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 183.380926][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 183.391631][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 183.403612][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 183.417838][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 183.428529][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 183.452501][ T38] audit: type=1400 audit(1645240017.985:96): avc: denied { module_request } for pid=3702 comm="syz-executor.0" kmod="netdev-xfrm0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 183.454132][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 183.502989][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 183.522277][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 183.536859][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 183.552739][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 183.565045][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 183.579506][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 183.595204][ T3700] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 183.639233][ T3703] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 183.655678][ T3703] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 183.665346][ T38] audit: type=1400 audit(1645240018.205:97): avc: denied { sys_module } for pid=3702 comm="syz-executor.0" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 183.669339][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 183.711314][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 183.730747][ T3701] 8021q: adding VLAN 0 to HW filter on device bond0 [ 183.758649][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 183.774932][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 183.789553][ T3700] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 183.806757][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 183.817498][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 183.837290][ T3701] 8021q: adding VLAN 0 to HW filter on device team0 [ 183.849430][ T3742] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 183.862976][ T3742] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 183.881840][ T3703] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 183.906075][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 183.918511][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 183.930452][ T32] bridge0: port 1(bridge_slave_0) entered blocking state [ 183.938863][ T32] bridge0: port 1(bridge_slave_0) entered forwarding state [ 183.950559][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 183.974947][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 183.987421][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 183.998812][ T27] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.008540][ T27] bridge0: port 2(bridge_slave_1) entered forwarding state [ 184.019584][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 184.032020][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 184.044194][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 184.056524][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 184.091045][ T3702] device veth0_vlan entered promiscuous mode [ 184.104317][ T3745] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 184.116085][ T3745] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 184.139981][ T3745] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 184.150552][ T3745] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 184.168435][ T3745] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 184.180644][ T3745] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 184.196992][ T3745] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 184.207248][ T3745] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 184.218852][ T3745] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 184.248312][ T3702] device veth1_vlan entered promiscuous mode [ 184.258768][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 184.271083][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 184.282817][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 184.299298][ T3701] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 184.320043][ T3701] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 184.342655][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 184.352536][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 184.354977][ T3740] Bluetooth: hci2: command 0x040f tx timeout [ 184.375198][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 184.382410][ T3740] Bluetooth: hci1: command 0x040f tx timeout [ 184.433638][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 184.434961][ T3740] Bluetooth: hci3: command 0x040f tx timeout [ 184.451617][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 184.463990][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 184.475778][ T38] audit: type=1400 audit(1645240019.015:98): avc: denied { read } for pid=3107 comm="syslogd" name="log" dev="sda1" ino=1125 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 184.477730][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 184.530769][ T3700] device veth0_vlan entered promiscuous mode [ 184.554759][ T3702] device veth0_macvtap entered promiscuous mode [ 184.576744][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 184.586455][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 184.595411][ T3740] Bluetooth: hci0: command 0x040f tx timeout [ 184.597491][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 184.612423][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 184.619717][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 184.629033][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 184.644751][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 184.652561][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 184.661582][ T50] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 184.679027][ T3700] device veth1_vlan entered promiscuous mode [ 184.688548][ T3702] device veth1_macvtap entered promiscuous mode [ 184.709391][ T3701] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 184.725832][ T3703] device veth0_vlan entered promiscuous mode [ 184.735953][ T3742] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 184.749565][ T3742] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 184.761541][ T3742] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 184.771080][ T3742] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 184.792499][ T3742] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 184.801717][ T3742] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 184.812670][ T3742] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 184.836279][ T3703] device veth1_vlan entered promiscuous mode [ 184.848533][ T3742] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 184.867206][ T3702] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 184.883176][ T3702] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 184.897336][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 184.909689][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 184.920637][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 184.930841][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 184.953262][ T3700] device veth0_macvtap entered promiscuous mode [ 184.967575][ T3702] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 184.978852][ T3702] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 184.990246][ T3702] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 185.001993][ T3702] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 185.016827][ T3765] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 185.027983][ T3765] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 185.043497][ T3700] device veth1_macvtap entered promiscuous mode [ 185.067849][ T3765] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 185.078390][ T3765] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 185.123853][ T3700] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 185.138562][ T3700] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 185.151994][ T3700] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 185.161577][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 185.172053][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 185.184450][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 185.195508][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 185.235429][ T3703] device veth0_macvtap entered promiscuous mode [ 185.269241][ T3745] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 185.290965][ T3745] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 185.304409][ T3745] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 185.323275][ T3701] device veth0_vlan entered promiscuous mode [ 185.366490][ T3700] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 185.380350][ T3700] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 185.393973][ T3700] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 185.405173][ T3742] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 185.415872][ T3742] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 185.427424][ T3742] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 185.438849][ T3742] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 185.452098][ T3703] device veth1_macvtap entered promiscuous mode [ 185.479375][ T3701] device veth1_vlan entered promiscuous mode [ 185.487618][ T3742] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 185.496781][ T3742] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 185.507516][ T3742] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 185.516494][ T3742] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 185.530250][ T3700] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 185.548410][ T3700] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 185.561644][ T3700] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 185.574788][ T3700] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 185.635343][ T3734] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 185.653405][ T3734] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 185.672242][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 185.684116][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 185.713159][ T3703] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 185.730217][ T3703] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 185.744087][ T3703] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 185.757237][ T3703] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 185.773897][ T3703] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 185.788471][ T3703] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 185.802228][ T3703] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 185.819030][ T3703] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 185.833582][ T3703] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 185.849091][ T3703] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 185.877156][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 185.887250][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 185.898646][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 185.910360][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 185.921019][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 185.931839][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 185.948882][ T3701] device veth0_macvtap entered promiscuous mode [ 185.982210][ T3734] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 185.995292][ T3734] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 186.012657][ T3703] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 186.024287][ T3703] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 186.037203][ T3703] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 186.048552][ T3703] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 186.062375][ T3701] device veth1_macvtap entered promiscuous mode [ 186.073941][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 186.087274][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 186.104390][ T3734] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 186.115882][ T38] audit: type=1400 audit(1645240020.645:99): avc: denied { mounton } for pid=3702 comm="syz-executor.0" path="/dev/binderfs" dev="devtmpfs" ino=2381 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 186.116852][ T3734] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 186.149051][ T38] audit: type=1400 audit(1645240020.645:100): avc: denied { mount } for pid=3702 comm="syz-executor.0" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 186.234193][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 186.285645][ T3722] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 186.294917][ T3722] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 186.297999][ T3701] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 186.318655][ T38] audit: type=1400 audit(1645240020.845:101): avc: denied { read write } for pid=3702 comm="syz-executor.0" name="loop0" dev="devtmpfs" ino=656 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 186.324264][ T3701] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 03:07:00 executing program 0: r0 = socket$can_raw(0xa, 0x3, 0x1) sendmsg$NL80211_CMD_LEAVE_OCB(r0, &(0x7f00000002c0)={&(0x7f0000000180), 0xc, &(0x7f0000000240)={0x0}}, 0x0) [ 186.354542][ T38] audit: type=1400 audit(1645240020.845:102): avc: denied { open } for pid=3702 comm="syz-executor.0" path="/dev/loop0" dev="devtmpfs" ino=656 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 186.382116][ T3701] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 186.392601][ T38] audit: type=1400 audit(1645240020.845:103): avc: denied { ioctl } for pid=3702 comm="syz-executor.0" path="/dev/loop0" dev="devtmpfs" ino=656 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 03:07:00 executing program 0: openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$can_raw(0xa, 0x3, 0x1) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, 0x0) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, &(0x7f0000000180)) syz_open_dev$audion(0xfffffffffffffffc, 0x6582bbfb, 0xad540) [ 186.405159][ T3701] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 186.430448][ T38] audit: type=1400 audit(1645240020.945:104): avc: denied { create } for pid=3776 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 186.446850][ T27] Bluetooth: hci1: command 0x0419 tx timeout 03:07:01 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20, @local}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000940)=ANY=[], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x80) [ 186.446957][ T27] Bluetooth: hci2: command 0x0419 tx timeout [ 186.454821][ T3701] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 186.476356][ T38] audit: type=1400 audit(1645240020.945:105): avc: denied { write } for pid=3776 comm="syz-executor.0" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 186.482595][ T3701] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 186.514541][ T3781] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 186.515209][ T27] Bluetooth: hci3: command 0x0419 tx timeout [ 186.536073][ T3701] batman_adv: batadv0: Interface activated: batadv_slave_0 03:07:01 executing program 0: socket$can_raw(0xa, 0x3, 0x1) [ 186.593056][ T3746] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 186.604812][ T3746] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 186.615276][ T3746] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 186.642030][ T3701] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 186.654710][ T3701] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 186.668242][ T3701] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 186.680861][ T3740] Bluetooth: hci0: command 0x0419 tx timeout [ 186.685161][ T3701] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 186.701574][ T3701] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 186.717690][ T3701] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 186.737562][ T3701] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 186.785137][ T3740] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 186.797611][ T3740] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 186.816520][ T3701] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 186.830175][ T3701] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 186.842884][ T3701] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 186.854967][ T3701] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 186.894191][ T3722] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 186.906222][ T3722] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 186.932066][ T3788] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 186.978114][ T3722] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 186.993322][ T3722] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 187.009766][ T3788] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 187.031372][ T3722] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 187.045447][ T3722] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 187.072142][ T3790] syz-executor.1 uses obsolete (PF_INET,SOCK_PACKET) [ 187.082716][ T3788] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 187.083804][ T3790] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.1'. 03:07:01 executing program 1: shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000000)=""/67) 03:07:01 executing program 0: r0 = socket$can_raw(0xa, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x894a, &(0x7f0000000080)={'wlan0\x00'}) 03:07:01 executing program 2: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan1\x00'}) [ 187.117218][ T3722] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 187.146701][ T3722] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 187.164781][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 03:07:01 executing program 3: openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$audion(0xfffffffffffffffc, 0x0, 0xad540) 03:07:01 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = dup(r0) write$UHID_INPUT(r1, &(0x7f0000000000)={0xe, {"a2e3ad21ed6b52f99cfbf4c087f750b4d04fe7ff7fc6e5539b3c6e0a3b546a9b374694370890e0878fdb1ac6e7049b67b4956c409a472a5b47f3988f7ef31952a981ffe8d178708c523c921b1b9b3d0a169b71d336cd3b78130daa61d8e809ea882f5802b77f07227227b7ba67e0e78657a6f5c2a874e62a9ccdc0d31a0c9f318c0da1993bd160e233df4a62179c6f309f4cff7738596ecae8707ce065cd5b91cd0ae193973735b36d5b1b63e91c00305d3f46635eb016d5b1dda98e2d749be7bd1df1fb3b231fdcdb5075a9aaa1b469c3090000000000000075271b286329d169934288fd789aa37d6e98b224fd44b65b31334ffc55cc82cd3ac32ecd03aded6f9081b4da0d8b38f3cd4498bee800490841bdb114f6b76383709d8f5c55432a909fda039aec54a1236e80f6a8abadea7662496bddbb42be6bfb2f17959d1f416e56c71bfc31870262f5e801119242ca5b6bfc821e7e20002451138e645bb80c617669314e2fbe70de98ec76a9e40dad47f36fd9f7d0d42a4b5f1185ccdcf16ff46295d8a0fa17713cf39fe23491237c08822dec110911e893d0a8c4f677747abc360934b82910ff85bfd995083bba2987b67399eac427d145d546a40b9f6ff14ac488ec130fb3850a27afc953854a642c57519544ae15a7e454dea05918b4124351601611c8f11baa500a3621c56cea8d20ff911a0c41db6ebe8cac64f17679141d54b34bbc9963ac4f4bb3309603f1d4ab966203861b5b15a841f2b575a8bd0d78248ebe4d9a80002695104f674c2431dca141fae269cab70e9a66f3c3a9a63e9639e1f59c0ede26c6b5d74b078a5e15c31634e5ae098ce9ee70771aaa18119a867e1088334975e9f73483b6a62fa678ca14ffd9f9db2a7869d85864056526f889af43a6000200000000000065d5e880572286522449df466c632b356f243f989cce3803f465e41e610c20d80421d653a5120000008213b704c7fb082ff27590678ef9f190bae979babc7041d860420c5664ba7921b14dc1db8892fd32d0ad7bc946813591ad8deff4b05f60cea0da7710ac0004000000008000bea37ce0d0d4aa202fef5952a5391fd5615d429a04a689b83c7068ae949ed06e288e810bac9c76600025907f8ea2e2f05dd3318271a1f5f8528f227e79c13800000000492f21579d2c15b8c70cdb1c332d86d87341432750861ec2bc3451edca194b221cfec4603d276bbaa1dfa6d4fb8a48a76eefc9a9a0270e4c10d64cd5a62427264f2360fe763c43470833ac96c45f357cbbaba8f1b1fdcc7cbb61a7cdb9744ed7f9129aede2be21ccfdc4e9134f8684b3a4f354da9a795e96334e207dff70f1988037b2ed3aaf575c0b88d8f146684078416d59fdee5307000000d92dad99dac44c3f0008047096a44060bebc2420aed92fa9b6578b4779415d97b9a6d6d5495c118045651cf41c2fc4f4162b987b80c3e001cd34e5c92f76cc4c24eeb8bc4e9ac2aed9e53803ed0ca4ae3a9737d214060005ea6f1783e287b3bee96e3a7288afe2fdfaa78d1f48c13b64df07847754b8400daaa69bf5c8f48fe4eae9ca1207e78283cd0b20ceb360c7e658828163e2d25c4aa348561f927e88f63aa70e73a5e69b3df3495903f06572e1e007fa55a2999f596d067312f5779e8dbfdcf3427138f3d444d2639a10477f9bec4b0bbb6e3c04be68981f392203dd0ee3ef478e67d1d7232f17696294378ce716dacfc5e3e03cfffffffffffff001034ef655b253ca509383815b1b6fc6522d4e2d48604665fde2b94cf02b98a269b891abf8ab9c015073014d9e08d4338b8780bdecd436cf0541359bafffa45237f104b96210403b2de9efedfd71af9444e197f47e866101496f42355bc7872c827467cfa5c4e72730d56bd068ed211cf847535edecb7b373f78b095b68441a34cb51682a8ae4d24ad0465f7927f889b813076038e79a7962fb385a882e8020f06c4c2ba1dd5cac7c18876da865d258734dd73583df292892448039ef799cf0630becdcce04579b5561dc825ab829827945e020c1f67ee615f7084a607a7eceb6243378e0610060f02cca4051c2f001edb3d78fb4b5f668dda93aec92a5de203717aa49c2d284acfabe262fccfcbb2b75a2183c4e15a7b6eb65ca8104e1b4da1fbb77ab2fc043aead87c32ab875ee7c2e7b7019c902cd3b43eaeb1a5fb135c0c7dcee8fe6516a328032f88c042891824659e9e94265c803b35ee5f83a2b210520106b8a358b50ab7a1fa89af9c251fe5294b3d1802d5676d95f160ec97b1ad948741b2044642c37b4a6cc6c04effc1672db7e4b68d767d9a7a508ae54a3cd73643de50e8c77d95a3d361c040babb171607caac2a3559ad4f75465f49c0d0ae3716db6e00cb11dbe200000000000000bf70cc77737c3b42aae501b20f7694a00f16e2d0174035a2c22656dc29880acebd2ba3a504767b6b45a45957f24d758ed024b3849c11d412a2a03b4047497022d9c30e23ef4df5c89644f48bb536f7945b59d7bcddff754413d135273ea8e75f22f216c6b9990ae71806f2c00b4025c48b75c0f71c497579773767075428067e7f16f4dde374f8211fef42cb468e623daf60b3569d462f4f19eacdb3ed70eeebb4483f8fd777d443e8b40426db6fe29068c0ca3d3414442e863a154704b0e51bc664a137b26be719f4f7c9a5678a674dfc95df80b9ce375dd649c8c704e509bd88c8e63d8c7dd67071115c8982ba46af4d6adcc9f68a75b9397b035153faf46366e7205dd8d6f37525c1a0e94610dd94323f6c15d085197149bfd6655548cfd9c52c9711937f79abb1a124f1210465483cd3b2d78378cfb85ed82e7da0f6eb6d279f2ae44369ddb4581c55925d0f6f1ba471eba281f259152f85a654fb39ddff3b484439ff158e7c5419e037f3563c7f93cd54b9094f226e783271e1e5a2a2c10712eab625d64931cdcffe6738d97b9b5ef828ee9fb059fc01af0e79c1e14b1d25988c69a39973132f02768f7971d31488b8658a20878b7c1dd7ba02fc42939dde3d4a3339a65d507dc59c51097b40517705da56e9ebf0afa53282bf86dbb58c548069ff6eb95aade7cc66d7bbef724779ca1f731b3346ff177050373d79ff7b3e7f9bc0c1b4b266a8878b90baaa039d3e3b63979ac3df6e6f4859afd50238c7547a39b60810938044ae185d2ba3e00a4e73676864d0270d81eaee5ee6cf1d0ab378dd4dd891e937c2ea5410e05130935e00785ec27e923911fab964c271556527697b52160687461602f88df165d884b36ec2b6c25a2f362815687e9ddbfb96d6861aca47da73d6f3144345f48843dd014e5c5ad8fe995754bd9cf32fce1e7027132f2082fb0a30b9deae84bed4b28045634073c9c58c89d9e99c81769177c6d594f88a4facfd4c735a20307c737afae5336651b1b9bd522d60399473296b831dbd933d93994ba3064279b10ea0c5833f41f157ea2302993dbe433b1aa3a3766d5439020484f4113c4c859465c3b415c3432f81db8719539d5bf372aaaea1cc43a6c5cbe59758bf0129165895ac4b008e595f437491d87abed02cefcd9db53d94d02dae17b118e5d6787463181f4b87c10772d2b13f7809959bc0488506dbd17ca51055f2f416a44fe180d2d50c312cca7cb14a2bdc331f57a9817139a206fc76d57234ffff2de20a4b8e3737fbb42913777c06376f799eba367e21f94ca598705f5dcb767d6f84fad6b0f6095e53c4c4234d0c1fbe434f6ab8f43c0013ee93b83946ee7759e89d7bdd1a32d7b3110b937fe43c06d21e35810d8fe98b0000ea8aa12bc8716eefc5c97c45ac33eeec964c5214bc3a9359bdea1cccab94f15e36319cb34ebcacedb82c2ed3de5a8a8f0011e8f74e82d7f96093530e76692839d7961939adfdeeeaff19d11efcafb6d546fef271e89d6cc238a081ff58cefcce3fbf4625a7e7de40e42e07b34449e15e065cc7348663a52190202c7af288a4510de03dab19d26285eda89156d50dd385a60333ba5bbf3dd6d6080cafccf8a97406bb6b68a1f0c4549820a73c880f475f732ae00398e8bd1f4908b7807fb33b72685ec37a2d3f766413a60459516246e5a1d998a2017aef0948a68cb0b3e35cb80dd349e891aef595dc4d470e8ac32a308e15fc37d06aeac289c0523f483e1ff7408c60edddab652f2ef91d4f2b01987b0f46da034e5c3f745a7ee8101a3934c54e24b48ec0275e2d068edc746b0827cbf652f406c6b95f2722e58c050400ce2126596e1cd7655b904801784c416b22f73d324678e2724f43f1fe687c7e8a60c28b82b6528341b648cdd56fed7cdcbb1575912d5ecd36de00bca0b7427d8392c6289455e8f8d2ab2242729251ae033a9e02210e62df0546a74b333a1c48f95fd54acb5741259e8c5488efeee327415cc19451432c6f16c27693102a3cd84857cd6586fc5ca9a93eb0145fac0662ff86107f998a8ef7df8aa14046c55b03d3d47f88a8d60f7774a2ee08758897fb411a94b3c2fc5d5f0db42c0456ec014508e5247d33ae6c962d35603ff8454c16f8342856935125102bb784ed714887071f3d998efdd9923c954ab6ce431b63ee356b0c785f2f47b90e29389f22fc5b59a70efaea2bd40195af4486220d702e30bfc43c10ec23ea6283994a7dde4dcb61fea6b651fb1d62458d0741a12830052fcc460db043afe525629b40d7cee658e4cb5e930ed624806c43a006dc9336d07c2b8081c128ad7084c29743bc613bc18f5a38d442768af38041efe03d152ef95ff569e76db2391f4509d7f339d92fdb4a89364949da3932ba5c04c24a560ad80a3ce654578376e599aff3565b1d531f30912b99e6619ebe93cc0b81ea9935fd46edb44a78f615255490a4b621501f2a9e4d24624c4dac9274118c67584f5d374755534d7f68f679c4ff516a9c861a0e7e65868fcb2bf1cb9aea4e05df72279fdb0d2b9e935c5af3cf474bed79dfc248c1f5aea4b8b32c5d295e57079d0fe662a46b7f71cd47744db86c50b704c971d90195c7b2c7439a2d78ccfa79b5fc2bff6bbf840262bf89394b3e6491953264d2700c838fa2c7b34252600c9654e502dcea39cb6bc3eb69992e234b4ca7db2f45858d6284ca6270d6b2f0e58fded8a7b4a302a97bc641df07720ba2b26bbfcc807ca0abb1b44322269c42c5ec68cb068ea88067d905ea917bb03eefdaebdeabf2d0dce80997c915c8949de992587c2cb5fe36d7d3e5db21b094b8b77940b5f07722e47a08d367e5f84c96ec664b72934b33ad61b4f65d77e86abd6859cddf4bbae1f0930462df090000008562ea3511a8065ef028cf12f14dcf6ebecd8d884836174faf1aa609e5f1ee1162dfa13bdc1fa7cfaadba85c72e9758f03a755d0be53f8d2a1dfb1c68cc164b0a0780d971a96ea2c4d4ca0398c2235980a9307b3d5bd3b010a3ad0a5dbed2881a9700af561ac8c7e36bb2fc4c40e9cf96f06817fb903729a7db6ff957697c9ede7885d94ff1aa70826ad01a9b03c37b0969be0daf60af93109eb1dee72e4363f51af62af6fb2a6df3bec89822a7a0b678058fa3fef86faec216eb6992162f8dcbf719c148cd2f9c55f4901203a9a8a2c3e90f3943dbc10360a1a49700d1dfbf66d69f6fbaf506c8bcce8bb0d872a02238926407a4eddd5d0fc5a752f9000", 0x1000}}, 0x1006) 03:07:01 executing program 2: syz_clone(0x2021000, 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000180)="a2") 03:07:01 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$BLKALIGNOFF(r0, 0x127a, &(0x7f0000000080)) 03:07:01 executing program 3: r0 = socket$can_raw(0xa, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8993, &(0x7f0000000080)={'wlan0\x00'}) 03:07:01 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x541b, &(0x7f0000000000)={'wlan1\x00'}) 03:07:01 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000), 0x4, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r0, 0xc0905664, &(0x7f0000000140)={0x0, 0x0, '\x00', @raw_data}) 03:07:01 executing program 1: openat$drirender128(0xffffffffffffff9c, &(0x7f0000000080), 0x481, 0x0) 03:07:01 executing program 3: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, 0x0) 03:07:02 executing program 2: time(&(0x7f0000000600)) 03:07:02 executing program 1: r0 = socket$can_raw(0xa, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x89e1, &(0x7f0000000080)={'wlan0\x00'}) 03:07:02 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = dup(r0) write$UHID_INPUT(r1, &(0x7f0000000000)={0xe, {"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", 0x1000}}, 0x1006) 03:07:02 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'ip6erspan0\x00', 0x2}) io_setup(0x5a72, &(0x7f0000000080)=0x0) io_submit(r1, 0x1, &(0x7f0000001500)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000180)="8731154d", 0x4}]) 03:07:02 executing program 1: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/block/loop0', 0x52240, 0x0) 03:07:02 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x200000000004e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='illinois\x00', 0x9) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc04}], 0x1, &(0x7f0000000200)=""/20, 0x31, 0xd571012c}, 0x0) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[], 0x100000530) 03:07:02 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000001340)=[{0x0}], 0x2000, 0x0) 03:07:02 executing program 1: unshare(0x400) lseek(0xffffffffffffffff, 0x0, 0x0) 03:07:02 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)=ANY=[@ANYBLOB="e40000000107010300000000000000000200000a080005400000000324000780080001400000000308000140fffffffa080001400000000508000240ffffffff540007800800014000000003080002"], 0xe4}}, 0x0) [ 187.688522][ T3834] netlink: 80 bytes leftover after parsing attributes in process `syz-executor.0'. 03:07:02 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) [ 187.699635][ T3834] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.0'. 03:07:02 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x58, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x0}]}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}]}, 0x58}}, 0x0) 03:07:02 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x10200, 0x0) r1 = open(&(0x7f0000000540)='./bus\x00', 0x46000, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) 03:07:02 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x58, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x0}]}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}]}, 0x58}}, 0x0) 03:07:02 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x200000000004e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='illinois\x00', 0x9) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc04}], 0x1, &(0x7f0000000200)=""/20, 0x31, 0xd571012c}, 0x0) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[], 0x100000530) 03:07:02 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x58, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x0}]}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}]}, 0x58}}, 0x0) 03:07:02 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) 03:07:02 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x58, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x0}]}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}]}, 0x58}}, 0x0) 03:07:03 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) 03:07:03 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x58, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x0}]}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}]}, 0x58}}, 0x0) 03:07:03 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) 03:07:03 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x58, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x0}]}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}]}, 0x58}}, 0x0) 03:07:03 executing program 2: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x10200, 0x0) r1 = open(&(0x7f0000000540)='./bus\x00', 0x46000, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) 03:07:03 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x10200, 0x0) r1 = open(&(0x7f0000000540)='./bus\x00', 0x46000, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) 03:07:03 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x58, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x0}]}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}]}, 0x58}}, 0x0) 03:07:03 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) close(r2) [ 189.290645][ T38] kauditd_printk_skb: 23 callbacks suppressed 03:07:03 executing program 3: r0 = dup(0xffffffffffffffff) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x58, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x0}]}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}]}, 0x58}}, 0x0) [ 189.290662][ T38] audit: type=1804 audit(1645240023.825:130): pid=3870 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/syzkaller-testdir1336744605/syzkaller.HbFjRK/7/bus" dev="sda1" ino=1164 res=1 errno=0 [ 189.332547][ T38] audit: type=1800 audit(1645240023.825:131): pid=3870 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=1164 res=0 errno=0 03:07:03 executing program 3: r0 = dup(0xffffffffffffffff) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x58, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x0}]}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}]}, 0x58}}, 0x0) [ 189.374932][ T38] audit: type=1804 audit(1645240023.815:129): pid=3865 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/syzkaller-testdir4198841577/syzkaller.xM92EP/10/bus" dev="sda1" ino=1157 res=1 errno=0 03:07:03 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) close(r2) [ 189.428133][ T38] audit: type=1800 audit(1645240023.825:132): pid=3865 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=collect_data cause=failed(directio) comm="syz-executor.0" name="bus" dev="sda1" ino=1157 res=0 errno=0 03:07:04 executing program 3: r0 = dup(0xffffffffffffffff) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x58, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x0}]}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}]}, 0x58}}, 0x0) 03:07:04 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x58, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x0}]}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}]}, 0x58}}, 0x0) 03:07:04 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) close(r2) 03:07:04 executing program 2: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) 03:07:04 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x4c, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}]}, 0x4c}}, 0x0) 03:07:04 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x58, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x0}]}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}]}, 0x58}}, 0x0) 03:07:04 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) flock(r0, 0x6) 03:07:04 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) 03:07:04 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) r0 = dup(0xffffffffffffffff) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x58, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x0}]}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}]}, 0x58}}, 0x0) 03:07:04 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) flock(r0, 0x6) 03:07:04 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @empty, @val, {@ipv6}}, 0x0) 03:07:04 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) dup(r0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x58, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x0}]}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}]}, 0x58}}, 0x0) 03:07:04 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) flock(r0, 0x6) 03:07:04 executing program 2: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000040)=ANY=[@ANYBLOB="1201000073b6f010cd0ca31053f4000000010902120001000000000904"], 0x0) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000000000)={0x2c, &(0x7f0000000100)=ANY=[@ANYBLOB="200f1e"], 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$cdc_ecm(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) 03:07:04 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) [ 190.369369][ T38] audit: type=1400 audit(1645240024.905:133): avc: denied { read write } for pid=3904 comm="syz-executor.2" name="raw-gadget" dev="devtmpfs" ino=760 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 03:07:04 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) dup(r0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x58, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x0}]}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}]}, 0x58}}, 0x0) 03:07:04 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) flock(r0, 0x6) 03:07:04 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) [ 190.417356][ T38] audit: type=1400 audit(1645240024.905:134): avc: denied { open } for pid=3904 comm="syz-executor.2" path="/dev/raw-gadget" dev="devtmpfs" ino=760 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 190.446406][ T38] audit: type=1400 audit(1645240024.905:135): avc: denied { ioctl } for pid=3904 comm="syz-executor.2" path="/dev/raw-gadget" dev="devtmpfs" ino=760 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 03:07:05 executing program 0: syz_clone(0x49a04500, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x38204000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) 03:07:05 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) dup(r0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x58, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x0}]}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}]}, 0x58}}, 0x0) 03:07:05 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) [ 190.554151][ T38] audit: type=1400 audit(1645240025.085:136): avc: denied { sys_admin } for pid=3913 comm="syz-executor.0" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 190.644976][ T172] usb 7-1: new high-speed USB device number 2 using dummy_hcd [ 190.904787][ T172] usb 7-1: Using ep0 maxpacket: 16 [ 191.025382][ T172] usb 7-1: New USB device found, idVendor=0ccd, idProduct=10a3, bcdDevice=f4.53 [ 191.037290][ T172] usb 7-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 191.058778][ T172] usb 7-1: config 0 descriptor?? [ 191.315592][ T172] usb 7-1: dvb_usb_v2: found a 'Terratec H7' in warm state [ 192.905165][ T172] usb write operation failed. (-71) [ 192.922643][ T172] usb 7-1: dvb_usb_v2: will pass the complete MPEG2 transport stream to the software demuxer [ 192.938249][ T172] dvbdev: DVB: registering new adapter (Terratec H7) [ 192.946787][ T172] usb 7-1: media controller created [ 192.976056][ T172] usb read operation failed. (-71) [ 193.005065][ T172] usb write operation failed. (-71) [ 193.019918][ T172] dvb_usb_az6007: probe of 7-1:0.0 failed with error -5 [ 193.034697][ T172] usb 7-1: USB disconnect, device number 2 03:07:07 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, @val, {@ipv4}}, 0x0) 03:07:07 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, 0x0, 0x0) 03:07:07 executing program 0: mount$fuseblk(0x0, &(0x7f00000000c0)='.\x00', 0x0, 0x0, 0x0) 03:07:07 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) 03:07:08 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000100)={@random="935bdcc667cc", @broadcast, @val, {@ipv6}}, 0x0) 03:07:08 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, 0x0, 0x0) 03:07:08 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) 03:07:08 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, 0x0, 0x0) 03:07:08 executing program 0: pipe2(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$setown(r0, 0x6, 0x0) 03:07:08 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) 03:07:08 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) 03:07:08 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) pipe2(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r3 = dup2(r0, r2) dup2(r3, r1) 03:07:08 executing program 2: syz_emit_ethernet(0x22, &(0x7f0000000000)={@random="935bdcc667cc", @broadcast, @val, {@ipv4}}, 0x0) 03:07:08 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) 03:07:08 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000200)={&(0x7f0000000040)=@abs={0x0, 0x0, 0x3}, 0xfffffffffffffe3b, &(0x7f0000000100)=[{0x0}, {0x0}], 0x2, &(0x7f0000000400)=[@rights, @rights, @rights], 0x78}, 0x0) 03:07:08 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) 03:07:08 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r0, 0xffff, 0x1023, 0x0, 0x0) 03:07:08 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) 03:07:08 executing program 0: syz_emit_ethernet(0x3a, &(0x7f0000000180)={@local, @empty, @val, {@ipv4}}, 0x0) 03:07:08 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) 03:07:08 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r0, 0xffff, 0x200, &(0x7f0000000040), 0x4) 03:07:08 executing program 0: syz_emit_ethernet(0x52, &(0x7f0000001340)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd60054b66001c2b00fe80000000000000000000000000000000000000000000ff"], 0x0) 03:07:08 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) 03:07:08 executing program 2: syz_emit_ethernet(0x26, &(0x7f0000000080)={@local, @broadcast, @val, {@ipv4}}, 0x0) 03:07:08 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) [ 193.667020][ T3971] Zero length message leads to an empty skb 03:07:08 executing program 0: syz_emit_ethernet(0x5e, &(0x7f0000000180)={@random="935bdcc667cc", @broadcast, @val, {@ipv6}}, 0x0) 03:07:08 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$sock_timeval(r0, 0xffff, 0x1005, &(0x7f0000000040)={0x0, 0x9}, 0x10) 03:07:08 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) 03:07:08 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) 03:07:08 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) 03:07:08 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000180)="53c04b9db7fb4641dae50be8e26b0be32f2f82150fb596233dce4bb00738b12c16f8b0c2632ad318da47f9a90689a58f96239b9cb2a97605823fbd155f46df3de8ee5c36a0b18bb73fc0e4a86a6b2d42d4901a1a061411eb5c2cb2c67ba0f7ee3b2f0c698ff8d816dc5a11250fcb20d86944893ce28583b26679862400e88f3fd7b81fc585a18700ef9cb3", 0x8b}], 0x1}, 0x0) recvfrom$unix(r1, &(0x7f00000003c0)=""/139, 0x8b, 0x40, 0x0, 0x0) 03:07:08 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) recvfrom$unix(r1, &(0x7f00000003c0)=""/139, 0x8b, 0x40, 0x0, 0x0) 03:07:08 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) 03:07:08 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x58, 0x2, 0x6, 0x0, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x0}]}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}]}, 0x58}}, 0x0) 03:07:08 executing program 0: syz_emit_ethernet(0x52, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd60054b66001c2b00fe800000000000009700080000000000000000000001"], 0x0) 03:07:08 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x58, 0x2, 0x6, 0x0, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x0}]}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}]}, 0x58}}, 0x0) 03:07:08 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) sendto$unix(r0, &(0x7f0000000040)="fd", 0x1, 0xd, &(0x7f0000000080)=@abs={0x0, 0x0, 0x1}, 0x8) 03:07:08 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x200, 0x8) 03:07:08 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) 03:07:08 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x58, 0x2, 0x6, 0x0, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x0}]}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}]}, 0x58}}, 0x0) 03:07:08 executing program 0: syz_emit_ethernet(0x52, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd60054b66001c2b00fe800000000000009700080000000000000000000001"], 0x0) 03:07:08 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000080)={@local, @random="62dbca400939", @val, {@ipv6}}, 0x0) 03:07:08 executing program 0: syz_emit_ethernet(0x52, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd60054b66001c2b00fe800000000000009700080000000000000000000001"], 0x0) 03:07:08 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x44, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x0}]}]}, 0x44}}, 0x0) 03:07:08 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) 03:07:08 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000200)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0xa, 0x0}, 0x8) 03:07:08 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x44, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x0}]}]}, 0x44}}, 0x0) 03:07:08 executing program 0: syz_emit_ethernet(0x52, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd60054b66001c2b00fe800000000000009700080000000000000000000001"], 0x0) 03:07:08 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) 03:07:08 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x44, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x0}]}]}, 0x44}}, 0x0) 03:07:08 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r1, &(0x7f0000000240)=""/204, 0xcc, 0x0, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f00000000c0)="06", 0x1}], 0x1, 0x0, 0x50}, 0x40e) 03:07:08 executing program 0: msgget(0x3, 0x724) 03:07:08 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) 03:07:08 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) 03:07:08 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x4c, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}]}, 0x4c}}, 0x0) 03:07:08 executing program 0: syz_emit_ethernet(0x12e, &(0x7f0000000080)={@broadcast, @empty, @val, {@ipv6}}, 0x0) 03:07:08 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x4c, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}]}, 0x4c}}, 0x0) 03:07:08 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) 03:07:09 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r0, 0x0, 0x0, 0x41, 0x0, 0x0) 03:07:09 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$sock_int(r0, 0xffff, 0x1002, 0x0, 0x0) 03:07:09 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) 03:07:09 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x4c, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}]}, 0x4c}}, 0x0) 03:07:09 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) pipe2(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$setstatus(r1, 0x4, 0x40) dup2(r0, r2) 03:07:09 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) 03:07:09 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}]}, 0x50}}, 0x0) 03:07:09 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000080)={@broadcast, @empty, @val, {@ipv4}}, 0x0) 03:07:09 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) 03:07:09 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r0, 0x0, &(0x7f0000000280)) 03:07:09 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}]}, 0x50}}, 0x0) 03:07:09 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r1, &(0x7f0000000100)=""/230, 0xe6, 0x802, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f00000000c0)="06", 0x1}], 0x1, 0x0, 0x50}, 0x0) 03:07:09 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) getsockopt$sock_int(r0, 0x1, 0x1e, 0x0, &(0x7f0000000800)) 03:07:09 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) 03:07:09 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}]}, 0x50}}, 0x0) 03:07:09 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) getsockopt$sock_int(r0, 0x1, 0x2b, 0x0, &(0x7f0000000800)) 03:07:09 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) 03:07:09 executing program 0: syz_mount_image$hfsplus(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000540)='./file0\x00', 0x10000, 0x0) 03:07:09 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x0}]}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}]}, 0x50}}, 0x0) 03:07:10 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$bt_hci(r0, 0x0, 0x15, 0x0, &(0x7f0000000100)) 03:07:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000940)=@nl=@unspec, 0x80) 03:07:10 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x0}]}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}]}, 0x50}}, 0x0) 03:07:10 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) 03:07:10 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x894c, 0x0) 03:07:10 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) 03:07:10 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x0}]}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}]}, 0x50}}, 0x0) 03:07:10 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8915, &(0x7f0000000040)={'veth1_to_hsr\x00', {0x2, 0x0, @remote}}) 03:07:10 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) getsockopt$sock_int(r0, 0x1, 0x2d, 0x0, &(0x7f0000000800)) 03:07:10 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$bt_hci(r0, 0x0, 0x4, 0x0, &(0x7f0000000100)) 03:07:10 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x4c, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x0}]}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}]}, 0x4c}}, 0x0) 03:07:10 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) 03:07:10 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f00000003c0)={[{}]}) 03:07:10 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x4c, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x0}]}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}]}, 0x4c}}, 0x0) 03:07:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x0, 0x40002100, 0x0, 0x0) 03:07:10 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) [ 195.967434][ T38] audit: type=1400 audit(1645240030.505:137): avc: denied { mounton } for pid=4105 comm="syz-executor.0" path="/syzkaller-testdir4198841577/syzkaller.xM92EP/40/file0" dev="sda1" ino=1163 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 196.000499][ T4106] hfsplus: unable to find HFS+ superblock 03:07:10 executing program 2: r0 = fsopen(&(0x7f0000000000)='tmpfs\x00', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) fsconfig$FSCONFIG_SET_FD(r0, 0x5, &(0x7f00000000c0)='$R\xb5)ln\xde5\x92\x17\x00_\x94q9\xd6\x1bs\xdd\xda\x05R\xb4\x06\xb8\a\xeaH}\xab\x8f\xc6(X\xe9?*[>\x1f\xc2s\x82\xec\x94\x01}:\xd3\xaa\xc9\x00\xadzL\x9a\xa0\xab<\x13[4\xe6d.\xf9\x8b9\xc9\x8b\xfa\xa9\xe8L\xf8\xb3\xbeS4q\xe0\x8f\xcc\xc3\xe1\xb8C\xd7\xfb\x9d\xb5', 0x0, r1) 03:07:10 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x4c, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x0}]}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}]}, 0x4c}}, 0x0) [ 196.026249][ T38] audit: type=1400 audit(1645240030.525:138): avc: denied { read } for pid=4108 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 196.053625][ T38] audit: type=1400 audit(1645240030.565:139): avc: denied { append } for pid=3107 comm="syslogd" name="messages" dev="tmpfs" ino=3 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 03:07:10 executing program 2: r0 = fsopen(&(0x7f0000000000)='tmpfs\x00', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) fsconfig$FSCONFIG_SET_FD(r0, 0x5, &(0x7f00000000c0)='$R\xb5)ln\xde5\x92\x17\x00_\x94q9\xd6\x1bs\xdd\xda\x05R\xb4\x06\xb8\a\xeaH}\xab\x8f\xc6(X\xe9?*[>\x1f\xc2s\x82\xec\x94\x01}:\xd3\xaa\xc9\x00\xadzL\x9a\xa0\xab<\x13[4\xe6d.\xf9\x8b9\xc9\x8b\xfa\xa9\xe8L\xf8\xb3\xbeS4q\xe0\x8f\xcc\xc3\xe1\xb8C\xd7\xfb\x9d\xb5', 0x0, r1) [ 196.090116][ T38] audit: type=1400 audit(1645240030.565:140): avc: denied { open } for pid=3107 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=3 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 03:07:10 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x0}]}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}]}, 0x50}}, 0x0) [ 196.122409][ T38] audit: type=1400 audit(1645240030.565:141): avc: denied { getattr } for pid=3107 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=3 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 03:07:10 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8910, &(0x7f0000000000)={'wlan1\x00'}) 03:07:10 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) 03:07:10 executing program 2: r0 = fsopen(&(0x7f0000000000)='tmpfs\x00', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) fsconfig$FSCONFIG_SET_FD(r0, 0x5, &(0x7f00000000c0)='$R\xb5)ln\xde5\x92\x17\x00_\x94q9\xd6\x1bs\xdd\xda\x05R\xb4\x06\xb8\a\xeaH}\xab\x8f\xc6(X\xe9?*[>\x1f\xc2s\x82\xec\x94\x01}:\xd3\xaa\xc9\x00\xadzL\x9a\xa0\xab<\x13[4\xe6d.\xf9\x8b9\xc9\x8b\xfa\xa9\xe8L\xf8\xb3\xbeS4q\xe0\x8f\xcc\xc3\xe1\xb8C\xd7\xfb\x9d\xb5', 0x0, r1) 03:07:10 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x0}]}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}]}, 0x50}}, 0x0) 03:07:10 executing program 2: r0 = fsopen(&(0x7f0000000000)='tmpfs\x00', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) fsconfig$FSCONFIG_SET_FD(r0, 0x5, &(0x7f00000000c0)='$R\xb5)ln\xde5\x92\x17\x00_\x94q9\xd6\x1bs\xdd\xda\x05R\xb4\x06\xb8\a\xeaH}\xab\x8f\xc6(X\xe9?*[>\x1f\xc2s\x82\xec\x94\x01}:\xd3\xaa\xc9\x00\xadzL\x9a\xa0\xab<\x13[4\xe6d.\xf9\x8b9\xc9\x8b\xfa\xa9\xe8L\xf8\xb3\xbeS4q\xe0\x8f\xcc\xc3\xe1\xb8C\xd7\xfb\x9d\xb5', 0x0, r1) 03:07:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_int(r0, 0x11, 0x1, &(0x7f0000000180)=0x8, 0x4) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 03:07:10 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) 03:07:10 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x0}]}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}]}, 0x50}}, 0x0) [ 196.213390][ T38] audit: type=1400 audit(1645240030.745:142): avc: denied { setopt } for pid=4130 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 03:07:10 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) recvmsg(r0, &(0x7f0000002280)={0x0, 0x0, 0x0}, 0x140e0) 03:07:10 executing program 0: memfd_create(&(0x7f0000000080)='\xdf\xfca}i\xb5\x1bc\xa6\xbe\x14q\r\b\xf9{\xdbY\xd1\xecs\x86\xd2N\xd4\xac\x17C\xbc\xf5\xa3%\x86\x10\xaa\xbd\x8d\x9b\x04m#\xa8O\xec\x98\xa9\xa9|z\x81h\xbc\xfd\x16\xe0\xf4)\xce\x1a\xaf??\nM\v5V\xf7\xc7\xbc\x83\xfbV\xcd\xc73\xeeZ\xb9\x12\xd2\x9c&\x96Ogq\xfe&laS6L7\x8a0\xa2\\\b*\xe0\xf0,\xc2>\xf0?\xd3\xf6\x95\vW\xf7@\x94\xdag\xb4\xb1s\xe0\x8a\x1c}\xebyk\rO\xd4\xc4\xb6|\xda}\t`7\xa0|\x9f{\xa2\x7fn#\xab:\xff\xa9F\xe1i\x8c\xd6zv8\xc1\x92\x1b\x10\x1fNG9\xdd\x12\xb3\xfe\xc1+\x83\f\x0f\x8e\xe2\x8b\xe9@@\xeb+\xc5\xee\xad\xd9\x85\"o\x01\xd2.\xf5?:rPx\xafJ\xd6A\a\"\x0e\x1cs\xf1\x81m\x7f\xbd\xf4[&\xcd\xa63\xdd\xbbI\x00\xbei\xc3\x7f\xbf\xc4\x13\x1f=\xac\r\x9b\xfa\xe6\xc6\xe2$\xac\xb7\x8e\x96\xb4\xf2T\xe5\xbc\x18?\x88\x93\xc3\x01\x95\x82)\xee\xca\xf8\xf9\xaf\xe5\xc1\xb9)\xaa\xb3\xc5\xc8n\x88\xea\x1aA\x8a\xda~\x1b\x04\xc9O\xd3\xc3\x80oH\x12k\xc8\xcb\\bnc', 0x0) 03:07:10 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x58, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x0}]}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}]}, 0x58}}, 0x0) 03:07:10 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) 03:07:10 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) getsockopt$sock_int(r0, 0x1, 0x2, 0x0, &(0x7f0000000800)) 03:07:10 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x5452, &(0x7f0000000040)={'veth1_to_hsr\x00', {0x2, 0x0, @remote}}) 03:07:10 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) 03:07:10 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x58, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x0}]}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}]}, 0x58}}, 0x0) 03:07:10 executing program 0: r0 = socket$inet(0x2, 0x3, 0x9) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000000140)={'veth1_to_bridge\x00', {0x2, 0x0, @remote}}) 03:07:10 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) getsockopt$sock_int(r0, 0x1, 0x2c, 0x0, &(0x7f0000000800)) 03:07:10 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(0xffffffffffffffff) 03:07:10 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x0, 0x0, 0x0, 0x1}, 0x48) 03:07:10 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x58, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x0}]}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}]}, 0x58}}, 0x0) 03:07:10 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$bt_hci(r0, 0x0, 0x13, 0x0, &(0x7f0000000100)) 03:07:10 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(0xffffffffffffffff) [ 196.421440][ T38] audit: type=1400 audit(1645240030.955:143): avc: denied { map_create } for pid=4163 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 03:07:10 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x0}]}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}]}, 0x50}}, 0x0) 03:07:10 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$bt_hci(r0, 0x11, 0x0, 0x0, 0x0) 03:07:11 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000100)='team_slave_1\x00') 03:07:11 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x0}]}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}]}, 0x50}}, 0x0) 03:07:11 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(0xffffffffffffffff) 03:07:11 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8912, &(0x7f0000000000)={'wlan1\x00'}) 03:07:11 executing program 0: socket(0x2, 0x3, 0xd1) 03:07:11 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x50, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x0}]}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}]}, 0x50}}, 0x0) 03:07:11 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = inotify_init1(0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x20000000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r1, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r1) 03:07:11 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) getsockopt$sock_int(r0, 0x1, 0x11, 0x0, &(0x7f0000000800)) 03:07:11 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0xc0189436, 0x0) 03:07:11 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8919, &(0x7f0000000040)={'veth1_to_hsr\x00', {0x2, 0x0, @remote}}) 03:07:11 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) getsockopt$sock_int(r0, 0x1, 0x7, 0x0, &(0x7f0000000800)) 03:07:11 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = inotify_init1(0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x20000000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r1, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r1) 03:07:11 executing program 0: r0 = fsopen(&(0x7f0000000340)='bpf\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) 03:07:11 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8916, &(0x7f0000000000)={'wlan1\x00'}) 03:07:11 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = inotify_init1(0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x20000000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r1, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r1) 03:07:11 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8940, &(0x7f0000000000)={'wlan1\x00'}) [ 196.616886][ T38] audit: type=1400 audit(1645240031.155:144): avc: denied { mount } for pid=4195 comm="syz-executor.0" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 03:07:11 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) getsockopt$sock_int(r0, 0x1, 0x24, 0x0, &(0x7f0000000800)) 03:07:11 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$bt_hci(r0, 0x0, 0x17, 0x0, &(0x7f0000000100)) 03:07:11 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt(r0, 0x6, 0x0, &(0x7f0000000000)="c3700b6b", 0x4) 03:07:11 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) inotify_init1(0x0) readv(r0, &(0x7f0000000100), 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r1, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r1) 03:07:11 executing program 0: syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000340)=ANY=[@ANYBLOB="12010000000000406a053103400000000001090224"], 0x0) syz_usb_control_io(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$hidraw(&(0x7f0000000200), 0x0, 0x0) ioctl$HIDIOCGRAWPHYS(r0, 0x80404805, &(0x7f0000000000)) 03:07:11 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x400, 0x0, 0x0, 0x0) 03:07:11 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) getsockopt$sock_int(r0, 0x1, 0x22, 0x0, &(0x7f0000000800)) 03:07:11 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) getsockopt$sock_int(r0, 0x1, 0x15, 0x0, &(0x7f0000000800)) 03:07:11 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) inotify_init1(0x0) readv(r0, &(0x7f0000000100), 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r1, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r1) 03:07:11 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x5452, 0x0) 03:07:11 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) getsockopt$sock_int(r0, 0x1, 0x31, 0x0, &(0x7f0000000800)) 03:07:11 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) inotify_init1(0x0) readv(r0, &(0x7f0000000100), 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r1, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r1) [ 196.984726][ T32] usb 5-1: new high-speed USB device number 2 using dummy_hcd [ 197.385391][ T32] usb 5-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 197.399756][ T32] usb 5-1: config 0 has no interfaces? [ 197.406331][ T32] usb 5-1: New USB device found, idVendor=056a, idProduct=0331, bcdDevice= 0.40 [ 197.416262][ T32] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 197.436364][ T32] usb 5-1: config 0 descriptor?? [ 197.753598][ T37] usb 5-1: USB disconnect, device number 2 03:07:12 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8914, &(0x7f0000000000)={'wlan1\x00'}) 03:07:12 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x2021, 0x0, 0x0) 03:07:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000300)) 03:07:12 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r1, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r1) [ 198.286821][ T38] audit: type=1400 audit(1645240032.825:145): avc: denied { getopt } for pid=4231 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 03:07:12 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0xc020660b, 0x0) 03:07:12 executing program 0: syz_mount_image$nfs4(&(0x7f00000001c0), &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}]}) 03:07:12 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r1, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r1) [ 198.356357][ T4240] SELinux: duplicate or incompatible mount options 03:07:12 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$bt_hci(r0, 0x0, 0x21, 0x0, &(0x7f0000000100)) 03:07:12 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8914, &(0x7f0000000000)={'wlan1\x00'}) 03:07:12 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8923, &(0x7f0000000000)={'wlan1\x00'}) 03:07:12 executing program 2: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_aout(r0, 0x0, 0x3c9) 03:07:12 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r1, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r1) 03:07:13 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$bt_hci(r0, 0x0, 0x18, 0x0, &(0x7f0000000100)) 03:07:13 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8914, &(0x7f0000000000)={'wlan1\x00'}) 03:07:13 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = inotify_init1(0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x20000000) readv(0xffffffffffffffff, &(0x7f0000000100), 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r1, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r1) 03:07:13 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt(r0, 0x6, 0x3, &(0x7f0000000000)="c3700b6b", 0x4) 03:07:13 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$bt_hci(r0, 0x0, 0xb, 0x0, &(0x7f0000000100)) 03:07:13 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8914, &(0x7f0000000000)={'wlan1\x00'}) 03:07:13 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = inotify_init1(0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x20000000) readv(0xffffffffffffffff, &(0x7f0000000100), 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r1, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r1) 03:07:13 executing program 2: r0 = semget(0x1, 0x0, 0x100) semctl$IPC_INFO(r0, 0x2, 0x3, &(0x7f0000000000)=""/151) r1 = semget(0x1, 0x3, 0x20c) semctl$IPC_INFO(r1, 0x3, 0x3, &(0x7f00000000c0)=""/152) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto(r2, 0x0, 0x0, 0x24048018, &(0x7f0000000940)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80) 03:07:13 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$bt_hci(r0, 0x0, 0x3, 0x0, &(0x7f0000000100)) 03:07:13 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = inotify_init1(0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x20000000) readv(0xffffffffffffffff, &(0x7f0000000100), 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r1, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r1) 03:07:13 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$bt_hci(r0, 0x0, 0x2, 0x0, &(0x7f0000000100)) 03:07:13 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x5411, &(0x7f0000000000)={'wlan1\x00'}) 03:07:13 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) 03:07:13 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8901, 0x0) 03:07:13 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x4020940d, 0x0) 03:07:13 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_ifreq(r0, 0x89b1, &(0x7f0000000000)={'vlan1\x00', @ifru_ivalue}) 03:07:13 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000008c0)={'tunl0\x00', 0x0}) write$FUSE_CREATE_OPEN(0xffffffffffffffff, 0x0, 0x0) sendmsg$TCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x4000010) syz_usb_connect$cdc_ncm(0x3, 0x83, &(0x7f0000000600)={{0x12, 0x1, 0x310, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x71, 0x2, 0x1, 0x0, 0x10, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x6, 0x24, 0x6, 0x0, 0x1, "0f"}, {0x5}, {0xd, 0x24, 0xf, 0x1, 0x80000001, 0x0, 0x0, 0x20}, {0x6}, [@obex={0x5}, @mbim_extended={0x8, 0x24, 0x1c, 0xc09a, 0x20, 0x1}, @network_terminal={0x7, 0x24, 0xa, 0x7}]}, {{0x9, 0x5, 0x81, 0x3, 0x400}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x0, 0x0, 0x93, 0x81}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x40, 0x9}}}}}}}]}}, &(0x7f0000000780)={0xa, &(0x7f00000006c0)={0xa, 0x6, 0x110, 0x0, 0xba, 0x2, 0x20, 0x5}, 0x0, 0x0}) openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_CREATE_OPEN(0xffffffffffffffff, 0x0, 0x0) 03:07:13 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) 03:07:13 executing program 2: r0 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) epoll_pwait(r0, &(0x7f0000000600)=[{}], 0x1, 0x0, 0x0, 0x0) 03:07:13 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x16, 0x0, 0x4, 0xf99, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x48) 03:07:13 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8970, &(0x7f0000000000)={'wlan1\x00'}) 03:07:13 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) 03:07:13 executing program 2: select(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080)={0x5}, 0x0) 03:07:13 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_TTY_GET(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xfffffe45, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x3f8, 0x0, 0x0, 0x0, "", ["", "", ""]}, 0x10}}, 0x0) [ 198.934749][ T172] usb 8-1: new high-speed USB device number 2 using dummy_hcd [ 199.215001][ T172] usb 8-1: Using ep0 maxpacket: 32 [ 199.374825][ T172] usb 8-1: unable to get BOS descriptor or descriptor too short [ 199.467224][ T172] usb 8-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 199.480575][ T172] usb 8-1: config 1 interface 1 altsetting 1 endpoint 0x82 has invalid wMaxPacketSize 0 [ 199.495085][ T172] usb 8-1: config 1 interface 1 altsetting 1 bulk endpoint 0x82 has invalid maxpacket 0 [ 199.507520][ T172] usb 8-1: config 1 interface 1 altsetting 1 bulk endpoint 0x3 has invalid maxpacket 1023 [ 199.675085][ T172] usb 8-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 199.685235][ T172] usb 8-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 199.694982][ T172] usb 8-1: Product: syz [ 199.699367][ T172] usb 8-1: Manufacturer: syz [ 199.704392][ T172] usb 8-1: SerialNumber: syz [ 199.888392][ T1351] ieee802154 phy0 wpan0: encryption failed: -22 [ 199.895439][ T1351] ieee802154 phy1 wpan1: encryption failed: -22 [ 199.995102][ T172] cdc_ncm 8-1:1.0: bind() failure [ 200.005403][ T172] cdc_ncm 8-1:1.1: CDC Union missing and no IAD found [ 200.013124][ T172] cdc_ncm 8-1:1.1: bind() failure [ 200.022053][ T172] usb 8-1: USB disconnect, device number 2 03:07:15 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) getsockopt$sock_int(r0, 0x1, 0x3c, 0x0, &(0x7f0000000800)) 03:07:15 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x1, &(0x7f0000000000)=0x1, 0x4) 03:07:15 executing program 1: ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) 03:07:15 executing program 2: syz_usb_connect$cdc_ncm(0x0, 0x6e, &(0x7f0000000600)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}}}}}]}}, 0x0) [ 200.508257][ T38] audit: type=1400 audit(1645240035.045:146): avc: denied { setopt } for pid=4306 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 03:07:15 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x80108906, 0x0) 03:07:15 executing program 1: ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) 03:07:15 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$bt_hci(r0, 0x0, 0x6, 0x0, &(0x7f0000000100)) 03:07:15 executing program 1: ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) 03:07:15 executing program 3: syz_mount_image$nfs4(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001400)={[{'wlan1\x00'}]}) 03:07:15 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$bt_hci(r0, 0x0, 0x8, 0x0, &(0x7f0000000100)) 03:07:15 executing program 1: process_vm_writev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) [ 200.602480][ T4320] nfs4: Unknown parameter 'wlan1' [ 200.784813][ T3788] usb 7-1: new high-speed USB device number 3 using dummy_hcd [ 201.055011][ T3788] usb 7-1: Using ep0 maxpacket: 32 [ 201.175561][ T3788] usb 7-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 201.187812][ T3788] usb 7-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 201.199704][ T3788] usb 7-1: config 1 interface 1 altsetting 1 endpoint 0x82 has invalid wMaxPacketSize 0 [ 201.211537][ T3788] usb 7-1: config 1 interface 1 altsetting 1 bulk endpoint 0x82 has invalid maxpacket 0 [ 201.224756][ T3788] usb 7-1: config 1 interface 1 altsetting 1 endpoint 0x3 has invalid wMaxPacketSize 0 [ 201.236785][ T3788] usb 7-1: config 1 interface 1 altsetting 1 bulk endpoint 0x3 has invalid maxpacket 0 [ 201.417840][ T3788] usb 7-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 201.427716][ T3788] usb 7-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 201.440521][ T3788] usb 7-1: Product: syz [ 201.444925][ T3788] usb 7-1: Manufacturer: syz [ 201.449867][ T3788] usb 7-1: SerialNumber: syz [ 201.745182][ T3788] cdc_ncm 7-1:1.0: bind() failure [ 201.755803][ T3788] cdc_ncm 7-1:1.1: CDC Union missing and no IAD found [ 201.763205][ T3788] cdc_ncm 7-1:1.1: bind() failure [ 201.775456][ T3788] usb 7-1: USB disconnect, device number 3 03:07:16 executing program 0: clock_gettime(0x0, &(0x7f00000000c0)={0x0}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000240), 0x600d00, 0x0) select(0x40, &(0x7f0000000000)={0x6}, &(0x7f0000000040)={0x8}, &(0x7f0000000080)={0x8}, &(0x7f0000000100)={r0}) 03:07:16 executing program 2: ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, 0x0) syz_usb_connect$cdc_ncm(0x0, 0x70, &(0x7f0000000600)={{0x12, 0x1, 0x310, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5e, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x7, 0x24, 0x6, 0x0, 0x1, "0f1f"}, {0x5}, {0xd}, {0x6}}, {{0x9, 0x5, 0x81, 0x3, 0x0, 0x0, 0x70}}}}}}]}}, &(0x7f0000000780)={0x0, 0x0, 0x5, &(0x7f0000000700)={0x5, 0xf, 0x5}}) 03:07:16 executing program 3: syz_usb_connect$cdc_ecm(0x0, 0x4d, &(0x7f0000000440)={{0x12, 0x1, 0x350, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x3b, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}}}}]}}]}}, &(0x7f0000000940)={0x0, 0x0, 0x8, &(0x7f0000000500)={0x5, 0xf, 0x8, 0x1, [@generic={0x3}]}}) 03:07:16 executing program 1: process_vm_writev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) 03:07:16 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8904, 0x0) 03:07:16 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$bt_hci(r0, 0x0, 0xd, 0x0, &(0x7f0000000100)) 03:07:16 executing program 1: process_vm_writev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) 03:07:16 executing program 0: select(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000180)) 03:07:16 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0), 0x0, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) [ 202.504822][ T39] usb 7-1: new high-speed USB device number 4 using dummy_hcd [ 202.524808][ T32] usb 8-1: new high-speed USB device number 3 using dummy_hcd [ 202.754896][ T39] usb 7-1: Using ep0 maxpacket: 32 [ 202.774726][ T32] usb 8-1: Using ep0 maxpacket: 32 [ 202.955421][ T39] usb 7-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 202.975614][ T39] usb 7-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 202.990032][ T39] usb 7-1: config 1 interface 1 altsetting 1 endpoint 0x82 has invalid wMaxPacketSize 0 [ 203.001030][ T39] usb 7-1: config 1 interface 1 altsetting 1 bulk endpoint 0x82 has invalid maxpacket 0 [ 203.013327][ T39] usb 7-1: config 1 interface 1 altsetting 1 endpoint 0x3 has invalid wMaxPacketSize 0 [ 203.025178][ T39] usb 7-1: config 1 interface 1 altsetting 1 bulk endpoint 0x3 has invalid maxpacket 0 [ 203.034885][ T32] usb 8-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 203.195003][ T39] usb 7-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 203.207182][ T39] usb 7-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 203.216618][ T39] usb 7-1: Product: syz [ 203.222514][ T39] usb 7-1: Manufacturer: syz [ 203.227832][ T39] usb 7-1: SerialNumber: syz [ 203.235509][ T32] usb 8-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 203.248996][ T32] usb 8-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 203.260461][ T32] usb 8-1: Product: syz [ 203.265745][ T32] usb 8-1: Manufacturer: syz [ 203.272011][ T32] usb 8-1: SerialNumber: syz [ 203.326766][ T32] cdc_ether: probe of 8-1:1.0 failed with error -22 [ 203.515039][ T39] cdc_ncm 7-1:1.0: bind() failure [ 203.528350][ T32] usb 8-1: USB disconnect, device number 3 [ 203.530708][ T39] cdc_ncm 7-1:1.1: CDC Union missing and no IAD found [ 203.546877][ T39] cdc_ncm 7-1:1.1: bind() failure [ 203.564983][ T39] usb 7-1: USB disconnect, device number 4 03:07:18 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1b, 0x0, 0x0, 0x3}, 0x48) 03:07:18 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$bt_hci(r0, 0x0, 0x22, 0x0, &(0x7f0000000100)) 03:07:18 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$bt_hci(r0, 0x0, 0x7, 0x0, &(0x7f0000000100)) 03:07:18 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0), 0x0, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) 03:07:18 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) getsockopt$sock_int(r0, 0x1, 0x25, 0x0, &(0x7f0000000800)) 03:07:18 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0), 0x0, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) 03:07:18 executing program 0: socket$nl_audit(0x10, 0x3, 0x9) select(0x40, &(0x7f0000000000)={0x3}, &(0x7f0000000040)={0x8}, 0x0, 0x0) 03:07:18 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8905, &(0x7f0000000000)={'wlan1\x00'}) 03:07:18 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{0x0}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) 03:07:18 executing program 3: openat$sequencer(0xffffffffffffff9c, &(0x7f0000002380), 0x20101, 0x0) 03:07:18 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000300), r0) 03:07:18 executing program 2: socket(0x2, 0xa, 0x0) socket(0x2, 0xa, 0x0) 03:07:18 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) ioctl$SNDCTL_SEQ_RESET(r0, 0x5100) 03:07:18 executing program 3: r0 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "1cef84fead8a076458b124db529c9e0e8081b81c50ef599ade295333fb9326ead18d88cb20964cf2dac56edf453f550571baefc55fd8d5b593a048301ed63aa3"}, 0x48, r0) 03:07:18 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{0x0}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) 03:07:18 executing program 2: io_setup(0x9, &(0x7f0000000000)=0x0) io_submit(r0, 0x1, &(0x7f0000001900)=[0x0]) 03:07:18 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) ioctl$SNDCTL_SEQ_OUTOFBAND(r0, 0x40085112, &(0x7f0000000100)=@e={0xff, 0x0, 0x0, 0x0, @SEQ_NOTEON}) 03:07:18 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f00000002c0), r1) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000500)={0x14}, 0x14}}, 0x0) 03:07:18 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{0x0}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) 03:07:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000002500)=@security={'security\x00', 0xe, 0x4, 0x360, 0xffffffff, 0x128, 0x220, 0x220, 0xffffffff, 0xffffffff, 0x378, 0x378, 0x378, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@ah={{0x30}}, @common=@unspec=@cgroup0={{0x28}}]}, @common=@CLUSTERIP={0x60}}, {{@ip={@local, @remote, 0x0, 0x0, 'veth1_to_bridge\x00', 'veth0_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}, {{@ip={@rand_addr, @rand_addr, 0x0, 0x0, 'gretap0\x00', 'sit0\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @local}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3c0) 03:07:18 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_BACKOFF_EXPONENT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r1, 0x1}, 0x14}}, 0x0) 03:07:18 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) 03:07:18 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) io_setup(0x7fff, &(0x7f0000000000)=0x0) r2 = socket$nl_sock_diag(0x10, 0x3, 0x4) io_submit(r1, 0x2, &(0x7f0000002480)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x7ff}, &(0x7f00000010c0)={0x0, 0x0, 0x0, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x1}]) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) [ 204.296547][ T38] audit: type=1400 audit(1645240038.835:147): avc: denied { create } for pid=4383 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 03:07:18 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) io_setup(0x7fff, &(0x7f0000000000)=0x0) io_submit(r1, 0x2, &(0x7f0000002480)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}, 0x0]) 03:07:18 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}, {@allow_other}]}}) 03:07:18 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) [ 204.344378][ T38] audit: type=1400 audit(1645240038.875:148): avc: denied { create } for pid=4383 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 204.371400][ T38] audit: type=1400 audit(1645240038.875:149): avc: denied { write } for pid=4383 comm="syz-executor.0" path="socket:[31688]" dev="sockfs" ino=31688 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 03:07:18 executing program 3: socket(0x2, 0x0, 0x80000001) 03:07:18 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) [ 204.406884][ T38] audit: type=1400 audit(1645240038.915:150): avc: denied { read write } for pid=4389 comm="syz-executor.3" name="fuse" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 03:07:19 executing program 3: io_setup(0x7fff, &(0x7f0000000000)) pipe(&(0x7f0000002240)) [ 204.439917][ T38] audit: type=1400 audit(1645240038.915:151): avc: denied { open } for pid=4389 comm="syz-executor.3" path="/dev/fuse" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 03:07:19 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) [ 204.469011][ T38] audit: type=1400 audit(1645240038.925:152): avc: denied { read } for pid=4387 comm="syz-executor.2" path="socket:[33477]" dev="sockfs" ino=33477 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 03:07:19 executing program 0: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$WPAN_SECURITY(r0, 0x0, 0x1, &(0x7f0000000040), &(0x7f00000001c0)=0x4) 03:07:19 executing program 2: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000180)=[0x4, 0x5]) 03:07:19 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) 03:07:19 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) [ 204.578178][ T38] audit: type=1400 audit(1645240039.115:153): avc: denied { create } for pid=4402 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 03:07:19 executing program 0: r0 = syz_open_dev$cec(&(0x7f0000000700), 0x0, 0x2) ioctl$VIDIOC_S_STD(r0, 0x40085618, 0x0) 03:07:19 executing program 2: syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x290000) syz_genetlink_get_family_id$fou(&(0x7f0000000040), 0xffffffffffffffff) [ 204.611858][ T38] audit: type=1400 audit(1645240039.115:154): avc: denied { getopt } for pid=4402 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 03:07:19 executing program 3: io_setup(0x7fff, &(0x7f0000000000)) pipe(&(0x7f0000002240)) 03:07:19 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) io_setup(0x7fff, &(0x7f0000000000)=0x0) io_submit(r1, 0x1, &(0x7f0000002480)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) 03:07:19 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$bt_hci(r0, 0x0, 0x29, 0x0, &(0x7f0000000100)) 03:07:19 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) inotify_init1(0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r1, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r1) 03:07:19 executing program 2: ioperm(0x0, 0x0, 0x0) 03:07:19 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) inotify_init1(0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r1, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r1) 03:07:19 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) io_setup(0x7fff, &(0x7f0000000000)=0x0) r2 = socket$nl_sock_diag(0x10, 0x3, 0x4) io_submit(r1, 0x2, &(0x7f0000002480)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}, &(0x7f00000010c0)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0}]) 03:07:19 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) inotify_init1(0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r1, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r1) [ 204.778608][ T38] audit: type=1400 audit(1645240039.315:155): avc: denied { read } for pid=4425 comm="syz-executor.2" path="socket:[31737]" dev="sockfs" ino=31737 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 03:07:19 executing program 3: io_setup(0x7fff, &(0x7f0000000000)) pipe(&(0x7f0000002240)) 03:07:19 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x0) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) 03:07:19 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) io_setup(0x7fff, &(0x7f0000000000)=0x0) io_submit(r1, 0x1, &(0x7f0000002480)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) 03:07:19 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x0) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) 03:07:19 executing program 2: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, 0x0) 03:07:19 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x0) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) [ 204.969105][ T38] audit: type=1400 audit(1645240039.495:156): avc: denied { create } for pid=4437 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 03:07:19 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)) 03:07:19 executing program 2: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) sendmsg$802154_dgram(r0, &(0x7f0000000240)={&(0x7f00000000c0), 0x14, &(0x7f0000000200)={&(0x7f0000000100)="3d97de8c0771f21220e558b4b87ab4ed2069ee04b37efa965172f57222c8b477fc2e17b43487d6b88163a6e215330eb2fdc7883d4dc6e1036e3edab93319f8f8cd56c632ed1afc6395e53917d31c61388c278b458662215de399d147cdd527da225c8876c028401418b436130776aed718", 0x71}}, 0x0) 03:07:19 executing program 3: io_setup(0x7fff, &(0x7f0000000000)) pipe(&(0x7f0000002240)) 03:07:19 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) io_setup(0x7fff, &(0x7f0000000000)=0x0) io_submit(r1, 0x1, &(0x7f0000002480)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) 03:07:19 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = inotify_init1(0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x20000000) readv(0xffffffffffffffff, &(0x7f0000000100), 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r1, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r1) 03:07:19 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x14, 0x0, 0x1}, 0x14}}, 0x0) 03:07:19 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f00000000c0)=""/146) 03:07:19 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = inotify_init1(0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x20000000) readv(0xffffffffffffffff, &(0x7f0000000100), 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r1, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r1) 03:07:19 executing program 2: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) sendmsg$802154_dgram(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x24, @long}, 0x14, &(0x7f0000000080)={0x0}}, 0x200080c0) 03:07:19 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$smc(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SMC_PNETID_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@SMC_PNETID_IBPORT={0x5}]}, 0x1c}}, 0x0) 03:07:19 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = inotify_init1(0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x20000000) readv(0xffffffffffffffff, &(0x7f0000000100), 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r1, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r1) 03:07:19 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) io_setup(0x7fff, &(0x7f0000000000)=0x0) io_submit(r1, 0x1, &(0x7f0000002480)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) 03:07:19 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) io_setup(0x7fff, &(0x7f0000000000)=0x0) r2 = socket$nl_sock_diag(0x10, 0x3, 0x4) io_submit(r1, 0x2, &(0x7f0000002480)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x7ff}, &(0x7f00000010c0)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x1}]) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, 0x0) 03:07:19 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) 03:07:19 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$SNDCTL_SEQ_TESTMIDI(r0, 0x40045108, &(0x7f00000001c0)) 03:07:19 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000007c0), 0xffffffffffffffff) sendmsg$TIPC_NL_NET_SET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x18, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x4}]}, 0x18}}, 0x0) 03:07:19 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) 03:07:19 executing program 2: accept$nfc_llcp(0xffffffffffffffff, 0x0, &(0x7f0000000080)) io_setup(0x1ff, &(0x7f0000000180)) 03:07:19 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) 03:07:19 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f00000005c0)) 03:07:19 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) ioctl$SNDCTL_SEQ_OUTOFBAND(r0, 0x40085112, &(0x7f0000000040)=@raw={0xfe, 0x0, "8740f935328c"}) 03:07:20 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0x10, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x4}]}]}, 0x24}}, 0x0) 03:07:20 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) 03:07:20 executing program 0: r0 = syz_open_dev$video4linux(&(0x7f00000000c0), 0x0, 0x0) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000080)) 03:07:20 executing program 3: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL802154_CMD_GET_SEC_KEY(0xffffffffffffffff, 0x0, 0x20000954) socket$nl_generic(0x10, 0x3, 0x10) setresuid(0xee01, 0x0, 0xffffffffffffffff) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) 03:07:20 executing program 2: socket$inet_sctp(0x2, 0x1, 0x84) io_setup(0x7fff, &(0x7f0000000000)) socket$nl_sock_diag(0x10, 0x3, 0x4) socket$inet_udplite(0x2, 0x2, 0x88) 03:07:20 executing program 0: r0 = syz_open_dev$video4linux(&(0x7f00000000c0), 0x0, 0x0) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000080)) 03:07:20 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) 03:07:20 executing program 0: r0 = syz_open_dev$video4linux(&(0x7f00000000c0), 0x0, 0x0) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000080)) 03:07:20 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$smc(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SMC_PNETID_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="010002000000000000c501"], 0x1c}}, 0x0) 03:07:20 executing program 0: r0 = syz_open_dev$video4linux(&(0x7f00000000c0), 0x0, 0x0) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000080)) 03:07:20 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) [ 205.609163][ T4501] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 03:07:20 executing program 3: openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) 03:07:20 executing program 2: r0 = socket(0x18, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 03:07:20 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000840)={'batadv_slave_0\x00'}) 03:07:20 executing program 3: socket(0x22, 0x0, 0x1f) 03:07:20 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) 03:07:20 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000002500)=@security={'security\x00', 0xe, 0x4, 0x410, 0xffffffff, 0x128, 0x220, 0x220, 0xffffffff, 0xffffffff, 0x378, 0x378, 0x378, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@ah={{0x30}, {[0x9]}}, @common=@unspec=@cgroup0={{0x28}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @empty, 0x0, 0x0, [0x0, 0x35, 0x1e, 0x0, 0x0, 0x27, 0x7, 0x0, 0x0, 0x0, 0x29, 0x38, 0x0, 0x1d, 0x3c, 0x1e], 0x0, 0x200, 0x200}}}, {{@ip={@local, @remote, 0x0, 0x0, 'veth1_to_bridge\x00', 'veth0_to_batadv\x00'}, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@icmp={{0x28}, {0x0, 'f7'}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{}, {0x0, [0x0, 0x0, 0x4]}}}}, {{@ip={@rand_addr, @rand_addr, 0x0, 0x0, 'gretap0\x00', 'sit0\x00'}, 0x0, 0xf8, 0x158, 0x0, {}, [@common=@socket0={{0x20}}, @common=@unspec=@rateest={{0x68}, {'veth1_vlan\x00', 'virt_wifi0\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @local}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x470) 03:07:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000002500)=@security={'security\x00', 0xe, 0x4, 0x308, 0xffffffff, 0x128, 0x220, 0x220, 0xffffffff, 0xffffffff, 0x378, 0x378, 0x378, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60}}, {{@ip={@local, @remote, 0x0, 0x0, 'veth1_to_bridge\x00', 'veth0_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}, {{@ip={@rand_addr, @rand_addr, 0x0, 0x0, 'gretap0\x00', 'sit0\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @local}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x368) 03:07:20 executing program 2: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) [ 205.778355][ T4516] x_tables: duplicate underflow at hook 2 03:07:20 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) 03:07:20 executing program 0: socket$inet_sctp(0x2, 0x1, 0x84) io_setup(0x7fff, &(0x7f0000000000)) r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000006cc0)) 03:07:20 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000), 0x80203, 0x0) ioctl$SNDCTL_SEQ_GETOUTCOUNT(r0, 0x80045104, 0x0) 03:07:20 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000), 0x80203, 0x0) ioctl$SNDCTL_SEQ_GETOUTCOUNT(r0, 0x80045104, &(0x7f0000000040)) 03:07:20 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) 03:07:20 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x89f7, &(0x7f0000000180)={'ip6gre0\x00', 0x0}) 03:07:20 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000), 0x80203, 0x0) ioctl$SNDCTL_SEQ_GETOUTCOUNT(r0, 0x80045104, &(0x7f0000000040)) 03:07:20 executing program 3: setresgid(0xffffffffffffffff, 0xee00, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 03:07:20 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x0, 0x0}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) 03:07:20 executing program 0: r0 = socket(0x1, 0x1, 0x0) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={0x0}}, 0x0) 03:07:20 executing program 3: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) bind$802154_dgram(r0, &(0x7f0000000040)={0x24, @short}, 0xffffffb8) 03:07:20 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000), 0x80203, 0x0) ioctl$SNDCTL_SEQ_GETOUTCOUNT(r0, 0x80045104, &(0x7f0000000040)) 03:07:20 executing program 0: socket(0x1e, 0x0, 0x3) 03:07:20 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x0, 0x0}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) 03:07:20 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) ioctl$SNDCTL_SEQ_PANIC(r0, 0x5111) 03:07:20 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000), 0x80203, 0x0) ioctl$SNDCTL_SEQ_GETOUTCOUNT(r0, 0x80045104, &(0x7f0000000040)) 03:07:20 executing program 0: r0 = socket(0x11, 0x2, 0x0) setsockopt$WPAN_SECURITY_LEVEL(r0, 0x0, 0x2, 0x0, 0x0) 03:07:20 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040), 0x0, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x8, @sdr}) 03:07:20 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x0, 0x0}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) 03:07:20 executing program 2: io_setup(0x7fff, &(0x7f0000000000)=0x0) io_submit(r0, 0x1, &(0x7f0000002480)=[0x0]) 03:07:20 executing program 0: ioperm(0x0, 0x9, 0x0) 03:07:20 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x0, &(0x7f0000000040)}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) 03:07:20 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'nr0\x00'}) 03:07:20 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f0000001d80)={&(0x7f0000000800)={0xec4, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x4c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}]}, @TIPC_NLA_NODE={0xe64, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_KEY_MASTER={0x4}, @TIPC_NLA_NODE_KEY_MASTER={0x4}, @TIPC_NLA_NODE_KEY={0x49, 0x4, {'gcm(aes)\x00', 0x21, "2bdb7dd1181f165ffb7fdf1f0203e3b80a895ebe85cf38b88e84f68d248b66ea47"}}, @TIPC_NLA_NODE_KEY_MASTER={0x4}, @TIPC_NLA_NODE_ID={0x4}, @TIPC_NLA_NODE_ID={0xcd, 0x3, "96a0b7ac1b1ce232819bf77f55645bbc60ef04b002d85fd35337eeb10ea441222388e966ddc6524fc048979781d9322c904f9732308a7038f99223c5b25a8e9b1d2212d9cd7f9d663970e4ed72fbf3685ac2d0272e7fa29e55efc52e7f9bfa5bfe475015e80f4c2e5f9da0793218489c94b3b866f5cef08147e86a2f283b8524975d6b315d81d84ab163bc7e7359869a4f0c5a7580d8864222fe90d9b65e0d4d9c6cbad43841788426576c296545b27237bd7347572a9e0313f6083b0a3e35509ca45ee9eb6dbacc0b"}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ID={0x11, 0x3, "e34021bf56628b16217c538c47"}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ID={0xd11, 0x3, "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"}]}]}, 0xec4}}, 0x0) 03:07:20 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x0, &(0x7f0000000040)}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) 03:07:20 executing program 3: ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000004c0), 0xffffffffffffffff) 03:07:20 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$smc(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SMC_PNETID_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@SMC_PNETID_IBPORT={0x62}]}, 0x1c}}, 0x0) bind$802154_dgram(0xffffffffffffffff, 0x0, 0x0) [ 206.170812][ T4574] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 03:07:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000002500)=@security={'security\x00', 0xe, 0x4, 0x410, 0xffffffff, 0x128, 0x220, 0x220, 0xffffffff, 0xffffffff, 0x378, 0x378, 0x378, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@ah={{0x30}}, @common=@unspec=@cgroup0={{0x28}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @empty, 0x0, 0x0, [0x0, 0x35, 0x1e, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38], 0x0, 0x200}}}, {{@ip={@local, @remote, 0x0, 0x0, 'veth1_to_bridge\x00', 'veth0_to_batadv\x00'}, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@icmp={{0x28}, {0x0, 'f7'}}]}, @common=@SET={0x60}}, {{@ip={@rand_addr, @rand_addr, 0x0, 0x0, 'gretap0\x00', 'sit0\x00'}, 0x0, 0xf8, 0x158, 0x0, {}, [@common=@socket0={{0x20}}, @common=@unspec=@rateest={{0x68}, {'veth1_vlan\x00', 'virt_wifi0\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @local}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x470) 03:07:20 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x0, &(0x7f0000000040)}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) 03:07:20 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) ioctl$SNDCTL_SEQ_NRMIDIS(r0, 0x8004510b, &(0x7f0000001400)) 03:07:20 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SNDCTL_SEQ_OUTOFBAND(r0, 0x40085112, &(0x7f0000000040)=@echo) [ 206.210548][ T4580] x_tables: duplicate underflow at hook 2 03:07:20 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) ioctl$SNDCTL_SEQ_OUTOFBAND(r0, 0x40085112, 0x0) 03:07:20 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'nr0\x00', 0x2}) 03:07:20 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000002500)=@security={'security\x00', 0xe, 0x4, 0x410, 0xffffffff, 0x128, 0x220, 0x220, 0xffffffff, 0xffffffff, 0x378, 0x378, 0x378, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@ah={{0x30}}, @common=@unspec=@cgroup0={{0x28}}]}, @common=@CLUSTERIP={0x60}}, {{@ip={@local, @remote, 0x0, 0x0, 'veth1_to_bridge\x00', 'veth0_to_batadv\x00'}, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@icmp={{0x28}, {0x0, 'f7'}}]}, @common=@SET={0x60}}, {{@ip={@rand_addr, @rand_addr, 0x0, 0x0, 'gretap0\x00', 'sit0\x00', {}, {}, 0x4}, 0x0, 0xf8, 0x158, 0x0, {}, [@common=@socket0={{0x20}}, @common=@unspec=@rateest={{0x68}, {'veth1_vlan\x00', 'virt_wifi0\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @local, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23], 0x0, 0xffff2310}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x470) 03:07:20 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) 03:07:20 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$SNDCTL_SYNTH_MEMAVL(r0, 0xc004510e, &(0x7f0000000140)) [ 206.270905][ T4588] x_tables: duplicate underflow at hook 2 03:07:20 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x2c}}, 0x0) 03:07:20 executing program 0: clock_nanosleep(0x0, 0x0, &(0x7f0000000840)={0x77359400}, 0x0) 03:07:20 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) 03:07:20 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$SNDCTL_SYNTH_MEMAVL(r0, 0xc004510e, 0x0) 03:07:20 executing program 2: r0 = socket(0x1, 0x2, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f0000000200)={0x0}}, 0x0) 03:07:20 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) 03:07:20 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000000200), 0x0, 0x0) syz_clone(0x10000000, &(0x7f0000000000)="8407900799e7c54a78eee93d9a52c29868cddcbb9fe4a1077c2dee47fe6b9c70a1a0484169cfd501b46db6c74468ba331abe37497d400ac1872c82e49e43de63c1412a9e3ae56a22df37afbabc52cd72787e25cbcdd770a00d463d0dcbcae48db8b68f4c492593b7b95eb7dd05f1adb455a5b0bad62892ca2114f93eb9cb35a4cd185d", 0x83, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="c118d016e266e0957a516c6199d9799c5a07129b3ab607ec9311259da30b27a27432607e5e523284e6ab1cb32b20df083344083de1d752b1485958b9770440e6e2ff8fbcb69cc70841f28a96c228f6208a18e53c041059d5de13388552ed5d765b98c247ded5476e2bcf5e24db389161debf5fe13804f286775b29d5b3f2a0b1e37d4d401e0f123ec1c644edcb1d94c5742f94009c09a0362be14e01e3b85a4e1d785cbf65c094f89b17a9eabdbafab775b0e3b639bd") ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0x40405514, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 'syz1\x00'}) write$6lowpan_enable(0xffffffffffffffff, &(0x7f0000000400)='1', 0x1) 03:07:20 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}}) 03:07:20 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) 03:07:21 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) ioctl$SNDCTL_SEQ_OUTOFBAND(r0, 0x40085112, &(0x7f0000000000)=@v) 03:07:21 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000002500)=@security={'security\x00', 0xe, 0x4, 0x410, 0xffffffff, 0x128, 0x220, 0x220, 0xffffffff, 0xffffffff, 0x378, 0x378, 0x378, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@ah={{0x30}}, @common=@unspec=@cgroup0={{0x28}}]}, @common=@CLUSTERIP={0x60}}, {{@ip={@local, @remote, 0x0, 0x0, 'veth1_to_bridge\x00', 'veth0_to_batadv\x00'}, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@icmp={{0x28}, {0x0, 'f7'}}]}, @common=@SET={0x60}}, {{@ip={@rand_addr, @rand_addr, 0x0, 0x0, 'gretap0\x00', 'sit0\x00'}, 0x0, 0xf8, 0x158, 0x0, {}, [@common=@socket0={{0x20}}, @common=@unspec=@rateest={{0x68}, {'veth1_vlan\x00', 'virt_wifi0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6}}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @local}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x470) 03:07:21 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000002380), 0x0, 0x0) ioctl$SNDCTL_SEQ_SYNC(r0, 0x5101) 03:07:21 executing program 2: r0 = socket(0x2, 0xa, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0), r0) 03:07:21 executing program 0: socketpair(0x25, 0x1, 0x2, 0x0) [ 207.185886][ T4616] x_tables: duplicate underflow at hook 2 03:07:21 executing program 0: socket(0xa, 0x0, 0x101) 03:07:21 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000440)={0xf, 0x8}, 0x10) 03:07:21 executing program 2: socketpair(0x11, 0xa, 0x7, 0x0) 03:07:21 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) 03:07:21 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0xfe64) 03:07:21 executing program 3: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) sendmsg$802154_dgram(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x24, @long}, 0x14, &(0x7f0000000140)={&(0x7f00000000c0)='D', 0x1}}, 0x0) 03:07:21 executing program 2: socket(0x2, 0x6, 0x8) 03:07:21 executing program 3: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240), 0x201, 0x0) 03:07:21 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000002380), 0x0, 0x0) 03:07:21 executing program 0: syz_open_dev$video(&(0x7f0000000840), 0x0, 0x0) pselect6(0x40, &(0x7f0000000100), 0x0, &(0x7f0000000180)={0x8}, &(0x7f00000001c0), 0x0) 03:07:21 executing program 3: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) bind$802154_dgram(r0, &(0x7f0000000200)={0x24, @short={0x2, 0xffff}}, 0x14) 03:07:22 executing program 0: r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000007c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_SET(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)={0x14, r0, 0x1}, 0x14}}, 0x0) 03:07:22 executing program 2: syz_genetlink_get_family_id$batadv(&(0x7f0000000180), 0xffffffffffffffff) socket$inet(0x2, 0x2, 0x8) 03:07:22 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) 03:07:22 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$smc(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SMC_PNETID_GET(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)={0x20, r1, 0x1, 0x0, 0x0, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x20}}, 0x0) 03:07:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000002500)=@security={'security\x00', 0xe, 0x4, 0x410, 0xffffffff, 0x128, 0x220, 0x220, 0xffffffff, 0xffffffff, 0x378, 0x378, 0x378, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@ah={{0x30}}, @common=@unspec=@cgroup0={{0x28}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @empty, 0x0, 0x0, [0x1d, 0x35, 0x1e, 0x9, 0x1, 0x27, 0x7, 0x1a, 0x0, 0x13, 0x29, 0x38, 0x3f]}}}, {{@ip={@local, @remote, 0x0, 0x0, 'veth1_to_bridge\x00', 'veth0_to_batadv\x00'}, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@icmp={{0x28}, {0x0, 'f7'}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{}, {0x0, [], 0x0, 0x5}}}}, {{@ip={@rand_addr, @rand_addr, 0x0, 0x0, 'gretap0\x00', 'sit0\x00'}, 0x0, 0xf8, 0x158, 0x0, {}, [@common=@socket0={{0x20}}, @common=@unspec=@rateest={{0x68}, {'veth1_vlan\x00', 'virt_wifi0\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @local}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x470) 03:07:22 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, 0x0) [ 208.206404][ T4663] x_tables: duplicate underflow at hook 2 03:07:22 executing program 3: socket(0x2, 0xa, 0x0) socket(0x2, 0xa, 0x0) socket(0x2, 0xa, 0x0) 03:07:22 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, 0x0, 0x0) 03:07:22 executing program 0: openat$cachefiles(0xffffffffffffff9c, &(0x7f00000002c0), 0x2e803, 0x0) 03:07:22 executing program 2: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000080)='./binderfs/binder1\x00', 0x800, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000a80)={0x5c, 0x0, &(0x7f0000000880)=[@clear_death, @transaction_sg={0x40486311, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x4, 0x0, &(0x7f00000009c0)="752b8957"}) 03:07:23 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) 03:07:23 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SNDCTL_SEQ_OUTOFBAND(r0, 0x40086602, &(0x7f0000000040)=@n={0x0, 0x0, @SEQ_NOTEON=@special}) 03:07:23 executing program 0: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="91", 0x1}], 0x0, 0x0) 03:07:23 executing program 2: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000080)='./binderfs/binder1\x00', 0x800, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000a80)={0x5c, 0x0, &(0x7f0000000880)=[@clear_death, @transaction_sg={0x40486311, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x4, 0x0, &(0x7f00000009c0)="752b8957"}) 03:07:23 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000080), 0x0, 0x0) ioctl$VIDIOC_QUERYBUF_DMABUF(r0, 0xc0585611, &(0x7f0000000080)={0x0, 0x1, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6fd7eedd"}}) 03:07:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000002500)=@security={'security\x00', 0xe, 0x4, 0x410, 0xffffffff, 0x128, 0x220, 0x220, 0xffffffff, 0xffffffff, 0x378, 0x378, 0x378, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@ah={{0x30}}, @common=@unspec=@cgroup0={{0x28}}]}, @common=@CLUSTERIP={0x60}}, {{@ip={@local, @remote, 0x0, 0x0, 'veth1_to_bridge\x00', 'veth0_to_batadv\x00'}, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@icmp={{0x28}, {0x0, 'f7'}}]}, @common=@SET={0x60}}, {{@ip={@rand_addr, @rand_addr, 0x0, 0x0, 'gretap0\x00', 'sit0\x00'}, 0x0, 0xf8, 0x158, 0x0, {}, [@common=@socket0={{0x20}}, @common=@unspec=@rateest={{0x68}, {'veth1_vlan\x00', 'virt_wifi0\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @local}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x470) 03:07:23 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) [ 209.070652][ T4686] x_tables: duplicate underflow at hook 2 03:07:23 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x2}, 0xc, &(0x7f0000000100)={0x0, 0x38}}, 0x0) 03:07:23 executing program 2: geteuid() mq_open(&(0x7f0000000380)='/dev/qat_adf_ctl\x00', 0x2, 0x10, &(0x7f00000003c0)={0xf2c, 0x1000, 0x1, 0x58655609}) syz_clone(0x44083100, &(0x7f0000000080)="6f98f2f7d683da3b400e9b35601f74aa80f65f06f8921bef3ab72d6a1914d0b23bb89f698edf7b6713115821af4779da8dc302755684810d0e751e52ed9a419c1305c9b7228f128fc3dc4e59745476c44b4ce9c83b1c8bec9a46e91736c43cfc41ba83a3c43d9a899d75654b8b91f666abb7982fb5db00e78e0aaecf2bbd8f41348425c148e0", 0x86, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="9237133d67616ec869c5f05b3df10023a11d3ae64c66a2f63ff07c95be5e121be932319000f5cb8ce0ae4805cab8d647fb31b82a5234e714db33a2971131b61317fa6dd987535debdba1b4e3f499f7172f1f76654a96d1225e8b9a5e9931d37f89d53e4a3cda9da53b6a8674936ee8872e55860eec28b95f88608ebcb072b6c3a347c36e7b1c8a3bf6a391edd2604c48536e7d7bda9de45997f187d82591120d544f2e5c391849793ea7e9db8fed6d72ca4ae7d6ebf6887f8c0fcc238327b1c871") openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000), 0x2080, 0x0) 03:07:23 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000002180), 0x0, 0x0) ioctl$BLKRESETZONE(r0, 0x40101283, 0x0) 03:07:23 executing program 3: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) sendmsg$802154_dgram(r0, &(0x7f00000005c0)={&(0x7f0000000480)={0x24, @long}, 0x14, &(0x7f0000000580)={0x0}}, 0x0) 03:07:23 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) 03:07:23 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) 03:07:23 executing program 0: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) 03:07:23 executing program 3: setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, 0x0, 0xfffffffffffffcf8) 03:07:23 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000001900), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r1, 0x1, 0x0, 0x0, {}, [@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x34}}, 0x0) 03:07:23 executing program 2: syz_clone(0x44083100, &(0x7f0000000080), 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="9237133d67616ec869c5f05b3df10023a11d3ae64c66a2f63ff07c95be5e121be932319000f5cb8ce0ae4805cab8d647fb31b82a5234e714db33a2971131b61317fa6dd987535debdba1b4e3f499f7172f1f76654a96d1225e8b9a5e9931d37f89d53e4a3cda9da53b6a8674936ee8872e55860eec28b95f88608ebcb072b6") 03:07:23 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000001900), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000001a00)={&(0x7f0000000200)={0x48, r1, 0x1, 0x0, 0x0, {}, [{{@pci={{0x8}, {0x11}}, {0xfffffffffffffc66}}, {0x8}, {0x6}}, {{@nsim={{}, {0x0, 0x2, {'netdevsim', 0x0}}}, {0x0, 0x3, 0x3}}}, {{@pci}}, {{@nsim={{}, {0x0, 0x2, {'netdevsim', 0x0}}}}}, {{@nsim={{}, {0x0, 0x2, {'netdevsim', 0x0}}}}}]}, 0x48}}, 0x0) 03:07:23 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) 03:07:23 executing program 0: socketpair(0x2b, 0x1, 0x3f, &(0x7f0000000040)) [ 209.316364][ T38] kauditd_printk_skb: 16 callbacks suppressed 03:07:23 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000007000000080008"], 0x38}}, 0x0) [ 209.316381][ T38] audit: type=1400 audit(1645240043.845:173): avc: denied { create } for pid=4715 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 209.338163][ T4716] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 209.379795][ T4719] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. 03:07:23 executing program 3: mq_open(0x0, 0x0, 0x0, &(0x7f00000003c0)) 03:07:23 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) 03:07:23 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000007000000080008"], 0x38}}, 0x0) [ 209.436583][ T4723] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. 03:07:24 executing program 2: syz_clone(0x44083100, &(0x7f0000000080), 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="9237133d67616ec869c5f05b3df10023a11d3ae64c66a2f63ff07c95be5e121be932319000f5cb8ce0ae4805cab8d647fb31b82a5234e714db33a2971131b61317fa6dd987535debdba1b4e3f499f7172f1f76654a96d1225e8b9a5e9931d37f89d53e4a3cda9da53b6a8674936ee8872e55860eec28b95f88608ebcb072b6") 03:07:24 executing program 3: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) sendmsg$802154_dgram(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000004c0)}, 0x70}, 0x0) 03:07:24 executing program 0: r0 = socket(0x11, 0x803, 0x0) bind$802154_dgram(r0, &(0x7f0000000000), 0x14) 03:07:24 executing program 3: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000040)=ANY=[@ANYBLOB="12010000b67c8140501da1603dc3001f00010902120001000000000904"], 0x0) syz_usb_control_io(r0, 0x0, &(0x7f0000000880)={0x84, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$uac1(r0, 0x0, &(0x7f0000000980)={0x44, &(0x7f0000000640), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000000500)={0x2c, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0}) 03:07:24 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) [ 209.538319][ T38] audit: type=1400 audit(1645240044.085:174): avc: denied { bind } for pid=4729 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 03:07:24 executing program 0: r0 = epoll_create1(0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0}) epoll_pwait2(r0, &(0x7f00000000c0)=[{}], 0x1, &(0x7f0000000140)={r1}, 0x0, 0x0) 03:07:24 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) 03:07:24 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) 03:07:24 executing program 2: syz_mount_image$zonefs(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) 03:07:24 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, 0x0, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) 03:07:24 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, 0x0, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) [ 209.824721][ T3765] usb 8-1: new high-speed USB device number 4 using dummy_hcd [ 210.327580][ T3765] usb 8-1: New USB device found, idVendor=1d50, idProduct=60a1, bcdDevice=c3.3d [ 210.344949][ T3765] usb 8-1: New USB device strings: Mfr=0, Product=31, SerialNumber=0 [ 210.357102][ T3765] usb 8-1: Product: syz [ 210.365957][ T3765] usb 8-1: config 0 descriptor?? [ 210.855768][ T3765] airspy 8-1:0.0: Board ID: 00 [ 210.871841][ T3765] airspy 8-1:0.0: Firmware version: [ 211.294811][ T3765] airspy 8-1:0.0: usb_control_msg() failed -71 request 0e [ 211.309627][ T3765] airspy 8-1:0.0: Registered as swradio16 [ 211.332219][ T3765] airspy 8-1:0.0: SDR API is still slightly experimental and functionality changes may follow [ 211.358468][ T3765] usb 8-1: USB disconnect, device number 4 03:07:26 executing program 3: syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) sendmsg$802154_dgram(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x40) epoll_pwait(0xffffffffffffffff, 0x0, 0x0, 0x8000, &(0x7f0000000080), 0x8) syz_mount_image$iso9660(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="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", 0xf22, 0xdf}], 0x800000, &(0x7f0000000300)={[{@hide}, {@map_acorn}, {@session}, {@check_strict}, {@map_normal}, {@nocompress}], [{@euid_eq={'euid', 0x3d, 0xee01}}, {@uid_eq}]}) 03:07:26 executing program 2: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="91de38c63688fdc40420edb0f935f8528aaa9be03dc07a557b4ed767ac7432af25abe6ae2b7fd36b0dfd3c7e00a4a2a19693a91aef7664c7589e3be63b0d6fa08ca55446dcec4ba941c3a58f20c844541ea2d7ae45e5ad428bd84618d9046049ce79f15a9577b0058c3a72ea460d96fa6e65e1868de473322c26733e9fab13497056e9f41295fc0731269e41d02d0d14a6f53a7450ddfad88a68b3296e184639f9ee5297a8f441a8767a162a4cb16f43e2fa67eefa6e07940491c241bb81c4d50f175ac4812c5904ff6c338ae91e4f28ae47bc70a98648211aca3b94f6974e15", 0xe0}], 0x0, 0x0) 03:07:26 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, 0x0, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) 03:07:26 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000007000000000c"], 0x38}}, 0x0) [ 211.809227][ T4757] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.0'. [ 211.839613][ T4759] loop3: detected capacity change from 0 to 8 03:07:26 executing program 0: socketpair(0x2, 0x6, 0x2, &(0x7f0000000400)) 03:07:26 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080), 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) 03:07:26 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010200000015040000000700000008000b000000000005002200fd00000008001107"], 0x34}}, 0x0) 03:07:26 executing program 3: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$DRM_IOCTL_GET_MAP(r0, 0xc0286404, 0x0) 03:07:26 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080), 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) 03:07:26 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000080), 0x0, 0x0) ioctl$VIDIOC_QUERYBUF_DMABUF(r0, 0xc0d05604, &(0x7f0000000080)={0x0, 0x0, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6fd7eedd"}}) 03:07:26 executing program 0: unlinkat$binderfs_device(0xffffffffffffff9c, &(0x7f0000000040)='./binderfs/custom0\x00') 03:07:26 executing program 3: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, r1, 0x7, 0xffffffffffffffff, &(0x7f0000000000)) 03:07:26 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080), 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) 03:07:26 executing program 0: shmget(0x1, 0x1000, 0x42daf318bc29aea6, &(0x7f0000ffc000/0x1000)=nil) [ 212.070246][ T4783] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 03:07:26 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000001340), 0x0, &(0x7f00000013c0)={[{@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-5'}}, {@discard_size}], [{@func={'func', 0x3d, 'FILE_MMAP'}}]}) 03:07:26 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) 03:07:26 executing program 0: syz_mount_image$fuse(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x234000, &(0x7f0000002140)) 03:07:26 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000300)={0x1c}, 0xfffffffffffffdd4}}, 0x0) 03:07:26 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x11, 0x3, &(0x7f00000003c0)=@framed, &(0x7f0000000400)='syzkaller\x00', 0x6, 0xfe, &(0x7f0000000440)=""/254, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 212.152509][ T4790] jfs: Unrecognized mount option "func=FILE_MMAP" or missing value 03:07:26 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000085c0), 0x2, 0x0) read$FUSE(r0, &(0x7f000000a6c0)={0x2020}, 0x2020) 03:07:26 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) [ 212.190135][ T38] audit: type=1400 audit(1645240046.725:175): avc: denied { perfmon } for pid=4793 comm="syz-executor.0" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 212.225711][ T38] audit: type=1400 audit(1645240046.725:176): avc: denied { prog_run } for pid=4793 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 03:07:26 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, 0x0, 0xd501) [ 212.271383][ T38] audit: type=1400 audit(1645240046.735:177): avc: denied { read } for pid=4792 comm="syz-executor.3" name="kvm" dev="devtmpfs" ino=83 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 03:07:26 executing program 2: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x3, &(0x7f0000000880)=[{&(0x7f0000000200)='q', 0x1, 0x30000000000000}, {&(0x7f0000000240)="cb", 0x1}, {&(0x7f0000000780), 0x0, 0xfffffffffffffff9}], 0x1100400, &(0x7f0000002a80)={[{@sbsector}, {@unhide}, {@gid}, {@unhide}, {@session={'session', 0x3d, 0x2c}}, {@hide}], [{@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '{&'}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@uid_lt}, {@subj_user={'subj_user', 0x3d, 'ip6_vti0\x00'}}]}) 03:07:26 executing program 3: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f00000085c0), 0x2, 0x0) kcmp$KCMP_EPOLL_TFD(r0, r1, 0x7, r2, &(0x7f0000000000)) 03:07:26 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) 03:07:26 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x3, 0x0, 0x0, 0xffffffff}]}) 03:07:26 executing program 3: syz_mount_image$jffs2(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x42094, &(0x7f0000002340)) [ 212.317492][ T38] audit: type=1400 audit(1645240046.735:178): avc: denied { open } for pid=4792 comm="syz-executor.3" path="/dev/kvm" dev="devtmpfs" ino=83 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 212.322081][ T4807] loop2: detected capacity change from 0 to 196608 [ 212.347496][ T38] audit: type=1400 audit(1645240046.805:179): avc: denied { create } for pid=4799 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 03:07:26 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="6d821aa5cf9be629e4e96a"], 0x38}}, 0x0) [ 212.381347][ T38] audit: type=1400 audit(1645240046.815:180): avc: denied { setopt } for pid=4799 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 03:07:26 executing program 3: syz_mount_image$jffs2(&(0x7f0000001400), &(0x7f0000001440)='./file0\x00', 0x0, 0x0, &(0x7f0000001d00), 0x0, &(0x7f0000001dc0)={[{@rp_size}]}) 03:07:26 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) [ 212.432555][ T38] audit: type=1400 audit(1645240046.965:181): avc: denied { create } for pid=4814 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 212.447777][ T4816] MTD: Attempt to mount non-MTD device "/dev/loop3" 03:07:27 executing program 2: syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) r0 = shmget(0x1, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) shmat(r0, &(0x7f0000ffc000/0x1000)=nil, 0x4000) [ 212.477819][ T38] audit: type=1400 audit(1645240047.015:182): avc: denied { write } for pid=4814 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 03:07:27 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) 03:07:27 executing program 0: socketpair(0x29, 0x0, 0x0, &(0x7f0000000100)) 03:07:27 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) 03:07:27 executing program 3: mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x85031, 0xffffffffffffffff, 0x10000000) 03:07:27 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_RATE_SET(r0, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000001540)={&(0x7f00000004c0)={0xec4, 0x0, 0x0, 0x0, 0x0, {}, [@DEVLINK_ATTR_RATE_PARENT_NODE_NAME={0xead, 0xa9, @random="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"}]}, 0xec4}}, 0x0) 03:07:27 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000080), 0x0, 0x0) ioctl$VIDIOC_QUERYBUF_DMABUF(r0, 0xc0585609, &(0x7f0000000080)={0x0, 0x7, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6fd7eedd"}}) 03:07:27 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) 03:07:27 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000005"], 0x38}}, 0x0) 03:07:27 executing program 0: socketpair(0x22, 0x0, 0xf0000000, &(0x7f0000000000)) [ 212.711868][ T4838] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.3'. 03:07:27 executing program 2: io_uring_setup(0x55dd, &(0x7f0000000100)) io_uring_setup(0x7bac, &(0x7f0000000000)) 03:07:27 executing program 0: getresuid(&(0x7f0000000240), 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="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", 0xf60, 0xdf}], 0x0, &(0x7f0000000300)={[{@hide}, {@map_acorn}, {@session}, {@check_strict}, {@session={'session', 0x3d, 0x56}}, {@map_normal}, {@nocompress}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/cachefiles\x00'}}, {@uid_eq}]}) 03:07:27 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) 03:07:27 executing program 3: r0 = io_uring_setup(0x7bac, &(0x7f0000000000)) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r0, 0x7, 0x0, 0x1) [ 212.788045][ T4845] loop0: detected capacity change from 0 to 8 03:07:27 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f00000004c0)={0xfffffffffffffffc, 0x0, &(0x7f0000000480)={&(0x7f0000000440)={0x14}, 0x14}}, 0x0) 03:07:27 executing program 2: mq_open(0x0, 0x2, 0x0, 0x0) syz_clone(0x44083100, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x2080, 0x0) 03:07:27 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000001340), 0x0, &(0x7f00000013c0)) 03:07:27 executing program 3: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000300), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$inet_udplite(0x2, 0x2, 0x88) openat$vcsu(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x7fd5, 0x0, 0x0, 0x0, 0x0) 03:07:27 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) [ 212.940056][ T4856] Mount JFS Failure: -22 [ 212.946225][ T4856] jfs_mount failed w/return code = -22 03:07:27 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) 03:07:27 executing program 3: socketpair(0x2, 0x5, 0x7, &(0x7f0000000000)) 03:07:27 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) 03:07:27 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000001340), 0x0, &(0x7f00000013c0)) [ 213.081283][ T4867] Mount JFS Failure: -22 03:07:27 executing program 2: syz_mount_image$romfs(&(0x7f0000000180), 0x0, 0x0, 0x1, &(0x7f00000004c0)=[{&(0x7f0000000200), 0x0, 0xfffffffffffffff9}], 0x40000, &(0x7f0000002580)={[{}, {'%/&:+}\xc7/!'}], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@fsuuid={'fsuuid', 0x3d, {[0x34], 0x2d, [0x0, 0x0, 0x0, 0x32], 0x2d, [0x0, 0x0, 0x65, 0x63]}}}, {@obj_role={'obj_role', 0x3d, '@&'}}, {@uid_eq}]}) [ 213.094758][ T4867] jfs_mount failed w/return code = -22 03:07:27 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) 03:07:27 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r1) syz_clone(0xd0004400, 0x0, 0x0, 0x0, 0x0, 0x0) [ 213.139904][ T4871] loop2: detected capacity change from 0 to 16383 03:07:27 executing program 0: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) sendmsg$802154_dgram(r0, &(0x7f00000005c0)={&(0x7f0000000480), 0x14, &(0x7f0000000580)={0x0}, 0x7}, 0x0) 03:07:27 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) 03:07:27 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000080), 0x0, 0x0) ioctl$VIDIOC_QUERYBUF_DMABUF(r0, 0xc0205647, &(0x7f0000000080)={0x0, 0x0, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6fd7eedd"}}) 03:07:27 executing program 2: getsockopt$WPAN_WANTLQI(0xffffffffffffffff, 0x0, 0x3, 0x0, &(0x7f00000002c0)) epoll_pwait(0xffffffffffffffff, 0x0, 0x0, 0x8000, 0x0, 0x0) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="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", 0x7ac}], 0x800000, &(0x7f0000000300)={[{@hide}, {@map_acorn}, {@session={'session', 0x3d, 0x1a}}, {@check_strict}, {@session={'session', 0x3d, 0x56}}, {@map_normal}, {@nocompress}], [{@euid_eq={'euid', 0x3d, 0xee01}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/cachefiles\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x8000}}, {@uid_eq}]}) 03:07:27 executing program 0: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)=@ipv4_newrule={0x1c}, 0x1c}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000450700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=ANY=[@ANYBLOB="4400000024000b0f001000"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000009000100677265640000000014000200100003000a"], 0x44}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001c40)={&(0x7f00000007c0)=@newqdisc={0x170, 0x24, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_gred={{0x9}, {0x140, 0x2, [@TCA_GRED_STAB={0x104, 0x2, "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"}, @TCA_GRED_PARMS={0x38}]}}]}, 0x170}}, 0x0) 03:07:27 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) [ 213.341224][ T4882] loop2: detected capacity change from 0 to 3 [ 213.377956][ T4885] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 03:07:27 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) 03:07:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r1) syz_clone(0xd0004400, 0x0, 0x0, 0x0, 0x0, 0x0) 03:07:28 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x38, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SESSION_ID={0x8}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PEER_COOKIE, @L2TP_ATTR_CONN_ID={0x8}]}, 0x38}}, 0x0) 03:07:28 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x0, 0x0, 0x0) close(r2) [ 213.563248][ T4896] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 03:07:28 executing program 2: r0 = userfaultfd(0x1) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, 0x0) 03:07:28 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x0, 0x0, 0x0) close(r2) 03:07:28 executing program 0: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)=@ipv4_newrule={0x1c}, 0x1c}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000450700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=ANY=[@ANYBLOB="4400000024000b0f001000"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000009000100677265640000000014000200100003000a"], 0x44}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001c40)={&(0x7f00000007c0)=@newqdisc={0x170, 0x24, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_gred={{0x9}, {0x140, 0x2, [@TCA_GRED_STAB={0x104, 0x2, "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"}, @TCA_GRED_PARMS={0x38}]}}]}, 0x170}}, 0x0) 03:07:28 executing program 2: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="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", 0xa01}], 0x0, 0x0) [ 213.706829][ T4904] loop2: detected capacity change from 0 to 5 03:07:28 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x0, 0x0, 0x0) close(r2) [ 213.733998][ T4906] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 213.897411][ T4227] I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 03:07:28 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x38}, 0x1, 0x0, 0xe00}, 0x0) 03:07:28 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x0) close(r2) 03:07:28 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x510f, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[], 0x38}, 0x25}, 0x0) 03:07:28 executing program 0: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x2, &(0x7f0000000880)=[{&(0x7f0000000200)='q', 0x1, 0x30000000000000}, {0x0, 0x0, 0xfffffffffffffff9}], 0x1100400, 0x0) [ 214.077448][ T4915] loop0: detected capacity change from 0 to 196608 03:07:28 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000001340), 0x0, &(0x7f00000013c0)={[], [{@appraise}]}) 03:07:28 executing program 0: syz_mount_image$iso9660(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x3, &(0x7f0000000880)=[{&(0x7f0000000200)='q', 0x1, 0x30000000000000}, {&(0x7f0000000240)="cb", 0x1}, {&(0x7f0000000780)="c2", 0x1, 0xfffffffffffffff9}], 0x1100400, &(0x7f0000002a80)) [ 214.132360][ T4920] jfs: Unrecognized mount option "appraise" or missing value 03:07:28 executing program 3: openat$damon_monitor_on(0xffffffffffffff9c, &(0x7f0000000140), 0x41, 0x0) 03:07:28 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x0) close(r2) 03:07:28 executing program 0: sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e24}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 03:07:28 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x4, &(0x7f0000000080)=@framed={{}, [@jmp={0x5, 0x0, 0x2}]}, &(0x7f0000000140)='syzkaller\x00', 0x6, 0x9a, &(0x7f0000000180)=""/154, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:07:28 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x46, &(0x7f0000000640)={@broadcast, @random="e0d35b1004bb", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x3, 0x4, 0x0, 0x3, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @loopback, @loopback}, "00006371ae9b1c01"}}}}}, 0x0) 03:07:28 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x0) close(r2) 03:07:28 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) socket$packet(0x11, 0xa, 0x300) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000504d25a80648c63940d0524fc6010000a400e000000053582c137153e370848018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) 03:07:28 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x46, &(0x7f0000000640)={@broadcast, @random="e0d35b1004bb", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x3, 0x4, 0x0, 0x3, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @loopback, @loopback}, "00006371ae9b1c01"}}}}}, 0x0) [ 214.312928][ T4936] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 214.332356][ T4936] netlink: 'syz-executor.2': attribute type 11 has an invalid length. 03:07:28 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(0xffffffffffffffff) [ 214.346461][ T4936] netlink: 194484 bytes leftover after parsing attributes in process `syz-executor.2'. 03:07:28 executing program 0: sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e24}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 03:07:28 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x46, &(0x7f0000000640)={@broadcast, @random="e0d35b1004bb", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x3, 0x4, 0x0, 0x3, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @loopback, @loopback}, "00006371ae9b1c01"}}}}}, 0x0) 03:07:28 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(0xffffffffffffffff) 03:07:28 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x46, &(0x7f0000000640)={@broadcast, @random="e0d35b1004bb", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x3, 0x4, 0x0, 0x3, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @loopback, @loopback}, "00006371ae9b1c01"}}}}}, 0x0) 03:07:28 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="0207280902"], 0x10}}, 0x0) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB="0209000002"], 0x10}}, 0x0) [ 214.421735][ T38] kauditd_printk_skb: 7 callbacks suppressed [ 214.421746][ T38] audit: type=1400 audit(1645240048.955:190): avc: denied { create } for pid=4945 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 214.475821][ T38] audit: type=1400 audit(1645240049.005:191): avc: denied { write } for pid=4945 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 03:07:29 executing program 3: syz_emit_ethernet(0x46, &(0x7f0000000640)={@broadcast, @random="e0d35b1004bb", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x3, 0x4, 0x0, 0x3, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @loopback, @loopback}, "00006371ae9b1c01"}}}}}, 0x0) 03:07:29 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x20000000) readv(r0, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0xe) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20044811, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) sendto$inet6(r2, &(0x7f0000000140)='\x00', 0x1, 0x0, 0x0, 0x0) close(0xffffffffffffffff) 03:07:29 executing program 3: syz_emit_ethernet(0x46, &(0x7f0000000640)={@broadcast, @random="e0d35b1004bb", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x3, 0x4, 0x0, 0x3, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @loopback, @loopback}, "00006371ae9b1c01"}}}}}, 0x0) 03:07:29 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000380), 0x0, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f00000003c0)) 03:07:29 executing program 3: syz_emit_ethernet(0x46, &(0x7f0000000640)={@broadcast, @random="e0d35b1004bb", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x3, 0x4, 0x0, 0x3, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @loopback, @loopback}, "00006371ae9b1c01"}}}}}, 0x0) 03:07:29 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000240), 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0x80404509, &(0x7f0000000300)=""/45) 03:07:29 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x0, 0x0, 0x0) [ 214.746093][ T38] audit: type=1400 audit(1645240049.285:192): avc: denied { read } for pid=4971 comm="syz-executor.1" name="event0" dev="devtmpfs" ino=861 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 214.783381][ T38] audit: type=1400 audit(1645240049.315:193): avc: denied { open } for pid=4971 comm="syz-executor.1" path="/dev/input/event0" dev="devtmpfs" ino=861 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 214.833821][ T38] audit: type=1400 audit(1645240049.315:194): avc: denied { ioctl } for pid=4971 comm="syz-executor.1" path="/dev/input/event0" dev="devtmpfs" ino=861 ioctlcmd=0x4509 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 03:07:29 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$sock_int(r0, 0xffff, 0x200, &(0x7f00000000c0), 0x4) 03:07:29 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x0, 0x0, 0x0) 03:07:29 executing program 1: ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, 0x0) ioctl$HIDIOCGREPORT(0xffffffffffffffff, 0x400c4807, 0x0) ioctl$HIDIOCGPHYS(0xffffffffffffffff, 0x80404812, &(0x7f0000000200)) r0 = syz_open_dev$hiddev(0x0, 0x0, 0x410000) read$hiddev(0xffffffffffffffff, &(0x7f00000002c0)=""/37, 0x25) syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f00000003c0)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) ioctl$HIDIOCSUSAGE(r0, 0x4018480c, &(0x7f0000001500)={0x3, 0xffffffff, 0x0, 0x0, 0x3}) syz_open_dev$hiddev(0x0, 0x9, 0x40080) 03:07:29 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000380), 0x0, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x40084504, 0x0) 03:07:29 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x0, 0x0, 0x0) 03:07:29 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)={0x24, 0x4, 0x8, 0x201, 0x0, 0x0, {}, [@CTA_TIMEOUT_L3PROTO={0x6}, @CTA_TIMEOUT_L4PROTO={0x5}]}, 0x24}}, 0x0) 03:07:29 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x2, 0x1, 0x103, 0x0, 0x0, {}, [@CTA_MARK={0x5, 0x2}]}, 0x1c}}, 0x0) 03:07:29 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x46, &(0x7f0000000640)={@broadcast, @random="e0d35b1004bb", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x3, 0x0, 0x0, 0x3, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @loopback, @loopback}, "00006371ae9b1c01"}}}}}, 0x0) 03:07:29 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x3, 0x1, 0x103, 0x0, 0x0, {}, [@CTA_MARK={0x8}]}, 0x1c}}, 0x0) 03:07:30 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x46, &(0x7f0000000640)={@broadcast, @random="e0d35b1004bb", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x3, 0x0, 0x0, 0x3, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @loopback, @loopback}, "00006371ae9b1c01"}}}}}, 0x0) [ 215.594835][ T50] usb 6-1: new high-speed USB device number 2 using dummy_hcd [ 216.144886][ T50] usb 6-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 216.154320][ T50] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 216.192558][ T50] usb 6-1: Product: syz [ 216.198106][ T50] usb 6-1: Manufacturer: syz [ 216.206635][ T50] usb 6-1: SerialNumber: syz [ 216.256992][ T50] usb 6-1: ath9k_htc: Firmware ath9k_htc/htc_9271-1.4.0.fw requested [ 216.854970][ T3765] usb 6-1: ath9k_htc: Transferred FW: ath9k_htc/htc_9271-1.4.0.fw, size: 51008 [ 217.060615][ T50] usb 6-1: USB disconnect, device number 2 03:07:32 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)={0x1c, 0x3, 0x3, 0x201, 0x0, 0x0, {}, [@CTA_TIMEOUT_L3PROTO={0x6}]}, 0x1c}}, 0x0) 03:07:32 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)={0x1c, 0x4, 0x8, 0x201, 0x0, 0x0, {}, [@CTA_TIMEOUT_L3PROTO={0x6}]}, 0x1c}}, 0x0) 03:07:32 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x3, 0x1, 0x103, 0x0, 0x0, {}, [@CTA_MARK={0x8}]}, 0x1c}}, 0x0) 03:07:32 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x46, &(0x7f0000000640)={@broadcast, @random="e0d35b1004bb", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x3, 0x0, 0x0, 0x3, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @loopback, @loopback}, "00006371ae9b1c01"}}}}}, 0x0) 03:07:32 executing program 1: pselect6(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080)={0x4}, &(0x7f00000000c0)={0x0, 0x3938700}, 0x0) 03:07:32 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x8, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) 03:07:32 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x46, &(0x7f0000000640)={@broadcast, @random="e0d35b1004bb", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x3, 0x4, 0x0, 0x3, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @loopback}, "00006371ae9b1c01"}}}}}, 0x0) 03:07:32 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) sendmmsg$inet(r0, &(0x7f0000001e00)=[{{&(0x7f0000000080)={0x2, 0x0, @dev}, 0x10, &(0x7f0000001500)=[{&(0x7f00000000c0)="ba", 0x1}], 0x1}}, {{&(0x7f0000001600)={0x2, 0x0, @private}, 0x10, &(0x7f0000001b40)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}}], 0x2, 0x0) 03:07:32 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x46, &(0x7f0000000640)={@broadcast, @random="e0d35b1004bb", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x3, 0x4, 0x0, 0x3, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @loopback}, "00006371ae9b1c01"}}}}}, 0x0) 03:07:32 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x3, 0x1, 0x103, 0x0, 0x0, {}, [@CTA_MARK={0x8}]}, 0x1c}}, 0x0) 03:07:32 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x5450, 0x0) 03:07:32 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000480)=@raw=[@alu], &(0x7f00000004c0)='syzkaller\x00', 0x200, 0x9c, &(0x7f00000005c0)=""/156, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:07:32 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x46, &(0x7f0000000640)={@broadcast, @random="e0d35b1004bb", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x3, 0x4, 0x0, 0x3, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @loopback}, "00006371ae9b1c01"}}}}}, 0x0) 03:07:32 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x84, 0xb, 0x0, 0x0) 03:07:32 executing program 1: socket$inet_sctp(0x2, 0x3605c70b8236d899, 0x84) 03:07:32 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x3, 0x1, 0x103, 0x0, 0x0, {}, [@CTA_MARK={0x8}]}, 0x1c}}, 0x0) [ 217.867166][ T38] audit: type=1400 audit(1645240052.405:195): avc: denied { setopt } for pid=5061 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 217.889354][ T3765] ath9k_htc 6-1:1.0: ath9k_htc: Target is unresponsive [ 217.898747][ T3765] ath9k_htc: Failed to initialize the device 03:07:32 executing program 1: socketpair(0x22, 0x0, 0x8, &(0x7f0000000040)) 03:07:32 executing program 2: socketpair(0x28, 0x0, 0x0, &(0x7f0000000340)) 03:07:32 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x3e, &(0x7f0000000640)={@broadcast, @random="e0d35b1004bb", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x3, 0x4, 0x0, 0x3, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @loopback, @loopback}}}}}}, 0x0) [ 217.920451][ T50] usb 6-1: ath9k_htc: USB layer deinitialized 03:07:32 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000100)=@framed, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000001c0)={0x0, 0x0, 0x3f}, 0x10}, 0x80) 03:07:32 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x24, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x2d0, 0xffffffff, 0x120, 0x120, 0x288, 0xffffffff, 0xffffffff, 0x3a8, 0x3a8, 0x3a8, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0xb8}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@ipv4={'\x00', '\xff\xff', @private}, 'batadv_slave_0\x00'}}}, {{@ip={@remote, @loopback, 0x0, 0x0, 'bond_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0xb0}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f74561bdad76d5564fbf34515cf736724a8dbfd96599cd0cb0ced9608fe9"}}, {{@ip={@multicast1, @empty, 0x0, 0x0, 'nr0\x00', 'veth0\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @broadcast}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x330) 03:07:32 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000300)={'sit0\x00', &(0x7f0000000280)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x35}, @remote}}) [ 217.970600][ T38] audit: type=1400 audit(1645240052.505:196): avc: denied { create } for pid=5071 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 03:07:32 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x3e, &(0x7f0000000640)={@broadcast, @random="e0d35b1004bb", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x3, 0x4, 0x0, 0x3, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @loopback, @loopback}}}}}}, 0x0) 03:07:32 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000100)=@framed, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000001c0), 0x10}, 0x80) 03:07:32 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000100)=@framed, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:07:32 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000300)={'sit0\x00', &(0x7f0000000280)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x35}, @remote}}) 03:07:32 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x3e, &(0x7f0000000640)={@broadcast, @random="e0d35b1004bb", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x3, 0x4, 0x0, 0x3, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @loopback, @loopback}}}}}}, 0x0) 03:07:32 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4b, 0x0, 0x0) 03:07:32 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0xe, 0x0, 0x0, 0x5}, 0x48) 03:07:32 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x42, &(0x7f0000000640)={@broadcast, @random="e0d35b1004bb", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x3, 0x4, 0x0, 0x3, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @loopback, @loopback}, '\x00\x00cq'}}}}}, 0x0) 03:07:32 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, 0x0) 03:07:32 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) getsockopt$sock_int(r0, 0x1, 0x1, 0x0, &(0x7f0000000080)) 03:07:32 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x42, &(0x7f0000000640)={@broadcast, @random="e0d35b1004bb", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x3, 0x4, 0x0, 0x3, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @loopback, @loopback}, '\x00\x00cq'}}}}}, 0x0) 03:07:32 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_ADDR={0xc, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}]}]}, 0x28}}, 0x0) [ 218.097658][ T38] audit: type=1400 audit(1645240052.635:197): avc: denied { create } for pid=5094 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 03:07:32 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x42, &(0x7f0000000640)={@broadcast, @random="e0d35b1004bb", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x3, 0x4, 0x0, 0x3, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @loopback, @loopback}, '\x00\x00cq'}}}}}, 0x0) 03:07:32 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001a40)={&(0x7f0000001880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@enum={0x5}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000001940)=""/222, 0x2a, 0xde, 0x1}, 0x20) 03:07:32 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000000)=0x40, 0x4) [ 218.130598][ T38] audit: type=1400 audit(1645240052.665:198): avc: denied { ioctl } for pid=5094 comm="syz-executor.0" path="socket:[37087]" dev="sockfs" ino=37087 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 03:07:32 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x22, &(0x7f0000000080)={0x0, {{0x2, 0x0, @empty}}}, 0x88) [ 218.170269][ T38] audit: type=1400 audit(1645240052.665:199): avc: denied { getopt } for pid=5097 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 03:07:32 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000011c0)=@base={0xa, 0x0, 0x0, 0x0, 0x1250}, 0x48) 03:07:32 executing program 2: bpf$PROG_LOAD(0x11, &(0x7f0000001700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:07:32 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) sendmmsg$inet(r0, &(0x7f0000001e00)=[{{&(0x7f0000000080)={0x2, 0x0, @dev}, 0x10, &(0x7f0000001500)=[{&(0x7f00000000c0)="ba", 0x1}], 0x1}}, {{&(0x7f0000001600)={0x2, 0x0, @private}, 0x10, &(0x7f0000001b40)=[{&(0x7f0000001640)="ed", 0x1}], 0x1}}], 0x2, 0x0) 03:07:32 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x44, &(0x7f0000000640)={@broadcast, @random="e0d35b1004bb", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x36, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x3, 0x4, 0x0, 0x3, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @loopback, @loopback}, "00006371ae9b"}}}}}, 0x0) 03:07:32 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_KEY_FLUSH(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB='@'], 0x16c}}, 0x0) 03:07:32 executing program 1: pipe(&(0x7f00000017c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$wireguard(&(0x7f0000001b40), r0) 03:07:32 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x44, &(0x7f0000000640)={@broadcast, @random="e0d35b1004bb", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x36, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x3, 0x4, 0x0, 0x3, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @loopback, @loopback}, "00006371ae9b"}}}}}, 0x0) 03:07:32 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$OSF_MSG_REMOVE(r0, &(0x7f0000000fc0)={0x0, 0x0, &(0x7f0000000f80)={0x0}, 0x1, 0x0, 0x60}, 0x0) 03:07:32 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002140)={0x18, 0x3, &(0x7f0000001e40)=@framed={{0x18, 0x0, 0x6}}, &(0x7f0000001e80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:07:32 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000180)={0x3}, 0x4) 03:07:32 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000100)=@framed, &(0x7f0000000140)='GPL\x00', 0x80000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000001c0), 0x10}, 0x80) 03:07:32 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={@ipv4={'\x00', '\xff\xff', @loopback}, @private0, @ipv4={'\x00', '\xff\xff', @loopback}}) 03:07:32 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x44, &(0x7f0000000640)={@broadcast, @random="e0d35b1004bb", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x36, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x3, 0x4, 0x0, 0x3, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @loopback, @loopback}, "00006371ae9b"}}}}}, 0x0) 03:07:32 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8930, &(0x7f0000000000)) 03:07:32 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x29, 0x0, 0x0) 03:07:32 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x45, &(0x7f0000000640)={@broadcast, @random="e0d35b1004bb", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x37, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x3, 0x4, 0x0, 0x3, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @loopback, @loopback}, "00006371ae9b1c"}}}}}, 0x0) 03:07:32 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$OSF_MSG_REMOVE(r0, &(0x7f0000000fc0)={0x0, 0x0, &(0x7f0000000f80)={0x0}, 0x1, 0x0, 0x2}, 0x0) 03:07:32 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) connect$l2tp(r0, 0x0, 0x700) 03:07:32 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x45, &(0x7f0000000640)={@broadcast, @random="e0d35b1004bb", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x37, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x3, 0x4, 0x0, 0x3, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @loopback, @loopback}, "00006371ae9b1c"}}}}}, 0x0) 03:07:32 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000080)={'wg1\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000040)={@loopback, 0x0, r2}) 03:07:32 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x84, 0xc, 0x0, 0x0) 03:07:32 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETRULE(r0, &(0x7f0000003540)={0x0, 0x0, &(0x7f0000003500)={&(0x7f0000003480)={0x2c, 0x7, 0xa, 0x101, 0x0, 0x0, {}, [@NFTA_RULE_CHAIN_ID={0x8}, @NFTA_RULE_USERDATA={0x4}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz1\x00'}]}, 0x2c}}, 0x0) 03:07:32 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x45, &(0x7f0000000640)={@broadcast, @random="e0d35b1004bb", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x37, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x3, 0x4, 0x0, 0x3, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @loopback, @loopback}, "00006371ae9b1c"}}}}}, 0x0) 03:07:32 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f00000004c0)={0x2}, 0x10) 03:07:32 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@bloom_filter={0x1e, 0x0, 0x5, 0x7fff, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3}, 0x48) 03:07:33 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, 0x0, 0x0) 03:07:33 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x40, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast2}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_SESSION_ID={0x8}]}, 0x40}}, 0x0) 03:07:33 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000000440), 0x4) 03:07:33 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000040), &(0x7f0000000080)=0x10) 03:07:33 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$tipc(r0, &(0x7f0000000100)=@name, &(0x7f0000000140)=0x10, 0x800) bpf$LINK_GET_FD_BY_ID(0x1e, 0x0, 0x0) 03:07:33 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x5000}, 0x0) 03:07:33 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$inet_int(r0, 0x0, 0xa, &(0x7f0000002000)=0x32, 0x4) 03:07:33 executing program 0: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={0x0}}, 0x20000005) 03:07:33 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002140)={0x18, 0x3, &(0x7f0000001e40)=@framed, &(0x7f0000001e80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000600)=@bpf_ext={0x1c, 0x2, &(0x7f0000000040)=@raw=[@map_idx], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x80) 03:07:33 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000080)={'wg1\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={@dev, @private1, @ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x0, 0x0, 0x0, 0x8, 0x800000, r2}) 03:07:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x7fffffe, 0x2d0, 0xffffffff, 0x120, 0x120, 0x288, 0xffffffff, 0xffffffff, 0x3a8, 0x3a8, 0x3a8, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0xb8}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@ipv4={'\x00', '\xff\xff', @private}, 'batadv_slave_0\x00'}}}, {{@ip={@remote, @loopback, 0x0, 0x0, 'bond_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0xb0}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f74561bdad76d5564fbf34515cf736724a8dbfd96599cd0cb0ced9608fe9"}}, {{@ip={@multicast1, @empty, 0x0, 0x0, 'nr0\x00', 'veth0\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @broadcast}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x330) 03:07:33 executing program 0: bpf$PROG_LOAD(0x16, &(0x7f0000001700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:07:33 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x89a1, &(0x7f0000000000)) 03:07:33 executing program 1: r0 = socket$inet(0x2, 0xa, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, 0x0, 0x0) 03:07:33 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000100)=@framed, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180), 0x8, 0x10, 0x0}, 0x80) 03:07:33 executing program 0: bpf$BPF_PROG_ATTACH(0x3, &(0x7f0000000000), 0x14) 03:07:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_int(r0, 0x11, 0xb, &(0x7f0000000000)=0x7192272c, 0x4) 03:07:33 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002140)={0x18, 0x3, &(0x7f0000001e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f0000001e80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 219.435427][ T5182] syz-executor.3: vmalloc error: size 104665088, page order 0, failed to allocate pages, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=syz3,mems_allowed=0-1 [ 219.452922][ T5182] CPU: 3 PID: 5182 Comm: syz-executor.3 Not tainted 5.17.0-rc4-syzkaller-00217-g7993e65fdd0f #0 [ 219.463150][ T5182] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014 [ 219.471339][ T5182] Call Trace: [ 219.474444][ T5182] [ 219.477156][ T5182] dump_stack_lvl+0xcd/0x134 [ 219.481882][ T5182] warn_alloc.cold+0x9b/0x189 [ 219.486210][ T5182] ? zone_watermark_ok_safe+0x290/0x290 [ 219.491543][ T5182] ? alloc_pages+0x39/0x310 [ 219.495842][ T5182] ? __vmalloc_node_range+0x7bf/0x1060 [ 219.500996][ T5182] __vmalloc_node_range+0xe18/0x1060 [ 219.505905][ T5182] ? vfree_atomic+0xe0/0xe0 [ 219.510081][ T5182] ? do_syscall_64+0x35/0xb0 [ 219.514436][ T5182] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 219.520338][ T5182] ? xt_alloc_entry_offsets+0x3b/0x50 [ 219.525554][ T5182] __vmalloc_node+0x6f/0x90 [ 219.529702][ T5182] ? xt_alloc_entry_offsets+0x3b/0x50 [ 219.536063][ T5182] kvmalloc_node+0xd7/0x100 [ 219.540749][ T5182] xt_alloc_entry_offsets+0x3b/0x50 [ 219.545548][ T5182] translate_table+0x234/0x16a0 [ 219.550033][ T5182] ? __might_fault+0xd1/0x170 [ 219.554754][ T5182] ? lock_downgrade+0x6e0/0x6e0 [ 219.559319][ T5182] ? __do_replace+0x870/0x870 [ 219.564101][ T5182] do_ipt_set_ctl+0x56e/0xb80 [ 219.569267][ T5182] ? __mutex_lock+0x21a/0x12f0 [ 219.574289][ T5182] ? compat_do_replace.constprop.0+0x470/0x470 [ 219.580314][ T5182] ? wait_for_completion_io_timeout+0x20/0x20 [ 219.586144][ T5182] ? nf_sockopt_find.constprop.0+0x22d/0x2a0 [ 219.592393][ T5182] nf_setsockopt+0x83/0xe0 [ 219.596588][ T5182] ip_setsockopt+0x3c3/0x3a90 [ 219.601275][ T5182] ? sock_has_perm+0x120/0x280 [ 219.606302][ T5182] ? ip_sock_set_tos+0x30/0x30 [ 219.611617][ T5182] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 219.618294][ T5182] ? selinux_netlbl_socket_setsockopt+0x9e/0x420 [ 219.625348][ T5182] ? selinux_netlbl_sock_rcv_skb+0x530/0x530 [ 219.632050][ T5182] ? __fget_files+0x28c/0x470 [ 219.636669][ T5182] ? udp_setsockopt+0x76/0xc0 [ 219.641121][ T5182] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 219.647654][ T5182] udp_setsockopt+0x76/0xc0 [ 219.652293][ T5182] ? __sys_setsockopt+0x24d/0x610 [ 219.657157][ T5182] __sys_setsockopt+0x2db/0x610 [ 219.661679][ T5182] ? sock_common_recvmsg+0x1a0/0x1a0 [ 219.666462][ T5182] ? __ia32_sys_recv+0x100/0x100 [ 219.671390][ T5182] ? lock_downgrade+0x6e0/0x6e0 [ 219.677030][ T5182] __x64_sys_setsockopt+0xba/0x150 [ 219.682904][ T5182] ? syscall_enter_from_user_mode+0x21/0x70 [ 219.689473][ T5182] do_syscall_64+0x35/0xb0 [ 219.693874][ T5182] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 219.699348][ T5182] RIP: 0033:0x7f32e7dfa059 [ 219.703402][ T5182] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 219.721119][ T5182] RSP: 002b:00007f32e676f168 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 219.729119][ T5182] RAX: ffffffffffffffda RBX: 00007f32e7f0cf60 RCX: 00007f32e7dfa059 [ 219.737221][ T5182] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000003 [ 219.745772][ T5182] RBP: 00007f32e7e5408d R08: 0000000000000330 R09: 0000000000000000 [ 219.753213][ T5182] R10: 0000000020000040 R11: 0000000000000246 R12: 0000000000000000 [ 219.760844][ T5182] R13: 00007ffcfa7ef1bf R14: 00007f32e676f300 R15: 0000000000022000 [ 219.769323][ T5182] [ 219.775294][ T5182] Mem-Info: [ 219.779755][ T5182] active_anon:331 inactive_anon:131512 isolated_anon:0 [ 219.779755][ T5182] active_file:2159 inactive_file:1893 isolated_file:0 [ 219.779755][ T5182] unevictable:1536 dirty:0 writeback:0 [ 219.779755][ T5182] slab_reclaimable:16113 slab_unreclaimable:54751 [ 219.779755][ T5182] mapped:17895 shmem:2636 pagetables:697 bounce:0 [ 219.779755][ T5182] kernel_misc_reclaimable:0 [ 219.779755][ T5182] free:26336 free_pcp:5708 free_cma:0 [ 219.830424][ T5182] Node 0 active_anon:928kB inactive_anon:160748kB active_file:80kB inactive_file:44kB unevictable:3072kB isolated(anon):0kB isolated(file):0kB mapped:68kB dirty:0kB writeback:0kB shmem:6028kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 6144kB writeback_tmp:0kB kernel_stack:9104kB pagetables:1208kB all_unreclaimable? yes [ 219.865359][ T5182] Node 1 active_anon:396kB inactive_anon:365300kB active_file:8556kB inactive_file:7528kB unevictable:3072kB isolated(anon):0kB isolated(file):0kB mapped:71512kB dirty:0kB writeback:0kB shmem:4516kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 6144kB writeback_tmp:0kB kernel_stack:1776kB pagetables:1580kB all_unreclaimable? no [ 219.904240][ T5182] Node 0 DMA free:3860kB boost:0kB min:720kB low:900kB high:1080kB reserved_highatomic:2048KB active_anon:0kB inactive_anon:10016kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:500kB local_pcp:188kB free_cma:0kB [ 219.942395][ T5182] lowmem_reserve[]: 0 452 452 452 452 [ 219.952078][ T5182] Node 0 DMA32 free:32664kB boost:0kB min:21856kB low:27320kB high:32784kB reserved_highatomic:8192KB active_anon:928kB inactive_anon:150732kB active_file:200kB inactive_file:228kB unevictable:3072kB writepending:0kB present:1032192kB managed:471424kB mlocked:0kB bounce:0kB free_pcp:14740kB local_pcp:5356kB free_cma:0kB [ 219.997349][ T5182] lowmem_reserve[]: 0 0 0 0 0 [ 220.004011][ T5182] Node 1 DMA32 free:67848kB boost:0kB min:45000kB low:56248kB high:67496kB reserved_highatomic:0KB active_anon:396kB inactive_anon:365300kB active_file:8384kB inactive_file:7944kB unevictable:3072kB writepending:0kB present:1048436kB managed:954820kB mlocked:0kB bounce:0kB free_pcp:8812kB local_pcp:6788kB free_cma:0kB [ 220.045969][ T5182] lowmem_reserve[]: 0 0 0 0 0 [ 220.052255][ T5182] Node 0 DMA: 151*4kB (UMH) 129*8kB (UMH) 53*16kB (UMH) 25*32kB (UMH) 7*64kB (UMH) 1*128kB (U) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 3860kB [ 220.070327][ T5182] Node 0 DMA32: 974*4kB (UMEH) 1704*8kB (UMEH) 658*16kB (UMEH) 121*32kB (UMEH) 4*64kB (UE) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 32184kB [ 220.090162][ T5182] Node 1 DMA32: 501*4kB (UME) 732*8kB (UME) 144*16kB (UME) 92*32kB (UME) 36*64kB (UME) 24*128kB (UM) 9*256kB (UME) 6*512kB (ME) 3*1024kB (UM) 2*2048kB (UE) 9*4096kB (M) = 67892kB [ 220.114887][ T5182] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 220.127537][ T5182] Node 0 hugepages_total=2 hugepages_free=2 hugepages_surp=0 hugepages_size=2048kB [ 220.141561][ T5182] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 220.156696][ T5182] Node 1 hugepages_total=2 hugepages_free=2 hugepages_surp=0 hugepages_size=2048kB [ 220.170026][ T5182] 6757 total pagecache pages [ 220.178016][ T5182] 0 pages in swap cache [ 220.183367][ T5182] Swap cache stats: add 0, delete 0, find 0/0 [ 220.193613][ T5182] Free swap = 0kB [ 220.199009][ T5182] Total swap = 0kB [ 220.203690][ T5182] 524155 pages RAM [ 220.207949][ T5182] 0 pages HighMem/MovableOnly [ 220.213196][ T5182] 163754 pages reserved [ 220.219345][ T5182] 0 pages cma reserved 03:07:35 executing program 2: socketpair(0x15, 0x5, 0x2, &(0x7f0000000000)) 03:07:35 executing program 1: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000005c80)={'ip_vti0\x00', &(0x7f0000005980)=@ethtool_per_queue_op={0x49}}) 03:07:35 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000500)='ns/uts\x00') [ 220.658791][ T38] kauditd_printk_skb: 2 callbacks suppressed 03:07:35 executing program 3: pselect6(0x40, &(0x7f0000000000), &(0x7f0000000040), 0x0, &(0x7f00000000c0)={0x77359400}, 0x0) 03:07:35 executing program 1: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000005c80)={'ip_vti0\x00', &(0x7f0000005980)=@ethtool_per_queue_op={0x49}}) [ 220.658829][ T38] audit: type=1400 audit(1645240055.195:202): avc: denied { create } for pid=5199 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 03:07:35 executing program 2: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@mcast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0, 0x0, 0x0, 0x0, 0xee00}}, {{@in=@empty}}}, 0xe8) [ 220.692479][ T38] audit: type=1400 audit(1645240055.195:203): avc: denied { create } for pid=5197 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 03:07:35 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000500)='ns/uts\x00') 03:07:35 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000100)=@raw=[@cb_func, @func, @call], &(0x7f0000000080)='GPL\x00', 0x2, 0xa0, &(0x7f0000000180)=""/160, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 220.719644][ T38] audit: type=1400 audit(1645240055.195:204): avc: denied { ioctl } for pid=5199 comm="syz-executor.1" path="socket:[38183]" dev="sockfs" ino=38183 ioctlcmd=0x8946 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 03:07:35 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict]}}, &(0x7f00000001c0)=""/156, 0x26, 0x9c, 0x1}, 0x20) 03:07:35 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0x30, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_PID={0x8, 0x1c, 0xffffffffffffffff}, @NL802154_ATTR_WPAN_PHY={0x8}]}, 0x30}}, 0x0) 03:07:35 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x16, &(0x7f0000002140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:07:36 executing program 3: bpf$MAP_CREATE(0x12, &(0x7f0000000680), 0x48) 03:07:36 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002140)={0x1e, 0x3, &(0x7f0000001e40)=@framed, &(0x7f0000001e80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:07:36 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x891d, &(0x7f0000000000)) 03:07:36 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000001c0)={'sit0\x00', &(0x7f0000000140)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private2, @empty}}) 03:07:36 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x20000370, 0xffffffff, 0x120, 0x120, 0x288, 0xffffffff, 0xffffffff, 0x3a8, 0x3a8, 0x3a8, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0xb8}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@ipv4={'\x00', '\xff\xff', @private}, 'batadv_slave_0\x00'}}}, {{@ip={@remote, @loopback, 0x0, 0x0, 'bond_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0xb0}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f74561bdad76d5564fbf34515cf736724a8dbfd96599cd0cb0ced9608fe9"}}, {{@ip={@multicast1, @empty, 0x0, 0x0, 'nr0\x00', 'veth0\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @broadcast}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x330) 03:07:36 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x10, &(0x7f0000002140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:07:36 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4b, &(0x7f0000000000), 0x4) 03:07:36 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000580)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x8}, {0x3}]}]}}, &(0x7f0000000100)=""/140, 0x3e, 0x8c, 0x1}, 0x20) 03:07:36 executing program 0: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, 0x0, 0x0) 03:07:36 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x2d0, 0xffffffff, 0x120, 0x120, 0x288, 0xffffffff, 0xffffffff, 0x3a8, 0x3a8, 0x3a8, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x8f}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@ipv4={'\x00', '\xff\xff', @private}, 'batadv_slave_0\x00'}}}, {{@ip={@remote, @loopback, 0x0, 0x0, 'bond_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0xb0}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f74561bdad76d5564fbf34515cf736724a8dbfd96599cd0cb0ced9608fe9"}}, {{@ip={@multicast1, @empty, 0x0, 0x0, 'nr0\x00', 'veth0\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @broadcast}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x330) 03:07:36 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @empty, 0x0, 0x0, 'none\x00'}, 0x2c) 03:07:36 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}]}, 0x1c}}, 0x0) 03:07:36 executing program 3: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000005c80)={'ip_vti0\x00', &(0x7f0000005980)=@ethtool_per_queue_op={0x51}}) 03:07:36 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_int(r0, 0x0, 0xf, 0x0, &(0x7f0000000140)) 03:07:36 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) connect(r0, 0x0, 0x0) 03:07:36 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(r0, &(0x7f0000000600)={&(0x7f0000000540), 0xc, &(0x7f00000005c0)={&(0x7f0000000580)={0x14}, 0x14}}, 0x0) 03:07:36 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x12, 0x0, 0x0, 0x200}, 0x48) [ 221.676402][ T38] audit: type=1400 audit(1645240056.215:205): avc: denied { create } for pid=5246 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 03:07:36 executing program 0: pipe(&(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_pressure(r0, 0x0, 0x0) 03:07:36 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x38, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast2}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_SESSION_ID={0x8}]}, 0x38}}, 0x0) 03:07:36 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002140)={0x18, 0x3, &(0x7f0000001e40)=@framed={{0x18, 0x0, 0x7}}, &(0x7f0000001e80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 221.709623][ T38] audit: type=1400 audit(1645240056.215:206): avc: denied { connect } for pid=5246 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 03:07:36 executing program 1: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000780)={0x0, 0x0, 0x18}, 0x10) 03:07:36 executing program 2: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f00000001c0)={0xffffffffffffffff}) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_genetlink_get_family_id$devlink(&(0x7f0000000240), 0xffffffffffffffff) socket$phonet_pipe(0x23, 0x5, 0x2) sendmsg$SMC_PNETID_DEL(r1, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) socketpair(0x1d, 0x0, 0x80, &(0x7f0000000900)) 03:07:36 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000600)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x24}, 0x48) 03:07:36 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@bloom_filter={0x1e, 0x0, 0x5, 0x7fff, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xe}, 0x48) 03:07:36 executing program 3: bpf$BPF_PROG_ATTACH(0x4, 0x0, 0x10) 03:07:36 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x19, 0x0, 0x0) [ 221.764950][ T38] audit: type=1400 audit(1645240056.305:207): avc: denied { ioctl } for pid=5260 comm="syz-executor.2" path="socket:[35557]" dev="sockfs" ino=35557 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 03:07:36 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002140)={0x18, 0x3, &(0x7f0000001e40)=@framed, &(0x7f0000001e80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000600)=@bpf_ext={0x1c, 0x2, &(0x7f0000000040)=@raw=[@map_idx], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x1b834, r0}, 0x80) [ 221.791968][ T38] audit: type=1400 audit(1645240056.315:208): avc: denied { map_read map_write } for pid=5265 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 03:07:36 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001700)={&(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x48, &(0x7f0000001480)=ANY=[], 0x260}, 0x0) 03:07:36 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) connect(r0, &(0x7f0000000180)=@l2tp={0x2, 0x0, @loopback}, 0x80) [ 221.820036][ T38] audit: type=1400 audit(1645240056.315:209): avc: denied { create } for pid=5260 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 03:07:36 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict={0x0, 0x0, 0x0, 0xb, 0x1}]}}, &(0x7f00000001c0)=""/156, 0x26, 0x9c, 0x1}, 0x20) [ 221.848090][ T38] audit: type=1400 audit(1645240056.315:210): avc: denied { write } for pid=5260 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 221.880751][ T38] audit: type=1400 audit(1645240056.415:211): avc: denied { connect } for pid=5273 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 03:07:36 executing program 2: socketpair(0x23, 0x2, 0x0, &(0x7f0000000840)) 03:07:36 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) accept4(r0, 0x0, 0x0, 0x0) 03:07:36 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x890d, 0x0) 03:07:36 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, 0x0, 0x0) 03:07:36 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_SET_WOWLAN(r0, &(0x7f0000004240)={0x0, 0x0, &(0x7f0000004200)={&(0x7f0000000080)={0xec4, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0x8}, @void}}, [@NL80211_ATTR_WOWLAN_TRIGGERS={0xea0, 0x75, 0x0, 0x1, [@NL80211_WOWLAN_TRIG_EAP_IDENT_REQUEST={0x4}, @NL80211_WOWLAN_TRIG_NET_DETECT={0x4}, @NL80211_WOWLAN_TRIG_DISCONNECT={0x4}, @NL80211_WOWLAN_TRIG_PKT_PATTERN={0xe90, 0x4, 0x0, 0x1, [{0x90, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_MASK={0x89, 0x1, "505c9bad769d4927dcddff9d69dcef9b4a54a2ad19d6b6cb66ba01a02ed0e9c7fbb205ef551dcf5028fc790fcbbbfdd40d2bbd169e10661551a5a3e93a4dd0ed7be17a9d4487402109c2c9868158d2e2905fa0f22282a7274768df2edd12d090e7bb45ccc92bb2b7b78548d14ead4136a9de63ecc1f6ccaf49da399e0fea1fde2bd4966818"}]}, {0xdc, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_MASK={0xb5, 0x1, "496acf5b9b1b1961282d975e33422d66299a00c2d81ae3b8de0c07f2c68659bed1b7e74f55cb43a96a698a70e975b6f88568f4dce2ab6af3f6ad60d00f9587217744f2c4324c23b9df6b98af3ff01a7eec2eab7b42ec4bd92436fc8b1eab75652f3a0e3d0654bc654915e9d99c7ef682786cd232182b8e6743fd40e6e334fc3b85f709daf5b2edd663c71ae431be2bb65f1bbdc05dcd344b3fd17c30361ce798d5e3453a6554fcce7957f7b8e8fc8eada0"}, @NL80211_PKTPAT_OFFSET={0x8}, @NL80211_PKTPAT_OFFSET={0x8}, @NL80211_PKTPAT_OFFSET={0x8}, @NL80211_PKTPAT_OFFSET={0x8}]}, {0xf0, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_MASK={0x91, 0x1, "2e7afbba831865a237988a2485b8e6a511b4cf47b99a0db54e66235ab943ba0cebc596e170141a3089da74a4e19d5a90d23bb46479b05739c8b2d8b126e40a88310da40630a5330ff0b35d3f8c948763fad9be118a187b51bb7e817695c549807bb2fa4967993a6bc81fde83dc5366c1f23b43a004ae86aa465fdcb980aa59414325e8560a6bc62c7a562776e5"}, @NL80211_PKTPAT_PATTERN={0x55, 0x2, "4313475c4eff596d29a879cfe1d0003c78c1249f51956c3d49ed3f6bed0c55d330cd29f55204ee2dea3fcc63523b858f7f44a36b0b4f7909835ef44053c0f9d674c235256545ff6b49311bea2b22cc4289"}]}, {0xc30, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_OFFSET={0x8}, @NL80211_PKTPAT_MASK={0xc21, 0x1, "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"}]}]}]}]}, 0xec4}}, 0x0) 03:07:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x41, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x2d0, 0xffffffff, 0x120, 0x120, 0x288, 0xffffffff, 0xffffffff, 0x3a8, 0x3a8, 0x3a8, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0xb8}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@ipv4={'\x00', '\xff\xff', @private}, 'batadv_slave_0\x00'}}}, {{@ip={@remote, @loopback, 0x0, 0x0, 'bond_slave_0\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0xb0}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f74561bdad76d5564fbf34515cf736724a8dbfd96599cd0cb0ced9608fe9"}}, {{@ip={@multicast1, @empty, 0x0, 0x0, 'nr0\x00', 'veth0\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @broadcast}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x330) 03:07:36 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0x0, 0x10001, 0x7ff}, 0x48) 03:07:36 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_int(r0, 0x11, 0x1, &(0x7f0000000000)=0x7, 0x4) 03:07:36 executing program 0: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x10, 0x0, 0xfffffffffffffe41) 03:07:36 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000140)={0x28, 0x0, 0x0, @host}, 0x10) 03:07:36 executing program 3: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000840)={'wlan0\x00'}) [ 221.976115][ T5290] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5290 comm=syz-executor.1 03:07:36 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@bloom_filter={0x1e, 0x0, 0x5, 0x7fff, 0x1452}, 0x48) 03:07:36 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000140)={0x28, 0x0, 0x0, @host}, 0x10) 03:07:36 executing program 3: r0 = socket$isdn_base(0x22, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, 0x0) 03:07:36 executing program 0: bpf$BPF_PROG_ATTACH(0x10, &(0x7f0000000000), 0x14) 03:07:36 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_IPV6_RTHDR(r0, 0x29, 0x39, &(0x7f0000000300)={0x0, 0x4, 0x2, 0x0, 0x0, [@private0, @empty]}, 0x28) 03:07:36 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmsg$inet6(r0, &(0x7f0000000680)={&(0x7f0000000280)={0xa, 0x0, 0x0, @private1}, 0x1c, &(0x7f0000000640)=[{&(0x7f00000002c0)="05", 0x1}], 0x1}, 0x0) 03:07:36 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0x0, 0x10001, 0x7ff, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3}, 0x48) 03:07:36 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8910, &(0x7f0000005c80)={'ip_vti0\x00', 0x0}) 03:07:36 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000000)=0x6, 0x4) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2450100}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x28, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) 03:07:36 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000003280)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha384\x00'}, 0x58) 03:07:36 executing program 2: openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) [ 222.106527][ T5318] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5318 comm=syz-executor.3 03:07:36 executing program 3: r0 = socket$kcm(0x29, 0x5, 0x0) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, 0x0, 0x0) 03:07:36 executing program 0: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f0000000000)=0x1, 0x4) 03:07:37 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmsg$inet6(r0, &(0x7f0000000680)={&(0x7f0000000280)={0xa, 0x0, 0x0, @private1}, 0x1c, &(0x7f0000000640)=[{&(0x7f00000002c0)="05", 0x1}], 0x1}, 0x0) 03:07:37 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x84, 0x3, 0x0, 0x0) 03:07:37 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x480, 0x0) 03:07:37 executing program 0: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f0000000000)=0x1, 0x4) 03:07:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) bind$inet(r0, &(0x7f0000000040), 0x10) 03:07:37 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000180)) 03:07:37 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f00000015c0)={0x0, 0x0, &(0x7f0000001580)={&(0x7f0000000140)={0x14}, 0x14}}, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000001b40), 0xffffffffffffffff) 03:07:37 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x801c581f, 0x0) 03:07:38 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000840)) 03:07:38 executing program 0: openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000100)=@framed, &(0x7f0000000140)='GPL\x00', 0x80000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:07:38 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x11, 0x65, &(0x7f0000000140)={{{@in6=@remote, @in6=@local}}, {{@in6=@private2}, 0x0, @in=@loopback}}, 0xe8) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000080)={'wg1\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r3, 0x8918, &(0x7f0000000040)={@mcast2, 0x0, r4}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000000)={@dev={0xfe, 0x80, '\x00', 0x2b}, @private1={0xfc, 0x1, '\x00', 0x1}, @ipv4={'\x00', '\xff\xff', @remote}, 0x7, 0x0, 0x0, 0x0, 0x8, 0x800000, r4}) 03:07:38 executing program 2: pipe(&(0x7f0000000000)) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) 03:07:38 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0x8, 0x0, 0x4}, 0x48) 03:07:38 executing program 1: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0xf, 0x0, 0x9aeb79b64e7d700a) 03:07:38 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@newtclass={0x30, 0x28, 0x1, 0x0, 0x0, {}, [@tclass_kind_options=@c_cbq={{0x8}, {0x4}}]}, 0x30}}, 0x0) 03:07:38 executing program 3: bpf$BPF_PROG_ATTACH(0x4, 0x0, 0xe9) 03:07:38 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_RECV_OWN_MSGS(r0, 0x65, 0x4, &(0x7f0000000000), &(0x7f0000000040)=0x4) 03:07:38 executing program 1: setresuid(0x0, 0xee01, 0x0) 03:07:38 executing program 2: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@delrng={0x10}, 0x10}}, 0x0) 03:07:38 executing program 3: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x40010, r0, 0x0) 03:07:38 executing program 1: syz_clone3(&(0x7f0000000240)={0x40000200, &(0x7f0000000000)=0xffffffffffffffff, &(0x7f0000000040), 0x0, {0x1b}, 0x0, 0x0, &(0x7f0000000100)=""/220, &(0x7f0000000200)=[0x0, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x6}, 0x58) sched_getaffinity(0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) sched_getaffinity(0x0, 0x8, &(0x7f00000001c0)) fcntl$getownex(r0, 0x10, &(0x7f00000004c0)) getpgrp(0xffffffffffffffff) write$cgroup_devices(0xffffffffffffffff, 0x0, 0x0) 03:07:38 executing program 0: syz_io_uring_setup(0x2b54, &(0x7f00000003c0)={0x0, 0x100b1d2, 0xf}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000440), &(0x7f0000000480)) 03:07:38 executing program 2: r0 = fanotify_init(0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000000)) 03:07:38 executing program 3: r0 = syz_io_uring_setup(0x435c, &(0x7f00000000c0), &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000180)) io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r0, 0xa, 0x0, 0x0) 03:07:38 executing program 2: syz_clone3(&(0x7f0000000340)={0x51000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 03:07:38 executing program 0: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000080), 0x2801, 0x0) 03:07:38 executing program 3: rseq(0x0, 0x0, 0xfffffffffffffffe, 0x0) 03:07:38 executing program 0: select(0x40, &(0x7f0000000100)={0x200}, 0x0, 0x0, 0x0) 03:07:38 executing program 3: r0 = syz_io_uring_setup(0x4151, &(0x7f0000000000), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x8052, r0, 0x0) 03:07:38 executing program 0: select(0x40, &(0x7f0000000100)={0x200}, 0x0, 0x0, 0x0) 03:07:38 executing program 1: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) syz_clone3(&(0x7f0000000180)={0x2250f2500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) 03:07:38 executing program 0: r0 = syz_io_uring_setup(0x6558, &(0x7f0000000100)={0x0, 0x0, 0x2}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000180), &(0x7f00000001c0)) syz_io_uring_setup(0x45fe, &(0x7f0000000200)={0x0, 0x0, 0x23, 0x0, 0x0, 0x0, r0}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000000300), &(0x7f0000000280)) 03:07:38 executing program 1: syz_io_uring_setup(0x435c, &(0x7f00000000c0), &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0, 0x0) syz_io_uring_setup(0x1b62, &(0x7f0000000580), &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000600), &(0x7f0000000640)) 03:07:38 executing program 2: socketpair(0x1d, 0x0, 0x800, &(0x7f0000000000)) 03:07:38 executing program 3: select(0x40, &(0x7f0000000100)={0x200}, &(0x7f0000000140)={0x2}, 0x0, &(0x7f0000000200)) 03:07:38 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1400, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f000010000000000004001400d00c020204", 0x1d}], 0x0, &(0x7f0000010300)) 03:07:38 executing program 1: setregid(0xee00, 0x0) setregid(0x0, 0x0) [ 224.218600][ T5401] loop0: detected capacity change from 0 to 10 03:07:38 executing program 2: syz_io_uring_setup(0x5de7, &(0x7f0000000000)={0x0, 0x4b5e}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, 0x0, 0x0) syz_io_uring_setup(0x3a17, &(0x7f0000000100), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000180), &(0x7f00000001c0)) 03:07:38 executing program 3: syz_io_uring_setup(0x5de7, &(0x7f0000000000), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, 0x0, 0x0) syz_io_uring_setup(0x3a17, &(0x7f0000000100), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000180), &(0x7f00000001c0)) 03:07:38 executing program 1: clock_getres(0xba5b3378fb181a87, 0x0) [ 224.259642][ T5401] SQUASHFS error: Failed to read block 0x60: -5 03:07:38 executing program 1: syz_io_uring_setup(0x8, &(0x7f0000000080), &(0x7f0000002000/0x1000)=nil, &(0x7f0000002000/0x2000)=nil, 0x0, 0x0) [ 224.271166][ T5401] squashfs image failed sanity check 03:07:38 executing program 3: unshare(0x40000) 03:07:38 executing program 2: r0 = socket(0x11, 0x3, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x300}, 0x0) 03:07:38 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0x5460, 0x0) 03:07:38 executing program 3: syz_clone3(&(0x7f0000001800)={0x1a180000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000017c0)=[0x0], 0x1}, 0x58) 03:07:38 executing program 1: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@delrng={0x10}, 0x10}}, 0x0) 03:07:38 executing program 2: r0 = socket(0x11, 0x3, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0xffffff7f}}, 0x0) 03:07:38 executing program 2: socketpair(0x0, 0x4000b, 0x0, 0x0) 03:07:38 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0x8940, 0x0) 03:07:38 executing program 3: syz_io_uring_setup(0x2b54, &(0x7f00000003c0)={0x0, 0xb1d2, 0xf}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000440), &(0x7f0000000480)) syz_io_uring_setup(0x4e8e, &(0x7f0000000000), &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) 03:07:38 executing program 0: r0 = socket(0x11, 0x3, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0xf0ff7f}, 0x0) 03:07:38 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0189436, 0x0) 03:07:39 executing program 1: r0 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) 03:07:39 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100), 0x0) syz_clone(0xaa106200, &(0x7f00000013c0), 0x0, 0x0, 0x0, 0x0) 03:07:39 executing program 2: syz_io_uring_setup(0x2b54, &(0x7f00000003c0)={0x0, 0xb1d2, 0xf}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000440), 0x0) syz_io_uring_setup(0x4e8e, &(0x7f0000000000), &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) 03:07:39 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0x80108906, 0x0) 03:07:39 executing program 1: clock_gettime(0x0, &(0x7f0000000000)={0x0}) clock_settime(0x0, &(0x7f0000000040)={r0}) 03:07:39 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0x5451, 0x0) 03:07:39 executing program 2: syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {}, 0x2c, {[], [{@smackfstransmute={'smackfstransmute', 0x3d, '.'}}]}}) 03:07:39 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_DEVKEY(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10848}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x14}, 0x14}}, 0x0) 03:07:39 executing program 1: syz_clone3(0x0, 0x0) getrusage(0x1, &(0x7f00000000c0)) 03:07:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'syz_tun\x00'}) [ 224.647708][ T5456] fuse: Bad value for 'fd' 03:07:39 executing program 3: syz_io_uring_setup(0x2b54, &(0x7f00000003c0)={0x0, 0xb1d2, 0xf}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000440), &(0x7f0000000480)) 03:07:39 executing program 0: io_uring_setup(0x0, &(0x7f0000000040)={0x0, 0x0, 0xe0e44cf1d498def6}) 03:07:39 executing program 2: select(0x40, &(0x7f0000000100)={0x200}, 0x0, &(0x7f0000000180)={0x2}, &(0x7f0000000200)) 03:07:39 executing program 1: syz_clone(0xaa106200, 0x0, 0x0, 0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) getpgrp(0xffffffffffffffff) 03:07:39 executing program 3: syz_io_uring_setup(0x0, &(0x7f0000000000)={0x0, 0x0, 0x18c6c315a1aee2a2}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) 03:07:39 executing program 2: syz_clone3(&(0x7f0000000240)={0x40000200, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 03:07:39 executing program 0: setuid(0xee01) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) 03:07:39 executing program 3: syz_io_uring_setup(0x75f4, &(0x7f0000000000), &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) syz_io_uring_setup(0x7308, &(0x7f0000000ac0), &(0x7f0000002000/0x3000)=nil, &(0x7f0000004000/0x9000)=nil, &(0x7f0000000b40), &(0x7f0000000b80)) 03:07:39 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0x894c, 0x0) 03:07:39 executing program 0: syz_clone3(&(0x7f0000000540)={0x15008000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 03:07:39 executing program 3: socket(0x11, 0x3, 0x9c) 03:07:39 executing program 0: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0x541b, 0x0) 03:07:39 executing program 1: r0 = socket(0x11, 0x3, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0xf0ff7f00000000}}, 0x0) 03:07:39 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x49, &(0x7f0000000040)={0x77359400}, 0x10) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000080), 0x4) 03:07:39 executing program 3: syz_io_uring_setup(0x8, &(0x7f0000000080), &(0x7f0000002000/0x1000)=nil, &(0x7f0000002000/0x2000)=nil, &(0x7f0000000100), &(0x7f0000000200)) 03:07:39 executing program 0: r0 = socket(0x11, 0x3, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={0x0}}, 0x0) 03:07:39 executing program 1: semget$private(0x0, 0x0, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f00000001c0)=""/33) 03:07:39 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x49, &(0x7f0000000040)={0x77359400}, 0x10) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000000), 0x4) 03:07:39 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x49, &(0x7f0000000040)={0x77359400}, 0x10) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, 0x0, 0x0) 03:07:39 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote, 0x6b}, 0x1c) setsockopt$sock_timeval(r0, 0x1, 0x49, &(0x7f0000000040)={0x77359400}, 0x10) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) 03:07:39 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x49, &(0x7f0000000040)={0x77359400}, 0x10) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000080), 0x4) 03:07:39 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote, 0x6b}, 0x1c) setsockopt$sock_timeval(r0, 0x1, 0x49, &(0x7f0000000040)={0x77359400}, 0x10) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) 03:07:39 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x49, &(0x7f0000000040)={0x77359400}, 0x10) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000000), 0x4) 03:07:39 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x49, &(0x7f0000000040)={0x77359400}, 0x10) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, 0x0, 0x0) 03:07:39 executing program 3: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) syz_open_dev$mouse(&(0x7f0000000500), 0x31, 0x0) 03:07:39 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x49, &(0x7f0000000040)={0x77359400}, 0x10) setsockopt$inet6_tcp_int(r0, 0x6, 0x9, &(0x7f0000000000), 0x4) 03:07:39 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mmap$snddsp(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x55110, r0, 0x0) 03:07:39 executing program 3: socketpair(0x18, 0x0, 0xca2, &(0x7f0000000000)) 03:07:39 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x49, &(0x7f0000000040)={0x77359400}, 0x10) setsockopt$inet6_tcp_int(r0, 0x6, 0x5, &(0x7f0000000000)=0x2, 0x4) 03:07:39 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x49, &(0x7f0000000040)={0x77359400}, 0x10) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000), 0x4) 03:07:39 executing program 3: preadv2(0xffffffffffffffff, &(0x7f0000002540)=[{0x0}, {&(0x7f0000000300)=""/192, 0xc0}, {&(0x7f00000003c0)=""/60, 0x3c}, {&(0x7f00000024c0)=""/100, 0x64}], 0x4, 0x7fffffff, 0x0, 0x1b) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x73, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_GET_NESTED_STATE(r2, 0xc080aebe, &(0x7f0000000440)={{0x0, 0x0, 0x80}}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) 03:07:39 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x49, &(0x7f0000000040)={0x77359400}, 0x10) setsockopt$inet6_tcp_int(r0, 0x6, 0x9, &(0x7f0000000000), 0x4) [ 225.476140][ T5529] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 03:07:39 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x49, &(0x7f0000000040)={0x77359400}, 0x10) setsockopt$inet6_tcp_int(r0, 0x6, 0x5, &(0x7f0000000000)=0x2, 0x4) 03:07:40 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0x120000374}, {&(0x7f0000000700)=""/4096, 0x1002}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 03:07:40 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x49, &(0x7f0000000040)={0x77359400}, 0x10) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000), 0x4) 03:07:40 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x49, &(0x7f0000000040)={0x77359400}, 0x10) setsockopt$inet6_tcp_int(r0, 0x6, 0x5, &(0x7f0000000000)=0x2, 0x4) 03:07:40 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x49, &(0x7f0000000040)={0x77359400}, 0x10) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000080)) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f00000000c0), 0x4) 03:07:40 executing program 3: preadv2(0xffffffffffffffff, &(0x7f0000002540)=[{0x0}, {&(0x7f0000000300)=""/192, 0xc0}, {&(0x7f00000003c0)=""/60, 0x3c}, {&(0x7f00000024c0)=""/100, 0x64}], 0x4, 0x7fffffff, 0x0, 0x1b) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x73, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_GET_NESTED_STATE(r2, 0xc080aebe, &(0x7f0000000440)={{0x0, 0x0, 0x80}}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) 03:07:40 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x40806685, &(0x7f0000000280)={0x1, 0x2, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) 03:07:40 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) write$cgroup_devices(r0, 0x0, 0x9) [ 225.861469][ T5554] fs-verity: sha512 using implementation "sha512-avx2" [ 225.900080][ T38] kauditd_printk_skb: 19 callbacks suppressed [ 225.900092][ T38] audit: type=1400 audit(1645240060.309:231): avc: denied { write } for pid=5550 comm="syz-executor.3" name="kvm" dev="devtmpfs" ino=83 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 03:07:40 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@call]}, &(0x7f0000000040)='GPL\x00', 0x6, 0x99, &(0x7f0000000400)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:07:40 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x11, 0x4, &(0x7f0000000300)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000040)='GPL\x00', 0x6, 0x99, &(0x7f0000000400)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:07:40 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000002840)=[{&(0x7f0000000000)="81", 0x1}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x2) 03:07:40 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x11, 0x4, &(0x7f0000000080)=@framed={{}, [@ldst={0x0, 0x0, 0x1}]}, &(0x7f0000000040)='GPL\x00', 0x6, 0x99, &(0x7f0000000400)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:07:40 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000002840)=[{&(0x7f0000000000)="81", 0x1}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000001680)=[{&(0x7f00000028c0)=""/4096, 0x1000}], 0x1}, 0x0) 03:07:40 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x1, 0x3, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:07:40 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x40806685, &(0x7f0000000280)={0x1, 0x2, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) 03:07:40 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x11, 0x3, &(0x7f00000002c0)=@framed={{}, [], {0x95, 0x74}}, &(0x7f0000000040)='GPL\x00', 0x6, 0x99, &(0x7f0000000400)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:07:40 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x11, 0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="8510"], &(0x7f0000000040)='GPL\x00', 0x6, 0x99, &(0x7f0000000400)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:07:41 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x40806685, &(0x7f0000000280)={0x1, 0x2, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) 03:07:41 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x12, 0x3, &(0x7f0000000300)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:07:41 executing program 2: syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x280e, &(0x7f0000000500)=ANY=[]) 03:07:41 executing program 3: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000001a00)=ANY=[@ANYBLOB="b702000000010000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff6d6405000000000065040400010000000404000001000000b7050000400000006a0a80fe000000008500000053000000b70000000000000095000010000000004e62011c3034fdb117168bd07ba08af339d1a1ee35fe163a255c33282044b32495ef8ab9adc67ccc945ff15d802f5132143c0a9fc7a84452569957c1002ed7d458e17f791f4798c8eb484de03312c69b3edff5be26765ba5f8f2879021c2ea53ac547a654bbd2db5356b971d83c7097aacd7fb38ddf79f2be9087a3e7b7c0efd3e38c794eb06b0b8c392904ae7dd5e4dee88518ddf12dddd4bfc6a4dd3b6beba51074229b0d4b504516c4c3e5d1aa044d8d00728141cd67bcd68f253288e655c6b34e02e90637ef2912ba7de26ff2357ef17f95a25780c3a057826ef4e912f01a201e694e3049b8c8fe8b69524cd19f7525d8d66bb766f7f3f918c86a702522368d9f81897133af94a5a4cff7f4d8b9d8eaf302f0b2e0c252b0000000000000000ee917bca4885bbf597a14ab6458e624faf7f06f30bef08ec48041a2772d88e0c8088f404f011289ebc5623faa1182632161e073af1d69a2e36be115be3b325ecd201d2ffb0a7fa4f5d1106560cdcf071defd0a8be3b69ce3e4f361aca75827426dde87fdf4613222674280f55e98107450c19b861299fcd9ed9d8679406419406bf0c5329bd5b4697336112b0b8756ce3574046bf611a108f8df4d34c5bd6657f4145750de779407304b1a88597840b702b6fa8edfff8faf8b8ec039bab385cac0535373bb8fab90539b1a65ddff841eb671f7faf39a43a66c5540b8762b42007c9ec43193ccf617dbf8a12b4a189edbf9fb7c42b1f435ccd4b19b53b60322af0aa66e8f448e1bd96822e6b70b62912c926dbe417cccc4f696d528fa8a3ea847f10e9b1106f3bb506f1d7fbdf801000000000000006c028eb5b5a073d0de5538ab42e171b3baae34c35987b0dda497ac3f5e97e60eaeea15c6d55badf9b86b1c000100006e60cd06c9ed24313ce607d403bb6030f800000000690db0221b1705c501f802ff59b4e683efa4b6e77e042072bd2ac37d413008ec9eb8166f6e28b49a77ed91befc4d315878f88a8fb1dd679fb4c5557abae6849917dc51a89d47b728502f7e621fc0e3ba04020000c149ee6601728c750930519339b44197c22da8650579475afd96187d881e93b42a5fdfd686d8900c44c67133eeb0109dcb60dddad58037fda65885a15a429edfe3027a5ebf95254744f10fd607bc3100b94932b8d9447c42f6e21ee0e54f8be386bdc09decece910a481e648e0cb074536a25ff581d92af08a06f857311a2f14326b0b290205e91a682e00c8762cbc6b904c980eef6e6ae00f0000000000006a8194479700a02b92bec8d05eae1f24fdd7b80d3dde04c22f689594de2ebb9687219de8d73ac83823feb40500000000000000183ec67be96dc0e4acd7acf1dfe79d6771903b76e2ae47d972651190c22d641030e1ddac018dc3116e1803af20a50fb6f7ba58aca5bcabbbab24414a3810788e5503e4be66d683daac5e0000000000000000108a3c87b19d5b9a00c75d84a92d6dcf00ba96edb95ede0e1957c2a2754258d9fd028096cc15a8b912b494d4bbe609031ea1ca65a548941d5d16296dd08e9edfb2fb3e67897757310d9daebd5a3dabbced3b051129cd60a37d397643324e6f0aadf978d639650000000000000000570b0acbcaa196e6a550e7c2d8cee7a278cee591f360e345d37dc9f8991a16c08d72317c42d2ac9126acd76130ef1086016697e4d51c4b42b2efc8edab88d46bc3d5d6e5a63420aa39035ae46d16d879fc815a5cb84b0d5c8ad970128adf8dec1171e860ca54ce5d6a5aa0327bca4f49a710bf8a8399071237fe5d764e2034873c94a4f21287f3bce3eeb69e94df2e14e4ab10cc7834b30cbc879b80255991dd7aac2e92c9e7c411c019d229c1f1e563152f1c5ae9cda3e8f4966ebfa0c779d624c5a2b7491b8f73e767389ecd1dee951353bb22b7caf89468871520823715cfebd04189c6c6b34bdca6541f6bc0630000000000f94e85f5111add3a3cb5bcace95f38465402c39df835754ef387822c001a25304f3e00b44675d0a23a21dc4023c642cc6f5a75c45a29ab170941533b933600acf9a2d471b73a73178cdf309e5d53311996215b44295dfddc1dd6b81132e999366e460d15d366e84da02b8afc40c45e733f804460ed8300ec34eab2ed80097bd32ff1a6143ab1476037e474ca876187c85bed4191215cd77e6a1fd6399a498b96b9b0cca93255acb08c67e50004c5af6fd5b4ce7c1ebc9202bd7b329a4d2530486d5999dd7f90ebecca17f2869135438f0540801f97481daf9ec94b799c12e714d573e2a6331f496254f254a60c52b2026ed6a72c82cd191490fabe7b151f92e5d700f21830d613fb8e73ddaa621b5f8e78d36f16e490f305b3845a78817e59bf7ed36471dbca01d39e50ae2535460e1d2f2614940647233a02d5000000000000000000f70e52f0d56f6a4dcf7e57c03d4b4add382672669fdc1e0f320304d0d2b308c5ed3956eae263035d703f862224e9818a3d7ac27079bd2b299994b48f1fdcfb0c7ce93a5113af87585293960a80ac63c54e55063bf8d24639e561253ef0caf6c58118120d8acecc0528f0d81d291009fc46401baf9c22d1c452a5b41b7a1b9adfcc17f5ad99dcdf935923185db7b14a7fa7babc1f53df70618bb73aa810b756696f26653b84cf842ae433fda59fbe31f688d2724568cc396fca7c74984b7f7bd033c1d062376eb45e3e5857fc6598c933610be3749065179dc8622b0722259e922f40000000000000000000006658ed5bb5aae769ac603dfd6b9cc99eeda316cbad8d5817ecb3364b67748600c7df4123b570ce3eccf4c18f5e4d382b36731ef2c4f960ce005126ffd9e3d6b01e253284eb15e2bf70762fa1ea6587b7270a2cf00a4b29cabf5adf82a74e974efda8971a1968be484ff8bc41a7ab6767754346010cad6cc15fcd0994a125e83bfc20870214c38506811a6a263280feda6fb2abacd181a174831837e6114b4bb958254752ebeba438e107b275ecc77eb4066d09ffa8fed6a1ee704436f34eac332560b22dd80b227483c74ecdda8e1de2d05dae1779da4bd40046421de106d7ad26f3af1bbbde0e1f138aa82456e5df95514122304c5b8fe1f548154b15c9042700c305706273be555f3f0a103eede8ea19dcb267fdf2af859e2fb954cfa4494ddd692d19a87274fe24ab361de49d56bfc822fcb27a60cda242d96ae45b8c80208447897401d7438253b5739cb9f802826dfed26add438ca9ba47ea3966cd7c988f4cbbe6bde26e9e417032e5d15170970d7fec7fa699258c2ad2dc71e55094b555488d41b16fb1e01b7d28918a65548caeef4fe6cc8029dbcaf973fed50ef93b99175e3a9af8e7ef3c57c931fbe137f1de23e9214c9e1513f782c5a6ce8021fea23140f87687df4ad0ef781e8d5800bf3d7094a517cc0973d50e45665b5bb9fd79ffac8dda90c84d15161be3f580cdcff5422f3ff43781b2d582299a18222e1f8f1fcad9d640175a5458c185a2a65f0717155c58ccdf1649731a8e182c46cdb5d731228bf428985375f8e2f9b012bddf71540bb53c305967303cf39ae70ee67ffd76a2956bd427104e79d9e9da845f28a18fe95038df1dec7a2f05c2c80c147dbc229f75deedd2546c5f985a1952df27d7125d091a80cfe6df1d35a24f1903cc014414743de8c3647a5983654d1b37f6bdb249565f0866535e3152f5b463fd6226cd0460447f625edf27670da5b09d2f27fca173e261acbeec1e8a19facfbee73b77f1df07e0f6fcbc26dcd3566f3e2cbd245eb596500f238c2fd72e150bef8f49fab2371123425291c3000000e3f03b11e6291534d2284543c80f1362ff61cf0b7d5066c943548821ba0b9070c9ecef86cfec7c2dde02faafc3"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x2, 0xe, 0x0, &(0x7f0000000040)="72aee263eb2507c15cf8fdb64953", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 03:07:41 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x19, 0x2, &(0x7f00000000c0)=@raw=[@cb_func], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:07:41 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000f00)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000001540)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001180)=[{0x10}], 0x10}, 0x0) 03:07:41 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x40806685, &(0x7f0000000280)={0x1, 0x2, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) 03:07:41 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x11, 0x5, &(0x7f0000000300)=@framed={{}, [@map_fd={0x18, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x98000000}]}, &(0x7f0000000040)='GPL\x00', 0x6, 0x99, &(0x7f0000000400)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:07:41 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000004fc0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002dc0)=[{0x18, 0x0, 0x0, "b4"}, {0x78, 0x0, 0x0, "3a310d33bdb13f73112e2fc51d65e0cca748154d2c4ba9b8bbb49d30ddc8718b7d36fcf907cfa227db22497b09f84aaa2639a4569367f2d6e199d7659e01d18b48fc35fda51c3e46e7cecdeb2a958ba4a4bac98f8e517094c842ff5538a4236850"}, {0x1010, 0x0, 0x0, "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"}, {0xb0, 0x0, 0x0, "b1fcfe776dcb572d38ef80e5535ad43dfa6483e0af536fea89c84bcd7b6e01c27b1cce56b63c0514654fdd6e44ecfbb5e61b5af66411b9c79f067c40b966be4cf3082913f78190cc732b5b403986087f36764ce6ba29938064737d19365c82161668ad7069e463b86a8750823d27e91d1af3bc7edbc6a39d513ce335fd1776f38abd95205ffc5b02d60fc0d16a53fe5f8e83155e07931d3157"}, {0xeb8, 0x0, 0x0, "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"}], 0x2008}, 0x0) 03:07:41 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict={0x1}]}}, &(0x7f0000000240)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:07:41 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000f00)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000001540)={&(0x7f0000000f40)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "d594e8c9d0b41c5446a4e0310093c82c101e17703adce3850ed70e41c2f1f501f39d4fd26c11999db06976bbcc2c673fa290724a64e382630b09865e0616ac"}, 0x80, &(0x7f0000001140)=[{&(0x7f0000000fc0)='1', 0x1}], 0x1, &(0x7f0000001180)=[{0x10}], 0x10}, 0x20000001) [ 226.738640][ T38] audit: type=1400 audit(1645240061.149:232): avc: denied { write } for pid=5602 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 03:07:41 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x5, &(0x7f0000000080)=@framed={{}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffd}]}, &(0x7f00000000c0)='syzkaller\x00', 0x7, 0xc4, &(0x7f0000000100)=""/196, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:07:41 executing program 0: syz_clone(0x10070000, 0x0, 0x0, 0x0, 0x0, 0x0) 03:07:41 executing program 2: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f00000006c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) sendmsg$inet(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) write$cgroup_devices(r2, &(0x7f0000000180)={'c', ' *:* ', 'm\x00'}, 0x8) 03:07:41 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x2, &(0x7f00000000c0)=@raw=[@cb_func], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x2}, 0x80) 03:07:41 executing program 0: bpf$PROG_LOAD(0x13, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:07:41 executing program 3: bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000c40)={@map=0x1, 0xffffffffffffffff, 0x7}, 0x10) 03:07:41 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000f00)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000002580)="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", 0xec1}], 0x1}, 0x0) 03:07:41 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000f00)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="04e52545407e418adcf7388b18ba109b703d3ebd0f87941ba29df5ec0933ab70272317092cf9ce42e7ef8d64b1d982f06e", 0xfffffffffffffe2e}], 0x1}, 0x4000010) 03:07:41 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000f00)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000001540)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001180)=[{0x10}], 0x10}, 0x20000001) 03:07:41 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x0, 0xf4240, &(0x7f00000000c0)=@raw=[@cb_func], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:07:41 executing program 3: bpf$PROG_LOAD(0xe, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:07:41 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000f00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) 03:07:41 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000f00)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000fc0)='1', 0x1}, {&(0x7f0000001580)="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"/4095, 0xfff}, {0x0}, {&(0x7f0000000080)='v', 0x1}], 0x4}, 0x0) 03:07:41 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000f00)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000000fc0)="31d6", 0x2}], 0x1, &(0x7f0000001180)=[{0x10}], 0x10}, 0x20000001) 03:07:41 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000f00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, 0x0) 03:07:41 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x15, 0x2, &(0x7f00000000c0)=@raw=[@cb_func], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:07:41 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000f00)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000000fc0)="31d6", 0x2}], 0x1, &(0x7f0000001180)=[{0x10}], 0x10}, 0x20000001) 03:07:41 executing program 2: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000480)='ns/mnt\x00') 03:07:41 executing program 0: bpf$PROG_LOAD(0x4, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:07:41 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x5f6f6c7dd3d2bcf0, 0x2, &(0x7f00000000c0)=@raw=[@cb_func], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:07:41 executing program 1: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f00000001c0)=""/115, 0x73}], 0x1}, 0x0) [ 227.096437][ T38] audit: type=1400 audit(1645240061.509:233): avc: denied { read } for pid=5646 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 03:07:41 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000140)) 03:07:41 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict]}}, &(0x7f0000000240)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:07:41 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) 03:07:41 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_DEV_STATS(r0, 0xc4089434, 0x0) 03:07:41 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff}) faccessat2(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) [ 227.128605][ T38] audit: type=1400 audit(1645240061.539:234): avc: denied { write } for pid=5652 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 03:07:41 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, 0x0, 0x0, 0x0) 03:07:41 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x440000, 0x0) 03:07:42 executing program 1: statx(0xffffffffffffffff, &(0x7f0000003200)='./file0\x00', 0x0, 0x0, 0x0) 03:07:42 executing program 3: statx(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x0, 0x0) 03:07:42 executing program 2: clock_gettime(0x3, &(0x7f0000001440)) 03:07:42 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) 03:07:42 executing program 2: pselect6(0x40, &(0x7f0000000080), 0x0, &(0x7f0000000180)={0xffbfffff}, 0x0, 0x0) 03:07:42 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/net\x00') ioctl$TUNSETFILTEREBPF(r0, 0x4b47, 0x0) 03:07:42 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@fwd={0x3}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000480)=""/174, 0x28, 0xae, 0x1}, 0x20) 03:07:42 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x4, &(0x7f0000000640)=@framed={{}, [@alu={0x7, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0x5, 0x9a, &(0x7f0000000180)=""/154, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:07:42 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000003c0)=ANY=[@ANYBLOB="9feb01001800000000000000800000008000000004000000000000000100000d"], &(0x7f0000000140)=""/236, 0x9c, 0xec, 0x1}, 0x20) 03:07:42 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/net\x00') ioctl$TUNSETFILTEREBPF(r0, 0xb703, 0x0) 03:07:42 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0xc1, 0x0) 03:07:42 executing program 1: syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/net\x00') syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/net\x00') [ 228.044323][ T38] audit: type=1400 audit(1645240062.449:235): avc: denied { ioctl } for pid=5684 comm="syz-executor.0" path="net:[4026532866]" dev="nsfs" ino=4026532866 ioctlcmd=0xb703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 03:07:42 executing program 2: syz_clone(0x960c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 03:07:42 executing program 0: syz_clone(0x118e0000, 0x0, 0x0, 0x0, 0x0, 0x0) 03:07:42 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x5, 0x9a, &(0x7f0000000180)=""/154, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_ext={0x1c, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x80) 03:07:42 executing program 1: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/net\x00') ioctl$TUNSETFILTEREBPF(r0, 0x5460, 0x0) 03:07:42 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x4, &(0x7f0000000080)=@framed={{}, [@jmp={0x3, 0x0, 0xd, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000140)='syzkaller\x00', 0x2, 0x9a, &(0x7f0000000180)=""/154, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:07:42 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x5, 0x9a, &(0x7f0000000180)=""/154, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x84) 03:07:42 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000012c0)={0x0, &(0x7f00000000c0)=""/136, 0x1000000, 0x88, 0x1}, 0x20) 03:07:42 executing program 1: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/net\x00') ioctl$TUNSETFILTEREBPF(r0, 0xc0189436, 0x0) 03:07:42 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/pid\x00') syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/pid_for_children\x00') syz_open_procfs$namespace(0x0, 0x0) 03:07:42 executing program 1: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/net\x00') ioctl$TUNSETFILTEREBPF(r0, 0xb702, 0x0) 03:07:42 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000080)={'ip6gre0\x00', 0x600}) 03:07:42 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000003280)={0x0, 0x4f, 0x0, 0x3b}, 0x0) 03:07:42 executing program 0: syz_clone(0x38805500, 0x0, 0xfffffffffffffecc, 0x0, 0x0, 0x0) 03:07:42 executing program 1: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/net\x00') ioctl$TUNSETFILTEREBPF(r0, 0x5450, 0x0) 03:07:42 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x4, &(0x7f0000000640)=@framed={{}, [@alu={0x7, 0x1, 0x0, 0x0, 0x0, 0xffffffffffffffe0}]}, &(0x7f0000000140)='syzkaller\x00', 0x5, 0x9a, &(0x7f0000000180)=""/154, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:07:42 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x4, &(0x7f0000000080)=@framed={{}, [@jmp={0x3, 0x0, 0xc}]}, &(0x7f0000000140)='syzkaller\x00', 0x2, 0x9a, &(0x7f0000000180)=""/154, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:07:42 executing program 1: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/net\x00') ioctl$TUNSETFILTEREBPF(r0, 0x541b, 0x0) 03:07:42 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000010c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@func={0x5}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 03:07:42 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x19, 0x4, 0x4, 0x40, 0x0, 0x1}, 0x48) [ 228.452048][ T38] audit: type=1400 audit(1645240062.859:236): avc: denied { getattr } for pid=5723 comm="syz-executor.1" path="net:[4026533054]" dev="nsfs" ino=4026533054 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 03:07:42 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/pid_for_children\x00') ioctl$TUNSETFILTEREBPF(r0, 0xb702, 0x0) 03:07:42 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x4, &(0x7f0000000080)=@framed={{}, [@jmp={0x3, 0x0, 0xc}]}, &(0x7f0000000140)='syzkaller\x00', 0x2, 0x9a, &(0x7f0000000180)=""/154, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:07:42 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x19, 0x4, 0x8, 0x40, 0x0, 0x1}, 0x48) 03:07:42 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x4, &(0x7f0000000080)=@framed={{}, [@jmp={0x3, 0x0, 0xc}]}, &(0x7f0000000140)='syzkaller\x00', 0x2, 0x9a, &(0x7f0000000180)=""/154, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:07:42 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = getpid() r1 = syz_open_procfs$namespace(r0, &(0x7f0000000080)='ns/mnt\x00') ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, 0x0) 03:07:42 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETFILTEREBPF(r0, 0x541b, 0x0) 03:07:42 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x5, 0x9a, &(0x7f0000000180)=""/154, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x1e) 03:07:42 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000003c0)=ANY=[@ANYBLOB="9feb01001800000000000000800000008000000004000000000000000100000d000000000100000004000000010000000000000e"], &(0x7f0000000140)=""/236, 0x9c, 0xec, 0x1}, 0x20) 03:07:42 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x4, &(0x7f0000000080)=@framed={{}, [@jmp={0x3, 0x0, 0xc}]}, &(0x7f0000000140)='syzkaller\x00', 0x2, 0x9a, &(0x7f0000000180)=""/154, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:07:43 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@fwd]}}, &(0x7f0000000480)=""/174, 0x26, 0xae, 0x1}, 0x20) 03:07:43 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x5, 0x9a, &(0x7f0000000180)=""/154, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000040)=[0x0], &(0x7f00000000c0)=[0x0], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000000340)}}, 0x10) 03:07:43 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000001400)=@base={0xe}, 0x48) 03:07:43 executing program 1: readlinkat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/9, 0x9) 03:07:43 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) recvmmsg(r0, 0x0, 0x0, 0x2141, &(0x7f0000001f80)) 03:07:43 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) recvmmsg(r0, &(0x7f0000001ec0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2141, 0x0) 03:07:43 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) recvmmsg(r0, &(0x7f0000001ec0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 03:07:43 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) fsetxattr(r0, &(0x7f0000000040)=@known='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) 03:07:43 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) read$char_usb(r0, 0x0, 0xfffffffffffffed0) 03:07:43 executing program 3: symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00') statfs(&(0x7f00000000c0)='./file0\x00', 0x0) 03:07:43 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) recvmmsg(r0, &(0x7f0000000000)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40002001, &(0x7f0000000040)={0x77359400}) 03:07:43 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x1000, 0x0) [ 228.714953][ T38] audit: type=1400 audit(1645240063.119:237): avc: denied { setattr } for pid=5763 comm="syz-executor.1" name="full" dev="devtmpfs" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:null_device_t tclass=chr_file permissive=1 03:07:43 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0xca901, 0x0) write$P9_RREADDIR(r0, 0x0, 0x0) 03:07:43 executing program 1: symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00') setxattr$incfs_size(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0), 0x0, 0x0, 0x0) 03:07:43 executing program 3: symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00') truncate(&(0x7f0000000040)='./file0/file1\x00', 0x0) 03:07:43 executing program 2: pipe(&(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_freezer_state(r0, 0x0, 0xfffffffffffffc72) 03:07:43 executing program 0: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000, 0x0) 03:07:43 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) utimensat(r0, 0x0, 0x0, 0x0) 03:07:43 executing program 3: openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/cgroup', 0xee757a527baf7fce, 0xcc) 03:07:43 executing program 1: setxattr$security_evm(&(0x7f0000000200)='./file0\x00', &(0x7f0000000180), &(0x7f0000000300)=@v2={0x0, 0x0, 0x0, 0x0, 0x58, "b1113173a7d51e15f07864b87b418d6553ed78d63c554794fa8d86c321bb3edda33397cdb7a5ce9bcdc7c6c523105a0c660ab2c63be33b32f5cc8747eea2dc74e4d11fa564973c619dd313e767b908ba13b49e61d170ce40257a8fcd52882e8022980acfd6558ec0109db439b00dc655c69c27b704c83f152a355dcb37a96b49e573c23505ecf5b03eab0792041b9228b34cee90bfd017fceef5fa9eb6bf3b00f22eccbef36f934bcf2a8043fca52c"}, 0xfffffffffffffd61, 0x2) 03:07:43 executing program 2: r0 = socket(0x2, 0x3, 0x1) getsockname$packet(r0, 0x0, &(0x7f0000000280)) 03:07:43 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080), 0xfffffffffffffdde, 0x0) 03:07:43 executing program 3: setxattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000005c0)=ANY=[], 0x0, 0x0, 0x0) 03:07:43 executing program 2: r0 = socket(0x2, 0x3, 0x1) sendmsg(r0, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffd0e}, 0x0) 03:07:43 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) recvmmsg(r0, &(0x7f0000001ec0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40, &(0x7f0000001f80)) 03:07:43 executing program 3: pipe(&(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_freezer_state(r0, 0x0, 0x5e) 03:07:43 executing program 2: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$tun(r0, 0x0, 0x0) 03:07:43 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='comm\x00') write$cgroup_freezer_state(r0, 0x0, 0x0) 03:07:43 executing program 1: r0 = socket(0x2, 0x3, 0x1) fcntl$getown(r0, 0x9) 03:07:43 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) recvmmsg(r0, &(0x7f0000001ec0)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000080)=""/200, 0xc8}], 0x1}}], 0x1, 0x0, 0x0) 03:07:43 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$char_usb(r0, &(0x7f0000000040), 0x0) 03:07:43 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x8101, 0x0) write$tun(r0, 0x0, 0xe) 03:07:43 executing program 0: symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00') lsetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)=@known='user.incfs.id\x00', 0x0, 0x0, 0x0) 03:07:43 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000001400)=@base={0xe, 0x0, 0x0, 0x8}, 0x48) 03:07:43 executing program 2: symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00') symlinkat(&(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffff9c, &(0x7f00000000c0)='./file0/file0\x00') 03:07:43 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x10d41, 0x0) 03:07:43 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) recvmmsg(r0, 0x0, 0x0, 0x160, 0x0) 03:07:43 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/fs/cgroup', 0x0, 0x0) getdents(r0, &(0x7f00000001c0)=""/4096, 0x1000) 03:07:43 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/class/power_supply', 0x0, 0x0) read$char_usb(r0, 0x0, 0x0) 03:07:43 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/fs/cgroup', 0x0, 0x0) getdents(r0, &(0x7f00000001c0)=""/4096, 0x1000) 03:07:43 executing program 3: pselect6(0x0, 0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)={0x0, 0x3938700}, &(0x7f0000000140)={0x0}) 03:07:43 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, 0x0) 03:07:43 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001000), 0x0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, 0x0) 03:07:43 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/fs/cgroup', 0x0, 0x0) getdents(r0, &(0x7f00000001c0)=""/4096, 0x1000) 03:07:43 executing program 2: semget$private(0x0, 0x3, 0x5ff1e3975333fbba) 03:07:43 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, 0x0) 03:07:43 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/fs/cgroup', 0x0, 0x0) getdents(r0, &(0x7f00000001c0)=""/4096, 0x1000) 03:07:43 executing program 2: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) 03:07:43 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2) 03:07:43 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000080)) 03:07:43 executing program 1: semget(0x3, 0x0, 0x44) 03:07:43 executing program 2: openat$dir(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) 03:07:43 executing program 0: semget$private(0x0, 0x4, 0x70) 03:07:43 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, 0x0) 03:07:43 executing program 3: getresuid(&(0x7f0000000140), &(0x7f0000000040), &(0x7f0000000000)=0x0) setreuid(r0, 0x0) 03:07:43 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETVNETLE(r0, 0x400454dc, 0x0) 03:07:43 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, 0x0) 03:07:43 executing program 1: pselect6(0x40, &(0x7f0000000000)={0x8}, 0x0, 0x0, 0x0, 0x0) 03:07:43 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) 03:07:43 executing program 2: r0 = semget$private(0x0, 0x5, 0x0) semctl$GETPID(r0, 0x0, 0xb, 0x0) 03:07:43 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, 0x0) 03:07:43 executing program 1: r0 = semget(0x3, 0x0, 0x0) semctl$IPC_STAT(r0, 0x0, 0x2, &(0x7f0000000100)=""/112) 03:07:43 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x4082, 0x0) 03:07:43 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x200900, 0x0) 03:07:43 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x200080, 0x0) 03:07:43 executing program 1: openat$tun(0xffffffffffffff9c, &(0x7f0000000340), 0x20000, 0x0) 03:07:43 executing program 3: semctl$SEM_STAT_ANY(0x0, 0x3, 0x14, &(0x7f0000000080)=""/5) 03:07:43 executing program 1: msgget$private(0x0, 0x588) 03:07:43 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) recvfrom(r0, &(0x7f0000000100)=""/23, 0x17, 0x0, 0x0, 0x0) 03:07:43 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x16c) 03:07:43 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$VT_RESIZE(r0, 0x5609, 0x0) 03:07:43 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000700), 0x6100, 0x0) 03:07:43 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, 0x0) 03:07:43 executing program 3: openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x40200, 0x0) 03:07:43 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x16c) 03:07:43 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$KDGKBDIACR(r0, 0x4b4a, 0x0) 03:07:44 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000000)={{}, './file0/file0\x00'}) 03:07:44 executing program 1: readlinkat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/171, 0xab) 03:07:44 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x16c) 03:07:44 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc4}, &(0x7f0000000080)={0x0, "9e9ccb7871b68c051a583f4a00917053559cae1516ef914b6b813865a69b93aae2754d74ac3cff4ee3ece9b64803cb2adaf4db0977aee1793b88443b806614fd"}, 0x48, 0xfffffffffffffffc) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0)=@chain) [ 230.300140][ T38] audit: type=1400 audit(1645240064.719:238): avc: denied { write } for pid=5905 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 03:07:44 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@alu={0x4}]}, &(0x7f0000000100)='GPL\x00', 0x4, 0x97, &(0x7f0000000140)=""/151, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:07:44 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x16c) [ 230.329982][ T38] audit: type=1400 audit(1645240064.739:239): avc: denied { read } for pid=5908 comm="syz-executor.0" name="autofs" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 03:07:44 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0xa, 0x28011, r1, 0x0) 03:07:44 executing program 3: pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) getpeername$unix(r0, 0x0, 0x0) [ 230.365402][ T38] audit: type=1400 audit(1645240064.739:240): avc: denied { open } for pid=5908 comm="syz-executor.0" path="/dev/autofs" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 03:07:44 executing program 3: unshare(0x6c060000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) r2 = socket$nl_route(0x10, 0x3, 0x0) dup2(r2, r0) 03:07:44 executing program 0: r0 = socket$unix(0x1, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8941, 0x0) 03:07:44 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) dup3(r0, r1, 0x0) 03:07:44 executing program 0: r0 = socket$unix(0x1, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8941, 0x0) 03:07:44 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) ioctl$SNDCTL_SEQ_NRMIDIS(r0, 0x4004510d, 0x0) 03:07:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg(r0, &(0x7f0000000d00)=[{{&(0x7f00000000c0)=@un=@abs={0x0, 0x2, 0xffffff7f}, 0x80, 0x0}}], 0x1, 0x0) 03:07:44 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$vhost_msg_v2(r0, &(0x7f0000000180)={0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}}, 0x48) 03:07:44 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x440, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 03:07:45 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$SNDCTL_SEQ_OUTOFBAND(r0, 0x40085112, &(0x7f0000000040)=@t={0x81}) 03:07:45 executing program 1: r0 = socket$unix(0x1, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x891d, &(0x7f00000000c0)={'batadv_slave_1\x00'}) 03:07:45 executing program 3: unshare(0x6c060000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) r2 = socket$nl_route(0x10, 0x3, 0x0) dup2(r2, r0) 03:07:45 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$SNDCTL_SEQ_OUTOFBAND(r0, 0x40085112, &(0x7f0000000100)=@e={0xff, 0x1, 0x0, 0x0, @generic}) 03:07:45 executing program 1: semget$private(0x0, 0x2, 0x5be) 03:07:45 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x0, 0x0, 0x0) 03:07:45 executing program 2: open(&(0x7f0000000080)='./file0\x00', 0x4540, 0x0) 03:07:45 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r0, r1, 0x0) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x4100) 03:07:45 executing program 0: syz_emit_ethernet(0xee, &(0x7f0000000280)=ANY=[@ANYBLOB="ffffffffffffffffffffffff86dd6bdd556800b83a0000000100000000000000000000000001e3"], 0x0) 03:07:45 executing program 2: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(0x0, 0x2, 0x141101) dup(r0) write$6lowpan_enable(0xffffffffffffffff, &(0x7f0000000000)='0', 0xfffffd2c) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = dup(r1) write$UHID_INPUT(r2, &(0x7f0000001300)={0xd, {"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", 0x1000}}, 0x1006) 03:07:45 executing program 3: syz_emit_ethernet(0x46, &(0x7f0000000480)={@broadcast, @remote, @val, {@ipv6}}, 0x0) 03:07:45 executing program 1: syz_mount_image$tmpfs(&(0x7f0000001480), &(0x7f00000014c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)={[{}]}) 03:07:45 executing program 0: r0 = syz_clone(0x441a8000, 0x0, 0x0, 0x0, &(0x7f0000000140), 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={r0, 0xffffffffffffffff}, 0xc) [ 230.944808][ T38] kauditd_printk_skb: 8 callbacks suppressed [ 230.944827][ T38] audit: type=1400 audit(1645240065.349:249): avc: denied { mount } for pid=5958 comm="syz-executor.1" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 03:07:45 executing program 3: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f00000001c0)) open_by_handle_at(r0, &(0x7f0000000180)=@orangefs={0x14, 0x1, {"d74c216581b51cd6ef77072e394bdf88"}}, 0x0) 03:07:45 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}, 0x1, 0x0, 0xf0}, 0x0) [ 231.031068][ T5965] loop3: detected capacity change from 0 to 224 [ 231.059354][ T38] audit: type=1400 audit(1645240065.479:250): avc: denied { unmount } for pid=3703 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 03:07:45 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000001100)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000140), 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={0x0}, 0x10) r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r1) close(r2) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x2, 0x0) write$binfmt_misc(r2, &(0x7f0000000180)={'syz1'}, 0x20000184) ioctl$int_in(r2, 0x5421, &(0x7f0000000000)=0x4000003fd) write(r3, &(0x7f0000000340)='R', 0x1) write(r0, &(0x7f0000000080)="2400000012005f3414f9f40700090400818a0400"/36, 0x24) [ 231.116736][ T38] audit: type=1400 audit(1645240065.509:251): avc: denied { mount } for pid=5964 comm="syz-executor.3" name="/" dev="loop3" ino=1792 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:iso9660_t tclass=filesystem permissive=1 03:07:45 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'team_slave_0\x00', 0x2}) [ 231.152247][ T38] audit: type=1400 audit(1645240065.539:252): avc: denied { unmount } for pid=3701 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:iso9660_t tclass=filesystem permissive=1 03:07:45 executing program 2: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(0x0, 0x2, 0x141101) dup(r0) write$6lowpan_enable(0xffffffffffffffff, &(0x7f0000000000)='0', 0xfffffd2c) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = dup(r1) write$UHID_INPUT(r2, &(0x7f0000001300)={0xd, {"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", 0x1000}}, 0x1006) 03:07:45 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000200)='syz1\x00', 0x200002, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newtaction={0xb4, 0x30, 0xffff, 0x0, 0x0, {}, [{0xa0, 0x1, [@m_police={0x6c, 0x1, 0x0, 0x0, {{0xb}, {0x40, 0x2, 0x0, 0x1, [[@TCA_POLICE_TBF={0x3c}]]}, {0x4}, {0xc}, {0xc}}}, @m_gact={0x30, 0x2, 0x0, 0x0, {{0x9}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}, 0xb4}}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0}, 0x10) r2 = openat$cgroup_int(r1, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r2, 0x0, 0x0) 03:07:45 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000001100)=ANY=[@ANYBLOB="620af8ff0c200021bfa100000000000007010000f8ffffffb702000003000000bd120000000000008500000006000000b70000000000000095000000000000003faf4f2aa3d9b18ed81294e2c49e8020a6f4e0e4a9446c7670568982b4e020f698393aa0f3881f9c24aa56f15199fad0093c59d66bfc0931613899f829c65326ecc65ece9f36c70d0f13905ea23c22624cbf87f9793f50b3546040677b0c5077da80fb982c1e9400e693146cea484a415b76966118b64f751a0f241b072e90080008002d75593a286cecc93e64c227c95aa1b784625704f07a72c29184ff7f0000cef809606056fe5c34664c0af9360a1f7a5e6b607130c89f18c0c1089d8b8588d72ec29c48b45ef4adf634be763289d01aa27ae8b09e00e79ab20b0b8e12643981af2ad0000000000000006fa03c6400002089b302d7bf6023cdcedb5e0125ebbcebdde510cb2364149215108333719acd97cfa107d40224edc5465a932b77e74e802a0d42bc6099ad2300000080006ef6c1ff0900000000000010c63a949e8b7955394ffa82b8e942c89112ff7f0000bfeda7be586602d985430cea0162ab3fcf4591c926abfb076719237c8d0e60b0eea24492a660583eecdbf5bcd3de3a83209da17a0faf60fd6ad9b97aa5fa68480366c9c6fd6fa5043aa3926b81e3b59c9b001d6a08000000ea2b1a52496dfcaf99431412fd134a996382a1a04d5bb924cfe5f3185418d605ffff9c4d2ec7c32f2095e63c80aff9fa740b5b7632f32030916f89c6dad7603f2ba2a790d62d6faec2fed44da492a730142ba11de6c5d50b83bae616c9054d1e7c13b1355d6f4a8245ffa4997da9c77af4c0eb97fca585ec6bf58351d564beb6d952aab9c70764b0a8a7583c90b3433b809bfe9fbd48bc873495cbff8a326eea31ae4e0f75ad149bc9982bacfb72eca44c39fc05ebf6c9d13330ca006bce1a84521f14518c9b476fccbd6c712016219848624b87cec2dbe98223a0eb4fa39f6b5c02e6d6d90756ff57902a8f57000010009700cf0b4b8bc2294133000000000000000000030000000000000000000000000010008bc0d9559711e6e8861c46495ba585a4b2d02edc3e28dd271c896249ed85b980680b6c4a000000002b435ac15fc0288d9b2a169cdcacc413b48dafb7a2c8cb482bac0ac502d9ba96ffffff7f00000000df73d683bb7d5ad897ef3b7cda42013d53046da21b40216e14ba2d6af8656bfff17addaedab25b30002abbba7fa725f38400be7c1f001b2cd317902f19e385be9e48dccff729433282830689000053b263339863297771429d120000003341bf4a00fca0493cf29b33dcc9ffffffffffffffd39fec2271ff01589646efd1cf870cd7bb2366fde4a594290c2a5fe870ce5dfd3467decb05cfd9fcb32c8ed1dbd9d10a64c108285e71b5565b1768ee58969c41595229df17bcad70fb4021428ce970275d13b78249788f11f761038b75d4e832b561d46ea3abe0fa4d30dc94ef241875f3b4b6ab7929a57affe7d7fa29822aea68a660e717a04becff0f719197724f4fce1093b62d7e8c7123d8ecbbc55bf404e4e1f74b7eed82571be54c72d978cf906d020000000000faff9d119f2c06f815312e0cfe222a06f56dd022c074eb8a5fc47bd6322fb0bf47c0a8d154cb05c37feaf3dd95f6ef2acd1f8082786105c7df8be5877050c91301bb997316dbf17866fb84d417373195ff2e1c5560926e90109b598502d3e959efc71f665c4d75cf2458e3542c9062ece87f99a061887a20639b41c8c12ee86c50804042b3eac1f879b136345cf67ca3fb5aac518a75f9e7d7101d5e186c489b3a06fb99e0aa7f23a054de2f4d92d6bd72ee2c9fdc75aaaf1e3e483b4ad05573af403269b4a39ce40293947d9a631bcbf3583784acbda216550d7aec6b79e30cbd128f54c2d3335457acf366d644b19247832258c3b377327ac9ecc34f24c9ae153ec60ac0694da85bff9f5f4d780000000000000000d6b2c5ea1393f3f24285bf16b99c9cc0ad1857216f1a985f369191ae954febb3df464bfe0f7f3ee9afe7befb89d2777399f5874c553aeb3729cffe86e66964ae09bb6d163118e4cbe024fd452277c3887d6116c6cc9d8046c216c1f895778cb26e22a2a998de44aeadea2a40da8daccf080842a486721737390cbf3a74cb2003016f1514216bdf57d2a40d40b51ab63e96ec8485b3b8a8c9ae3d14f93100c2e0893862eef552fcde2981f48c482bde8a168c3f5db2fea6f26e4a4304e50c349f4f9ecee27defc93871c5f99b355b72d538ba4958ea8e4aa37094191e10096e7e60fc3545a2c905a1a95e9571bf38ae1981c4238ecaee6f75cd0a6881bd1517a8250df98674152f94c12409e2a3bce109b6000000000000000000d6d5210d7560eb929c4a45d6a97a27602b81f76386f153633e28e1a5ccb7826e293d04a8a6fd45138dd65153c277b0c6bc5a1fad6ec9a31137abf9a404abde7750898b1bd627e87306703be8672d70d1ab57075228a9f46ed9bd1f08fb8191bbab2dc51de3a61f0868afc4294859323e7a45319f18101288a0268893373750d1a8fe64680b0a3fc22dd704e4214de5946912d6c98cd1a9fbe1e7d58c08acaf30235b928a31d2eca55f74a23641f61f2d5b308cf0d031b0c7f0ced69993e9960ff5f76024e6009756237badf4e7965bbe2777e808fcba821aa8e8c5c38cda54e14356cb4900000000000000000000000000c1fee30a3f7a85d1b29e58c77685efc0ceb1c8e5729c66418d169fc03aa188546b3ad2a182068e2209c96be662a51e3a0e2505bc7f41019645466ac96e0d4b3bc19faa5449209b085f3c334b47f067bbab40743b2a428f1da1f68df75cf41f00000078053726602111b40e761fd21081920382f14d12ca3c3431ee97471c7868c6da7eaa69eb7f7f80572fdd11bb1d0d1280fbc22fc5ed1762eb0b428ee751c47d8e894f745a868404a0bf35f0121008b722b1eaa6aedfa1bf2e7ccb2d61d5d76331945e20fa26b8471d42645288d7226bbd9c9e9e1cc9eb3d541e407cc2dae5e690cd668ab84875f2c50ba891cea599b079b4b4ba686fcdf240430a537a395dc73bda367bf12cb7d81691a5fe8c47be395656a297e9df0e71f96756ea5cce7daac4be290159f6bcd75f0dda9de5532e71ae9e48b0ed1254b81faae79b6af6fbb869604d51a36a54c832e45b2569dc0d90b075225fde44c4e097a1ff52f60f455f4c253171ad47d6b70ebc660309e1e245b0fdf9743af930cd6db49a47613808bad959d8beb91af495719a64a43971679bc7d4c7a56610214c7fceeca2c61ba4f9400fe7faa6106f131d58b8826d0c4a2eb3c7b06fde462df9281f3575226abbaa7f35bd04d8eb44ba4b09cf7e8eee6e3e43930ddff0094379b055599cb781c958c349b22ac4ef329d91d6fc87698eb309f7b6e9c83995f55d08b12872c3d63bc12e3ab8145cb83177076871cfb4e7bbd3a055224f86f48aad84842ec2ce6d9de838bfafcc455e8c77071230a7b8cf41c364ec50dd050ad3597fc81812ba6f0b0006a34a3ee6221944b6a471c75e0f389e5b68310a70297659270e5a98f551185f55f775528799cc9e7ee0db5b6a96737976155ce39e1c48c7fa4f57b4b244c54a555d52028aae25edc2f4157c12ad84d2edfe3e33fb02639ff9f9ae04a84d428f082f7b2c41e02360110613c101e658662cc60bc9982bb57645e3485b00b00774827dc8cec0c074004344226c620d015429c696203d91105035e5174627347aa1e9b06a249ec8be11c5cb8cfb17b0d9744170ade21145d2b31b0aecbad9ea45b42273eb48ca6197d4266223acef644ebd6d15031b02eab3fa50a4421e04a7f7185267323d7c583b15e1171775637abc94e3941e37756b4d22aa35133992c65015d547dd4e08e2decefb6ead12c2b888ec4f431e31650318ca6753c62d05a28390812baf6bc1122a76c6e6edc6efe58930b38ddaa8bf"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe8b, 0x10, &(0x7f0000000140), 0xfffffffffffffeda}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000040)='lock_acquire\x00', r0}, 0x10) r1 = socket(0x10, 0x3, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r2) close(r3) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r3, 0x0, 0x2, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) write(r4, &(0x7f0000000340)='R', 0x1) write$binfmt_misc(r4, &(0x7f0000000280)={'syz0'}, 0x4) write(r1, &(0x7f0000000080)="2400000012005f3414f9f40700090400818a0400"/36, 0x24) 03:07:45 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000200)='syz1\x00', 0x200002, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newtaction={0xb4, 0x30, 0xffff, 0x0, 0x0, {}, [{0xa0, 0x1, [@m_police={0x6c, 0x1, 0x0, 0x0, {{0xb}, {0x40, 0x2, 0x0, 0x1, [[@TCA_POLICE_TBF={0x3c}]]}, {0x4}, {0xc}, {0xc}}}, @m_gact={0x30, 0x2, 0x0, 0x0, {{0x9}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}, 0xb4}}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0}, 0x10) r2 = openat$cgroup_int(r1, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r2, 0x0, 0x0) 03:07:45 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000001100)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000140), 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={0x0}, 0x10) r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r1) close(r2) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x2, 0x0) write$binfmt_misc(r2, &(0x7f0000000180)={'syz1'}, 0x20000184) ioctl$int_in(r2, 0x5421, &(0x7f0000000000)=0x4000003fd) write(r3, &(0x7f0000000340)='R', 0x1) write(r0, &(0x7f0000000080)="2400000012005f3414f9f40700090400818a0400"/36, 0x24) 03:07:45 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000200)='syz1\x00', 0x200002, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newtaction={0xb4, 0x30, 0xffff, 0x0, 0x0, {}, [{0xa0, 0x1, [@m_police={0x6c, 0x1, 0x0, 0x0, {{0xb}, {0x40, 0x2, 0x0, 0x1, [[@TCA_POLICE_TBF={0x3c}]]}, {0x4}, {0xc}, {0xc}}}, @m_gact={0x30, 0x2, 0x0, 0x0, {{0x9}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}, 0xb4}}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0}, 0x10) r2 = openat$cgroup_int(r1, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r2, 0x0, 0x0) 03:07:45 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000200)='syz1\x00', 0x200002, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newtaction={0xb4, 0x30, 0xffff, 0x0, 0x0, {}, [{0xa0, 0x1, [@m_police={0x6c, 0x1, 0x0, 0x0, {{0xb}, {0x40, 0x2, 0x0, 0x1, [[@TCA_POLICE_TBF={0x3c}]]}, {0x4}, {0xc}, {0xc}}}, @m_gact={0x30, 0x2, 0x0, 0x0, {{0x9}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}, 0xb4}}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0}, 0x10) r2 = openat$cgroup_int(r1, &(0x7f0000000180)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r2, 0x0, 0x0) [ 231.338273][ T5982] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 03:07:45 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) setsockopt$inet_udp_int(r2, 0x11, 0x0, 0x0, 0xfffffffffffffdcf) [ 231.540147][ T5995] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 231.581647][ T5999] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 03:07:46 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) r2 = dup3(r0, r1, 0x0) write$P9_RVERSION(r2, 0x0, 0x0) 03:07:46 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) write$cgroup_int(r1, 0x0, 0x0) 03:07:46 executing program 0: prlimit64(0x0, 0x7, &(0x7f0000000040), &(0x7f00000000c0)) 03:07:46 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000001100)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000140), 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={0x0}, 0x10) r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r1) close(r2) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x2, 0x0) write$binfmt_misc(r2, &(0x7f0000000180)={'syz1'}, 0x20000184) ioctl$int_in(r2, 0x5421, &(0x7f0000000000)=0x4000003fd) write(r3, &(0x7f0000000340)='R', 0x1) write(r0, &(0x7f0000000080)="2400000012005f3414f9f40700090400818a0400"/36, 0x24) 03:07:46 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) sendto$unix(r0, 0x0, 0x0, 0x20000810, 0x0, 0x0) 03:07:46 executing program 1: syz_clone(0x0, 0x0, 0x5, 0x0, 0x0, 0x0) 03:07:46 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) write$cgroup_type(r2, &(0x7f0000000040), 0xfffffffffffffdb4) 03:07:46 executing program 1: r0 = socket$inet6_icmp(0xa, 0x2, 0x3a) fcntl$setownex(r0, 0xf, &(0x7f0000000340)) [ 231.763595][ T38] audit: type=1400 audit(1645240066.169:253): avc: denied { create } for pid=6015 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 03:07:46 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, 0x0, 0xffffffffffffff8a) 03:07:46 executing program 2: open(&(0x7f0000000000)='./file0\x00', 0x80841, 0x0) open(&(0x7f0000003480)='./file0\x00', 0xe0e01, 0x108) 03:07:46 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000040)={0x1c, 0x1c, 0x2}, 0x1c) [ 231.843123][ T6026] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 03:07:46 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000001100)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000140), 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={0x0}, 0x10) r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r1) close(r2) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x2, 0x0) write$binfmt_misc(r2, &(0x7f0000000180)={'syz1'}, 0x20000184) ioctl$int_in(r2, 0x5421, &(0x7f0000000000)=0x4000003fd) write(r3, &(0x7f0000000340)='R', 0x1) write(r0, &(0x7f0000000080)="2400000012005f3414f9f40700090400818a0400"/36, 0x24) 03:07:46 executing program 2: r0 = open(&(0x7f0000000000)='./file0\x00', 0x80841, 0x0) r1 = dup(r0) write$cgroup_freezer_state(r1, 0x0, 0x0) 03:07:46 executing program 0: r0 = getpgid(0x0) prlimit64(r0, 0xf, 0x0, &(0x7f0000000000)) 03:07:46 executing program 1: prlimit64(0x0, 0x5, &(0x7f00000003c0), 0x0) 03:07:46 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendto$unix(r0, 0x0, 0x0, 0x40000, &(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e) 03:07:46 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) fstatfs(r1, &(0x7f0000000580)=""/4096) 03:07:46 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x829c0, 0x11) 03:07:46 executing program 0: prlimit64(0x0, 0x7, &(0x7f0000000040), 0x0) [ 232.117988][ T6047] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 03:07:46 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) recvmmsg$unix(r1, &(0x7f00000008c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40002101, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:07:46 executing program 2: setrlimit(0x4, &(0x7f0000001180)) 03:07:46 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) tee(0xffffffffffffffff, r0, 0x0, 0x0) 03:07:46 executing program 3: open(&(0x7f0000000040)='./file0\x00', 0x80840, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200, 0x10e) 03:07:46 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff}) tee(0xffffffffffffffff, r0, 0x0, 0x4) 03:07:46 executing program 0: open(&(0x7f0000000440)='./file0\x00', 0x80940, 0xc4) 03:07:46 executing program 1: open(&(0x7f00000002c0)='./file0\x00', 0x80840, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x20100, 0x974bfed6b141a1) 03:07:46 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) getsockname$netlink(r1, 0x0, &(0x7f0000000140)) 03:07:46 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) dup(r0) 03:07:46 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendto$unix(r0, 0x0, 0x0, 0x4001094, 0x0, 0x0) 03:07:46 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/net\x00') dup(r0) 03:07:46 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendto$unix(r0, 0x0, 0x0, 0x4001094, &(0x7f0000001100)=@file={0x0, './file0\x00'}, 0x6e) 03:07:46 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) close(r0) 03:07:46 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) write$P9_RVERSION(r3, 0x0, 0x0) 03:07:46 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x80840, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x40000, 0xc0) 03:07:46 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x80601, 0x0) write$cgroup_subtree(r0, 0x0, 0x0) 03:07:46 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) fsetxattr(r0, &(0x7f00000003c0)=@known='trusted.overlay.impure\x00', &(0x7f0000000400)='\x00', 0x1, 0x2) 03:07:46 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, 0x0, 0x0, 0x24008000, 0x0, 0x0) 03:07:46 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) dup(r0) 03:07:46 executing program 0: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x80000000, &(0x7f0000000000)) 03:07:46 executing program 2: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) wait4(r0, &(0x7f0000000040), 0x40000000, &(0x7f0000000080)) 03:07:46 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg$unix(r0, &(0x7f0000000280)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)=""/83, 0x53}], 0x1}}], 0x1, 0x0, 0x0) r2 = dup3(r1, r0, 0x0) write$cgroup_freezer_state(r2, 0x0, 0x0) 03:07:46 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind(r0, &(0x7f0000000240)=@in6={0x1c, 0x1c, 0x2}, 0x1c) connect$inet6(r0, &(0x7f00000000c0)={0x1c, 0x1c, 0x2}, 0x1c) shutdown(r0, 0x1) 03:07:46 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) setsockopt$inet6_int(r0, 0x29, 0x48, &(0x7f00000000c0), 0x4) 03:07:46 executing program 1: prlimit64(0x0, 0x5, &(0x7f0000000040), &(0x7f0000000080)) 03:07:47 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = dup(r0) getsockname$unix(r1, 0x0, &(0x7f0000000080)) 03:07:47 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x80841, 0xc4) 03:07:47 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000040)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0xb) 03:07:47 executing program 2: openat(0xffffffffffffff9c, 0x0, 0x110c24, 0x0) 03:07:47 executing program 3: mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x80013, 0xffffffffffffffff, 0x0) 03:07:47 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000400)={0x1c, 0x1c, 0x3}, 0x1c) r1 = socket$inet_sctp(0x2, 0x5, 0x84) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(r1, r0) 03:07:47 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect(r0, &(0x7f0000000040)=@in={0x10, 0x2}, 0x10) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r0, r1) r3 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r3, &(0x7f00000001c0)={0x10, 0x2}, 0x10) r4 = socket$inet6_sctp(0x1c, 0x1, 0x84) r5 = dup2(r3, r4) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x105, &(0x7f0000000100)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_MAXSEG(r2, 0x84, 0xe, &(0x7f0000000000), &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x1a, &(0x7f0000000240), &(0x7f0000000280)=0x8) 03:07:47 executing program 2: select(0x40, &(0x7f0000000000), 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x2710}) 03:07:47 executing program 3: open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) chown(&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x0) 03:07:47 executing program 2: r0 = socket(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000140)={0x0, @in, 0x9, 0x0, 0x100, 0x0, 0x800}, 0x98) 03:07:47 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_group_source_req(r0, 0x29, 0x52, 0x0, 0x0) 03:07:47 executing program 1: syz_emit_ethernet(0x76, &(0x7f0000000040)={@random="6bc91bc46eb1", @remote, @val, {@ipv4}}, 0x0) 03:07:47 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) write$P9_RREMOVE(r1, 0x0, 0x0) 03:07:47 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, 0x0, 0x0, 0x20184, 0x0, 0x0) [ 233.392664][ T38] audit: type=1400 audit(1645240067.799:254): avc: denied { getopt } for pid=6115 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 03:07:47 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r0, r1) r3 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r3, &(0x7f00000001c0)={0x10, 0x2}, 0x10) r4 = socket$inet6_sctp(0x1c, 0x1, 0x84) r5 = dup2(r3, r4) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x105, &(0x7f0000000100)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_MAXSEG(r2, 0x84, 0xe, &(0x7f0000000000), &(0x7f0000000140)=0x8) 03:07:47 executing program 3: open$dir(0x0, 0x1000b, 0x0) 03:07:47 executing program 2: syz_emit_ethernet(0x52, &(0x7f00000000c0)={@random="13e11a4253b7", @random="1b85aa9b7dc1", @val, {@ipv6}}, 0x0) 03:07:47 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c}, 0x1c) 03:07:47 executing program 2: r0 = socket(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x26, &(0x7f0000000000), &(0x7f0000000040)=0x8) 03:07:47 executing program 3: mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) 03:07:47 executing program 2: syz_emit_ethernet(0x10c7, &(0x7f0000000040)={@broadcast, @empty, @val, {@ipv6}}, 0x0) 03:07:47 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) recvmsg(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x40002) 03:07:47 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000140), 0x98) 03:07:48 executing program 2: r0 = socket(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x19, &(0x7f0000000000), 0x8) 03:07:48 executing program 1: syz_emit_ethernet(0x3e, &(0x7f0000000100)={@random="7fde5640d2a9", @remote, @val, {@ipv6}}, 0x0) 03:07:48 executing program 0: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000040)=[{r0, 0x4}, {r1, 0x1cd}], 0x2, 0x0, 0x0, 0x0) 03:07:48 executing program 2: symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00') open$dir(&(0x7f0000000040)='./file1\x00', 0x200, 0x0) 03:07:48 executing program 3: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) setsockopt$inet6_int(r0, 0x29, 0x30, &(0x7f00000006c0), 0x4) 03:07:48 executing program 1: symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00') open(&(0x7f0000000040)='./file0\x00', 0x2, 0x0) 03:07:48 executing program 2: r0 = socket(0x1c, 0x3, 0x0) setsockopt$inet6_int(r0, 0x29, 0x26, &(0x7f0000000000), 0x4) 03:07:48 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) bind(r0, &(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2}, 0x1c) 03:07:48 executing program 3: setrlimit(0x4, &(0x7f00000003c0)={0x4, 0x9}) 03:07:48 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x103, &(0x7f00000002c0)=ANY=[], &(0x7f00000001c0)=0x9) 03:07:48 executing program 3: fchmodat(0xffffffffffffffff, 0x0, 0x0) 03:07:48 executing program 2: r0 = socket(0x2, 0x1, 0x84) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0xa, &(0x7f0000000040), &(0x7f0000000100)=0x98) 03:07:48 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000040)={0x10, 0x2}, 0x10) r1 = dup(r0) bind$inet(r1, &(0x7f00000001c0)={0x10, 0x2}, 0x10) 03:07:48 executing program 1: syz_emit_ethernet(0x3a, &(0x7f0000000040)={@random="6bc91bc46eb1", @remote, @val, {@ipv4}}, 0x0) 03:07:48 executing program 0: linkat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) [ 233.804945][ T38] audit: type=1400 audit(1645240068.209:255): avc: denied { bind } for pid=6190 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 03:07:48 executing program 2: r0 = socket(0x2, 0x1, 0x84) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0xa, &(0x7f0000000040), &(0x7f0000000100)=0x98) 03:07:48 executing program 3: recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000000)=""/77, 0x40, 0x0, 0x0, 0xffffffffffffff4a) 03:07:48 executing program 3: r0 = socket$inet(0x2, 0x5, 0x0) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0x100, &(0x7f0000000200), &(0x7f0000000080)=0xb0) 03:07:48 executing program 2: r0 = socket(0x2, 0x1, 0x84) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0xa, &(0x7f0000000040), &(0x7f0000000100)=0x98) 03:07:48 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x400000, 0x0) fcntl$setown(r0, 0x6, 0xffffffffffffffff) 03:07:48 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000080)="75896e584266c5e9e5fc402f72e035ea2372f43f14058ce398d4f6f7df5efb27942cefbf4bf2e759a8d341526b52b91c6f878831f4f02bdf29046b3d2ca48bceeac47b267f839dd0159d215e5810f962e7bbdf24fcc060034aebc7868c9ebd5eb88c12c20cb9013249e54faa5aa387c0e59bca3d44dea539ca38de2b9b9575ae36796bd4a85ea8870d93366cd3c880f76aa4de54c92f17681d", 0x99}], 0x1}, 0x0) 03:07:48 executing program 3: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) setsockopt$inet6_IPV6_RTHDR(r0, 0x29, 0x33, &(0x7f00000001c0)={0x0, 0x8, 0x0, 0x4, 0x0, [@loopback, @mcast2, @empty, @rand_addr=' \x01\x00']}, 0x48) 03:07:48 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000040)={0x10, 0x2}, 0x10) pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x0) dup2(r1, r0) 03:07:48 executing program 2: r0 = socket(0x2, 0x1, 0x84) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0xa, &(0x7f0000000040), &(0x7f0000000100)=0x98) 03:07:48 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockname$inet(r0, 0x0, &(0x7f0000000300)) 03:07:48 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000001c0)=@abs={0x8}, 0x8, 0x0, 0x0, &(0x7f0000000740)}, 0x0) 03:07:48 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x23, &(0x7f0000000080), &(0x7f0000000000)=0x90) 03:07:48 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000040)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000000), 0xb) 03:07:48 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f00000001c0)={0x0, @in, 0x0, 0x0, 0x386}, 0x98) 03:07:48 executing program 1: open$dir(0x0, 0xf5d4628cd9a5c190, 0x0) 03:07:48 executing program 3: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x31, 0x0, 0x0) 03:07:48 executing program 0: syz_emit_ethernet(0x7e, &(0x7f0000000040)=ANY=[], 0x0) 03:07:48 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000200)="c1", 0x1}, {&(0x7f0000000300)="c6", 0x1}, {0x0}], 0x3}, 0x0) 03:07:48 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) 03:07:48 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0x40, &(0x7f0000000240)='cdg\x00', 0x4) 03:07:48 executing program 0: futimesat(0xffffffffffffff9c, 0x0, &(0x7f0000000140)) 03:07:48 executing program 3: syz_emit_ethernet(0x2a, &(0x7f0000000040)={@remote, @empty, @val, {@ipv4}}, 0x0) 03:07:48 executing program 0: syz_emit_ethernet(0x10e6, &(0x7f0000000040)=ANY=[], 0x0) 03:07:48 executing program 1: shmget(0x2, 0x3000, 0x28c, &(0x7f0000ffb000/0x3000)=nil) 03:07:48 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f00000011c0), &(0x7f0000001200)=0x10) 03:07:48 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000002c0)={&(0x7f0000000080)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f0000000240)=[@init={0x14}, @authinfo={0x10}], 0x24}, 0x0) 03:07:48 executing program 2: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) getsockopt$inet6_int(r0, 0x29, 0x25, 0x0, &(0x7f0000000000)) 03:07:48 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f0000000040)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f0000000480)=[@sndrcv={0x2c}, @sndrcv={0x2c}, @sndrcv={0x2c}, @sndrcv={0x2c}, @prinfo={0x14}, @prinfo={0x14}], 0xd8}, 0x0) 03:07:48 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x26, 0x0, 0x0) 03:07:48 executing program 1: symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) 03:07:48 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg(r0, &(0x7f0000000040)={&(0x7f0000001380)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000080), 0x88) 03:07:48 executing program 2: futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000180)={{0x0, 0xfffffffffffffffc}}) 03:07:48 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000002c0)={&(0x7f0000000080)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f0000000240)=[@init={0x14}, @init={0x14}], 0x28}, 0x0) 03:07:48 executing program 0: msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000ac0)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) 03:07:48 executing program 1: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) 03:07:48 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) read(r0, 0x0, 0x0) 03:07:48 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000080)={0x1c, 0x1c, 0x2}, 0x1c) 03:07:48 executing program 2: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) r1 = dup(r0) setsockopt$inet6_int(r1, 0x29, 0x1b, 0x0, 0x0) 03:07:48 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r1, &(0x7f0000000400)={0x1c, 0x1c, 0x3}, 0x1c) r2 = dup2(r1, r0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f0000000240)={0x1, [0x0]}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x29, &(0x7f0000000040)={r3}, &(0x7f0000000080)=0x8) 03:07:48 executing program 1: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) ppoll(&(0x7f0000000280)=[{r0, 0x66}], 0x1, 0x0, 0x0, 0x0) 03:07:48 executing program 3: r0 = socket(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xb, &(0x7f0000000080), &(0x7f00000000c0)=0x20) 03:07:48 executing program 3: setgroups(0x1, &(0x7f0000000180)=[0xffffffffffffffff]) getgroups(0x1, &(0x7f00000000c0)=[0x0]) setgid(r0) 03:07:48 executing program 2: munmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000) mincore(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) 03:07:48 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt(r0, 0x0, 0x0, 0x0, 0x0) 03:07:48 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect(r0, &(0x7f0000000040)=ANY=[], 0xa) 03:07:48 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) read(r0, &(0x7f0000000040)=""/244, 0xf4) 03:07:49 executing program 2: r0 = socket(0x2, 0x1, 0x84) sendmsg$unix(r0, &(0x7f0000000400)={&(0x7f0000000000)=@abs={0x8}, 0x8, 0x0}, 0x0) 03:07:49 executing program 1: r0 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$sock_linger(r0, 0xffff, 0x80, 0x0, 0x0) 03:07:49 executing program 3: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) setsockopt$inet6_int(r0, 0x29, 0x17, &(0x7f0000000100), 0x4) 03:07:49 executing program 0: r0 = socket(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0xf, &(0x7f0000000080), 0xc) 03:07:49 executing program 2: clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x3}, 0x0) clock_gettime(0xf, &(0x7f00000000c0)) 03:07:49 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, 0x0, 0x0, 0x20100, 0x0, 0x0) 03:07:49 executing program 3: r0 = socket(0x2, 0x1, 0x84) sendto(r0, &(0x7f0000000000)="ea", 0x1, 0x0, &(0x7f0000000140)=@in6={0x1c, 0x1c, 0x2}, 0x1c) recvmsg(r0, &(0x7f0000000640)={0x0, 0xe, 0x0}, 0x0) 03:07:49 executing program 0: r0 = socket(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x23, &(0x7f0000000200), &(0x7f00000002c0)=0x90) 03:07:49 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000140)={0x0, @in, 0x4800000, 0x0, 0x0, 0x0, 0xfffa}, 0x98) 03:07:49 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendto$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 03:07:49 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x23, &(0x7f0000000440), &(0x7f0000000500)=0x90) 03:07:49 executing program 3: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x31, &(0x7f0000000080)={0x0, 0x0, '\x00', [@pad1]}, 0x10) 03:07:50 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_int(r0, 0xffff, 0x0, 0x0, 0x0) 03:07:50 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000040)="81", 0x1, 0x0, &(0x7f0000000140)={0x10, 0x2}, 0x10) sendto$inet(r0, &(0x7f0000000300)="83", 0x1, 0x0, 0x0, 0x0) 03:07:50 executing program 1: ppoll(0x0, 0x0, &(0x7f0000000340)={0xffffffffffff9533}, 0x0, 0x0) 03:07:50 executing program 3: pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x0) getsockname(r0, 0x0, &(0x7f0000000040)) 03:07:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ppoll(&(0x7f00000000c0)=[{r0, 0x40}], 0x1, 0x0, 0x0, 0x0) 03:07:50 executing program 1: openat(0xffffffffffffffff, &(0x7f0000000080)='\x00', 0x2000000, 0x0) 03:07:50 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 03:07:50 executing program 2: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) bind$inet6(r0, &(0x7f0000003600)={0x1c, 0x1c, 0x2}, 0x1c) 03:07:50 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendto$unix(r0, 0x0, 0x0, 0x8d, 0x0, 0x0) 03:07:50 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) r2 = socket$inet(0x2, 0x5, 0x0) r3 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r3, &(0x7f0000000300)={0x1c, 0x1c, 0x1}, 0x1c) r4 = dup2(r3, r2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x105, &(0x7f0000000100)=ANY=[@ANYBLOB="03", @ANYRES32=0x0], &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xe, &(0x7f0000000040), 0x8) 03:07:50 executing program 1: syz_emit_ethernet(0x77, &(0x7f0000000d00)=ANY=[], 0x0) 03:07:50 executing program 1: r0 = socket(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x11, &(0x7f0000002500), &(0x7f0000002540)=0x4) 03:07:51 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendto$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 03:07:51 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r1, &(0x7f0000000400)={0x1c, 0x1c, 0x3}, 0x1c) r2 = dup2(r1, r0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f0000000240)={0x1, [0x0]}, &(0x7f0000001700)=0x8) 03:07:51 executing program 1: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) setsockopt$inet6_buf(r0, 0x29, 0x23, 0x0, 0x0) 03:07:51 executing program 0: open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0x100) 03:07:51 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfff}, 0x14) 03:07:51 executing program 0: symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0) 03:07:51 executing program 1: syz_emit_ethernet(0x3e, &(0x7f0000000240)={@broadcast, @local, @val, {@ipv4}}, 0x0) 03:07:51 executing program 3: mq_getsetattr(0xffffffffffffffff, &(0x7f0000000000)={0x9}, 0x0) 03:07:51 executing program 2: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={0x0, 0x0, 0xcf0448ec385c4803}, 0x10) 03:07:51 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x40000000, &(0x7f0000000280)="41330d6478dfc9dea7dc", 0xa, &(0x7f00000002c0), 0x0, &(0x7f0000000340)) getgid() socket$nl_rdma(0x10, 0x3, 0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x0, 0x7f, 0x2, 0x0, 0x200, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x5}, 0x48) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) ioctl$SNAPSHOT_UNFREEZE(0xffffffffffffffff, 0x3302) socket$l2tp(0x2, 0x2, 0x73) sendmsg$netlink(r0, &(0x7f0000000400)={&(0x7f0000000000)=@kern={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000240)=[{&(0x7f0000000040)=ANY=[@ANYBLOB="2c000000280002002abd7000ffdbdf2514003400fe800000000000000000000000fff13c08007a00e0000001"], 0x2c}, {&(0x7f0000000180)={0x78, 0x1e, 0x1, 0x70bd2c, 0x0, "", [@generic="af4caae48854f1861a1ff1e539634764ad0d3a7cfbfad887535742cd568b995c267b303063f57842a19ebf5c10e538310a812bedbd76cb005a043377f3281f79304a994e152f58d435bbf1fb62ab398ce340f2335fcc1c5a36d706400346c10eae8cd8e1d11cf3f4"]}, 0x78}], 0x2, &(0x7f00000003c0)=[@rights={{0x10}}], 0x10, 0x8000}, 0x0) 03:07:51 executing program 1: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000080), 0x10000, 0x0) 03:07:51 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x1, &(0x7f0000000000)=@raw=[@call], &(0x7f0000000040)='GPL\x00', 0xdb1d, 0x8c, &(0x7f0000000100)=""/140, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:07:51 executing program 2: munmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000) munmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000) 03:07:51 executing program 1: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x27) 03:07:51 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x21, 0x0, &(0x7f0000000340)) 03:07:51 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xed0f0000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000630000000c000025ce00000003000000010000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef01000100", 0x3e, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 03:07:51 executing program 1: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xed0f0000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000630000000c000025ce0d00000f000000010000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 237.321728][ T6393] loop2: detected capacity change from 0 to 264192 [ 237.331590][ T38] audit: type=1400 audit(1645240071.729:256): avc: denied { create } for pid=6379 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 237.354073][ T6395] loop1: detected capacity change from 0 to 264192 [ 237.357629][ T6393] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 237.369659][ T38] audit: type=1400 audit(1645240071.779:257): avc: denied { mount } for pid=6392 comm="syz-executor.2" name="/" dev="loop2" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 237.395894][ T6395] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e000c01c, mo2=0006] [ 237.402971][ T38] audit: type=1400 audit(1645240071.809:258): avc: denied { unmount } for pid=3700 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 03:07:51 executing program 0: syz_mount_image$gfs2(&(0x7f0000000a00), &(0x7f0000000a40)='./file0\x00', 0x0, 0x0, 0x0, 0x1000060, &(0x7f0000001000)) 03:07:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xed0f0000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000630000000c000025ce0000000a000000010000000000000000000000002000000020000220000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 03:07:51 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_NOACK_MAP(r0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={&(0x7f0000000980)={0x1c, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) [ 237.413716][ T6395] System zones: 1-2, 19-19, 35-38, 46-46 [ 237.447899][ T6401] loop3: detected capacity change from 0 to 264192 [ 237.452381][ T6395] EXT4-fs (loop1): mounted filesystem without journal. Quota mode: none. [ 237.456357][ T6403] ======================================================= 03:07:51 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='personality\x00') read$FUSE(r0, &(0x7f0000000b40)={0x2020}, 0x2020) [ 237.456357][ T6403] WARNING: The mand mount option has been deprecated and [ 237.456357][ T6403] and is ignored by this kernel. Remove the mand [ 237.456357][ T6403] option from the mount to silence this warning. [ 237.456357][ T6403] ======================================================= [ 237.457375][ T38] audit: type=1400 audit(1645240071.869:259): avc: denied { remount } for pid=6402 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 03:07:51 executing program 0: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000480)={0x24, &(0x7f0000000100)=ANY=[@ANYBLOB="0000e0"], 0x0, 0x0, 0x0}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_ep_write(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 237.478064][ T6401] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended [ 237.536155][ T6395] ext4 filesystem being mounted at /syzkaller-testdir2877458552/syzkaller.BGx8BS/320/file0 supports timestamps until 2038 (0x7fffffff) [ 237.597360][ T6401] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: none. 03:07:52 executing program 1: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) 03:07:52 executing program 3: syz_clone(0x40000000, &(0x7f0000000280), 0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) getgid() socket$nl_rdma(0x10, 0x3, 0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) ioctl$SNAPSHOT_UNFREEZE(0xffffffffffffffff, 0x3302) 03:07:52 executing program 1: openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x800, 0x0) 03:07:52 executing program 1: openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4, 0x18030, 0xffffffffffffffff, 0x8000000) 03:07:52 executing program 2: io_cancel(0x0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 03:07:52 executing program 2: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x800, 0x0) [ 237.773597][ T38] audit: type=1400 audit(1645240072.179:260): avc: denied { create } for pid=6411 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 03:07:52 executing program 2: memfd_create(&(0x7f0000000480)='/proc/capi/capi20ncci\x00', 0x2) [ 237.864998][ T5597] usb 5-1: new high-speed USB device number 3 using dummy_hcd [ 238.252257][ T5597] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 238.272755][ T5597] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 238.288993][ T5597] usb 5-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 238.326248][ T5597] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 238.349335][ T5597] usb 5-1: config 0 descriptor?? [ 238.837947][ T5597] keytouch 0003:0926:3333.0002: fixing up Keytouch IEC report descriptor [ 238.851815][ T5597] input: HID 0926:3333 as /devices/platform/dummy_hcd.0/usb5/5-1/5-1:0.0/0003:0926:3333.0002/input/input5 [ 238.956473][ T38] audit: type=1400 audit(1645240073.369:261): avc: denied { read } for pid=3110 comm="acpid" name="event4" dev="devtmpfs" ino=2402 scontext=system_u:system_r:acpid_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 238.964482][ T5597] keytouch 0003:0926:3333.0002: input,hidraw1: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.0-1/input0 [ 239.006226][ T38] audit: type=1400 audit(1645240073.369:262): avc: denied { open } for pid=3110 comm="acpid" path="/dev/input/event4" dev="devtmpfs" ino=2402 scontext=system_u:system_r:acpid_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 239.006277][ T38] audit: type=1400 audit(1645240073.369:263): avc: denied { ioctl } for pid=3110 comm="acpid" path="/dev/input/event4" dev="devtmpfs" ino=2402 ioctlcmd=0x4520 scontext=system_u:system_r:acpid_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 240.064813][ T5598] usb 5-1: reset high-speed USB device number 3 using dummy_hcd 03:07:55 executing program 0: bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380)=0xffffffffffffffff, 0x4) 03:07:55 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x40000000, 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000340)="583a68bc1e2f1bd5e612054be561e12541ae3c0a23a7ef5079d63441a539e7f47029f1396d8d3c07c1323f48c883b633a3abc0d8164e84284b59019f31013a") r1 = socket$nl_rdma(0x10, 0x3, 0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) ioctl$SNAPSHOT_UNFREEZE(0xffffffffffffffff, 0x3302) socket$l2tp(0x2, 0x2, 0x73) sendmsg$netlink(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x10}}], 0x10, 0x8000}, 0x814) 03:07:55 executing program 3: openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) io_setup(0x10000, &(0x7f0000000080)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) 03:07:55 executing program 2: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000080)={0x387}) 03:07:55 executing program 0: openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x4000) 03:07:55 executing program 2: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000080)={0x387}) 03:07:55 executing program 0: ioctl$VIDIOC_DQEVENT(0xffffffffffffffff, 0x80885659, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, &(0x7f0000000480)={0x2, 0x0, 0x0, 0x0, 0x0, @discrete={0x2}}) dup(r0) write$6lowpan_enable(0xffffffffffffffff, &(0x7f0000000000)='0', 0xfffffd2c) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000a80)={0xffffffffffffffff, 0x7ff, 0x1, 0x7}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r1, 0x4b72, &(0x7f0000000400)={0x0, 0x0, 0xb, 0xf, 0x200, &(0x7f0000000000)="41e226660478912ae968b4c5b45d40a285aa2ee783d6932dfefdb995d22da2bfd489d9d2e092668b06ca2312c963070000006cb7a4f5b826028d3e1e26e10cfb85831a76e2523ed68301db1ba277e0729cf907931e8e3926d769b7c431d000b3aaa9629f2ac1ed6f62a868431333a766e29950449e68b7678b3ca8745e227b59049d38213c6b234e29038705ae1ef636e6566111eeefb1ef804301846f163d1b0ae8c584953f349708874727c75659776b200659acab144454ca7d7b786042c96bfa40d5d5fcf2226aad5461dd4e8cf0348211469e47991350c0a4d6fff85fcb52a1d85600f4c142791ae642ec5b5c81ec5fb9796b61a6a2dc74779a475067fbd7d34883664ac33ffd8c5321463eab48a044fc719f945dbbf57556e76dc755d75ecfab57304821bcda8cd6bd90f2157a56cae0413a0a4d99723e2a9701001c4effe8d7f500b30b4ed27211effc45591daa93afba115ecd9df08237b3de779ee32a6a95a65a62ce5cb7b089693682ed188e83fd883289a699dd44d4b579692b6244779e4336f8fd7d3bbb91fe8af19162a294131007d5e541f3b950ddbb75085970eea8b3270ee2e317193c47c74fbafd55d9bab47c82c25dd6dfaf83e8f6d33cce3a74cc867d699fde52b8c8d4b48917beddbff7fff82aea3f4dcdb0240cc3840c1aca599b1fa267fae8ccebfe79a50a91433fc5175e648a5028cc481e367901b91465bc1c7ac7bf331d6877f790a9e51829c1511a83af1b656dddf3d5ef101e2d7b04e59383274cc5a7f48d9f85c4d46b76a85d2ce8b34b298895a7cfdb5465919b7a924637689d9caa48f3add37da0f872d2d8871ba64d448d3e018d717a5b0a9439de2ae9f58da870be046012fb1d410e2b3b141a1bc11cae1496a21f605f4b97cca801e54653bae5aed8701a35c2246f897e914fc8b2e4607c59b2049af301cc5600805b0644a3efaf2bf59db93796b6f45e15cf7725f64bc0a229609fff9bbe912240b82a37bbf85b0987862ef579395dc2f58a046f4dfd49eeae2a169b06ae8eae7742f9ae5a568be8bb0cd1481a4b4e61612366ca2f514243561e80b13ef6ac3f82a04ebe36fc3c119de9b3f47a1a572e2817bb9d942f0f8ae1a5e40bc366b6b1869d94f5b9c206f0439594e71d25dbd037345c7d4cb9683606b96c07c0c6d22a498ba12db78a2e37844453eface20375691a7feb03e66d87f13a279ee6371e1b79cb1818ecd9eafaf603c861c9d1e9113dfa954cbef1127bdfede9b9ad3324a691defa5dfb26fcae08e149f8614bb41aa8eabc3b536df1fcabe22c24be6ac9a72825fe83c4432e1a4a346d4ed2796b392bebf1ad9e06bd0be3a627236e39a30ced98ccff5880f25a7f6e35557805e9f366b8576e6eb3f6d8444200"}) [ 240.710468][ T38] audit: type=1400 audit(1645240075.119:264): avc: denied { ioctl } for pid=6433 comm="syz-executor.1" path="socket:[42309]" dev="sockfs" ino=42309 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 03:07:55 executing program 2: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000080)={0x387}) 03:07:55 executing program 2: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000080)={0x387}) 03:07:55 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x40000000, 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000340)="583a68bc1e2f1bd5e612054be561e12541ae3c0a23a7ef5079d63441a539e7f47029f1396d8d3c07c1323f48c883b633a3abc0d8164e84284b59019f31013a") r1 = socket$nl_rdma(0x10, 0x3, 0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) ioctl$SNAPSHOT_UNFREEZE(0xffffffffffffffff, 0x3302) socket$l2tp(0x2, 0x2, 0x73) sendmsg$netlink(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x10}}], 0x10, 0x8000}, 0x814) 03:07:55 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADDDEF(r0, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000280)={&(0x7f0000000180)={0x14}, 0x14}}, 0x40) 03:07:55 executing program 2: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000080)={0x387}) 03:07:55 executing program 3: syz_io_uring_setup(0x4f0a, &(0x7f0000000740), &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000400000/0xc00000)=nil, &(0x7f0000000400), &(0x7f00000007c0)) 03:07:55 executing program 2: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000080)={0x387}) [ 240.983118][ T5597] usb 5-1: USB disconnect, device number 3 03:07:55 executing program 0: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x5452, &(0x7f0000000180)) 03:07:55 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet6_int(r0, 0x29, 0x13, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 03:07:55 executing program 2: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000080)={0x387}) 03:07:55 executing program 1: syz_open_dev$MSR(&(0x7f0000000080), 0xdb, 0x0) 03:07:55 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000000000)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @loopback}}, 0x5c) 03:07:55 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000004c0)=@security={'security\x00', 0xe, 0x4, 0x3c0, 0xffffffff, 0x128, 0x268, 0x128, 0xffffffff, 0xffffffff, 0x398, 0x398, 0x398, 0xffffffff, 0x4, 0x0, {[{{@ipv6={@private1, @local, [], [], 'veth0_to_batadv\x00', 'ip6gretap0\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@CONNSECMARK={0x28}}, {{@ipv6={@mcast2, @local, [], [], 'dummy0\x00', 'vlan0\x00'}, 0x0, 0xa8, 0x118}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "0b466e93845c94d742bad2cf5a64e146ed528c1384d69fa15bbd08cc2447aefe565c4d6294bd8b5db36834d5b7b4959478bab69f69c99ea0cfe4f01e3ce4260d"}}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@dev}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x420) 03:07:55 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000080)={0x387}) 03:07:55 executing program 0: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ipvlan1\x00'}) 03:07:55 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000004c0)=@security={'security\x00', 0xe, 0x4, 0x468, 0xffffffff, 0x128, 0x268, 0x128, 0xffffffff, 0xffffffff, 0x398, 0x398, 0x398, 0xffffffff, 0x4, 0x0, {[{{@ipv6={@private1, @local, [], [], 'veth0_to_batadv\x00', 'ip6gretap0\x00'}, 0x0, 0x100, 0x128, 0x0, {}, [@common=@hl={{0x28}}, @common=@srh={{0x30}}]}, @common=@unspec=@CONNSECMARK={0x28}}, {{@ipv6={@mcast2, @local, [], [], 'dummy0\x00', 'vlan0\x00'}, 0x0, 0xd0, 0x140, 0x0, {}, [@common=@inet=@socket2={{0x28}}]}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "0b466e93845c94d742bad2cf5a64e146ed528c1384d69fa15bbd08cc2447aefe565c4d6294bd8b5db36834d5b7b4959478bab69f69c99ea0cfe4f01e3ce4260d"}}}, {{@uncond, 0x0, 0xd0, 0x130, 0x0, {}, [@common=@hl={{0x28}}]}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@dev}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) 03:07:55 executing program 3: r0 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f0000000100)=@fd={0x0, 0x3, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "fd25acad"}}) 03:07:55 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000080)={0x387}) 03:07:55 executing program 1: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x0, @link_local, 'batadv0\x00'}}, 0x2000009e) 03:07:55 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x16, 0x0, 0x0) [ 241.321988][ T38] audit: type=1400 audit(1645240075.729:265): avc: denied { write } for pid=6476 comm="syz-executor.3" name="video0" dev="devtmpfs" ino=868 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_device_t tclass=chr_file permissive=1 [ 241.360294][ T6479] x_tables: duplicate underflow at hook 2 03:07:55 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmmsg$inet6(r0, &(0x7f0000002180)=[{{&(0x7f0000000040)={0xa, 0x0, 0x5, @loopback}, 0x1c, &(0x7f0000000400)=[{&(0x7f00000000c0)="ba7460f986634bd5c5aca9e9ba49bd03f9bc2c986e4c219c6918f7369c1d2e674cebc772ac9afad1d0a78b3653c46771472da785f3cc", 0x36}, {0x0}, {0x0}], 0x3}}, {{&(0x7f0000000480)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c, &(0x7f0000001600)=[{&(0x7f00000004c0)="7632630ba339f9d3e54b6d9bb6ebca0e898bbb8fa64b9dec54a203a17376f9f0c06feda10ab6b8dc05576ad54f396e32b736a9d65364256ff1623df2ff23474f8728a61bde1dbe95332081588b0449e059e79cf3089228f33f9cb1c59e9b37a2733cd92011e37b5dd71bea53849ee81c19e25197106d2c5c6740d402fc2ecfa62e3447897bd559f9b0af158f7b598ea1b0cee0ed08e20caa1c4fcfc1b228ab62f5197b5923824834160d354d47d02a00d5fbe3aad3840a53f3b0026612dc", 0xbe}, {&(0x7f0000000580)="74d1240a3fd21bafde2a5dacff849f0efe99ab4e0116d3a95cbb9632aeb6cf2adff62c19a3dc78e7affea369ad6251", 0x2f}, {&(0x7f00000005c0)="2a300322326c", 0x6}, {&(0x7f0000000600)="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", 0x3de}], 0x4}}], 0x2, 0x0) 03:07:55 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000080)={0x387}) 03:07:55 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, 0x0, 0x0) 03:07:55 executing program 0: openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x6800, 0x0) 03:07:55 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000001a80)={&(0x7f0000000240)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000001b40)=ANY=[@ANYBLOB="14000000000000002900000034000000000000000000000008010000000000002900000037"], 0x120}, 0x0) 03:07:55 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmmsg$inet6(r0, &(0x7f0000002180)=[{{&(0x7f0000000040)={0xa, 0x0, 0x5, @loopback}, 0x1c, &(0x7f0000000400)=[{&(0x7f00000000c0)="ba", 0x1}], 0x1}}, {{&(0x7f0000000480)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c, &(0x7f0000001600)=[{&(0x7f00000004c0)="7632630ba339f9d3e54b6d9bb6ebca0e898bbb8fa64b9dec54a203a17376f9f0c06feda10ab6b8dc05576ad54f396e32b736a9d65364256ff1623df2ff23474f8728a61bde1dbe95332081588b0449e059e79cf3089228f33f9cb1c59e9b37a2733cd92011e37b5dd71bea53849ee81c19e25197106d2c5c6740d402fc2ecfa62e3447897bd559f9b0af158f7b598ea1b0cee0ed08e20caa1c4fcfc1b228ab62f5197b5923824834160d354d47d02a00d5fbe3aad3840a53f3b0026612dc", 0xbe}, {&(0x7f0000000580)="74d1240a3fd21bafde2a5dacff849f0efe99ab4e0116d3a95cbb9632aeb6cf2adff62c19a3dc78e7affea369ad6251", 0x2f}, {&(0x7f00000005c0)="2a300322326c", 0x6}, {&(0x7f0000000600)="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", 0x3de}], 0x4}}], 0x2, 0x40084) 03:07:55 executing program 2: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000080)={0x387}) 03:07:55 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmmsg$inet6(r0, &(0x7f0000002180)=[{{&(0x7f0000000480)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c, &(0x7f0000001600)=[{&(0x7f00000004c0)="7632630ba339f9d3e54b6d9bb6ebca0e898bbb8fa64b9dec54a203a17376f9f0c06feda10ab6b8dc05576ad54f396e32b736a9d65364256ff1623df2ff23474f8728a61bde1dbe95332081588b0449e059e79cf3089228f33f9cb1c59e9b37a2733cd92011e37b5dd71bea53849ee81c19e25197106d2c5c6740d402fc2ecfa62e3447897bd559f9b0af158f7b598ea1b0cee0ed08e20caa1c4fcfc1b228ab62f5197b5923824834160d354d47d02a00d5fbe3aad3840a53f3b0026612dc", 0xbe}, {&(0x7f0000000580)="74d1240a3fd21bafde2a5dacff849f0efe99ab4e0116d3a95cbb9632aeb6cf2adff62c19a3dc78e7affea369ad6251", 0x2f}, {&(0x7f00000005c0)="2a300322326c", 0x6}, {&(0x7f0000000600)="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", 0x3dd}], 0x4}}], 0x1, 0x0) 03:07:56 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmmsg$inet6(r0, &(0x7f0000002180)=[{{&(0x7f0000000040)={0xa, 0x0, 0x5, @loopback, 0x9}, 0x1c, &(0x7f0000000400)=[{&(0x7f00000000c0)="ba", 0x1}], 0x1}}, {{&(0x7f0000000480)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c, &(0x7f0000001600)=[{&(0x7f00000004c0)="7632630ba339f9d3e54b6d9bb6ebca0e898bbb8fa64b9dec54a203a17376f9f0c06feda10ab6b8dc05576ad54f396e32b736a9d65364256ff1623df2ff23474f8728a61bde1dbe95332081588b0449e059e79cf3089228f33f9cb1c59e9b37a2733cd92011e37b5dd71bea53849ee81c19e25197106d2c5c6740d402fc2ecfa62e3447897bd559f9b0af158f7b598ea1b0cee0ed08e20caa1c4fcfc1b228ab62f5197b5923824834160d354d47d02a00d5fbe3aad3840a53f3b0026612dc", 0xbe}, {&(0x7f0000000580)="74d1240a3fd21bafde2a5dacff849f0efe99ab4e0116d3a95cbb9632aeb6cf2adff62c19a3dc78e7affea369ad6251", 0x2f}, {&(0x7f00000005c0)="2a300322326c", 0x6}, {&(0x7f0000000600)="8f305daca63523e19093c0c17a5daf2870486d958094000b6afae8b9eee919f2f8408aba14ecbc2db2ae21cda6d7874b706b59f5370a9f0ce295988072a4132fdfe986a62647524b40af651d8e084fa2975aecbdfd4647eeea1a157ba04e442a558abfadf1d432cd039b317bc682062406a8b4f1b45c25c866fcc5d7cfef2e939fa3e0c38b756668071d9d4c5b91da860ffd47e058873f4f3d62ec9bcacba07d58c8bf5b77895d0aea91e82cb9ff159dc52cfa92df8cd65959f85f6a20340e1ba08334e39704e4cfb214bc3bc0953a1bcab124e8e136e453ca1e81563690856caa6386e6de4c960b140e0d11c74578073a099508596d7f00d8fb44b907a82b704fa68ac271fc0757f227369fc0b8390cd3e5fb562d5c146203f727206675412162bf1a40c8085e779c839a567c02aa140fc3164b488369e4d670d32664ac463405ebfd36c34efc5b6177e4e1b94e71767add4fab362632dd82e4e854bb75b22988d01963ef6051ea27e4edfbc70ee9fb151f984838ad63d818a187851dc9247a9b00987461a1fe307f1fd9ca2e39c47dcd0ed598f9344bbacd2d8c8eaf9883daaa574ccf08ffa31d6cfbf720bb4b242b82a2a81942137c669c138427c86bc4b439fcce6dceb8ade83cd45636850b8792b9899f4dc6e89cf43dde70247b9497374a9a57521c28bf5f29241731054c1f01c6380536b5bf3a9fee20b92a6196062a30e66b8a22d5c6a382212f5bc63cf6724079a75fbd54a6dbdbfc7a2950c21f4ce98d442acafe801ea1d513d6ff91d3ed20e75e283f61b4ad79b25744b23898ddc2c692412a3eaf8287b2e9bbd6634fb0e1683c81b8ca782c5e83aa5061542401a6d88af6e15907c27042a562b16a9d2371f5659af7f06cbce5109ddce5e101e23ca0daac34f5da15873a6f2e5da51494e5f4f6cf7f01aee1c5179f4b6f4168a46653b4fcdf4b808c69334a1a97fe3b1a3496144a1550ed8e378277986e007579b6414f9aed74e18002ce8e4aaacf90cb5ceeee83caf38013e402ab2525b39f27359a4c2ac32c51a312da2acbb5561ba735917ab0da5b78fcc116bfe2fca5c978c986937cc012ca2530d64c73297634cb572a784a17f82e1f9be18b5090d45897f6755d3e64a22458ef98373abf8bddeafd0d752661ae524a3d222b496785fd7d51a7cd3d75d56dc8bb86c41e892b3fd3e657ceecaea93e887dcc6cf16301d49f566b2bad7dc0216a5494236a099b60f7e6a12eb852f5bb0bba97630cd8f28bffe28b362da25668093f80661ade8ff511a552eb232f9ed9b1865a61d4dba4d91a80e22ab91d7b5c0f58a9f8589ae1b7e281b6feea2211290270518705904a27c3ea4dfa04ab673b1572257e3fa758fc8b994e8a8848504df9228954ac14cf", 0x3de}], 0x4}}], 0x2, 0x0) 03:07:56 executing program 2: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000080)={0x387}) 03:07:56 executing program 2: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000080)={0x387}) 03:07:56 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmmsg$inet6(r0, &(0x7f0000002180)=[{{&(0x7f0000000480)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c, &(0x7f0000001600)=[{0x0}, {0x0}, {&(0x7f0000000600)="8f", 0x1}], 0x3}}], 0x1, 0x0) 03:07:56 executing program 2: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000080)={0x387}) 03:07:56 executing program 2: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000080)={0x387}) 03:07:56 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmmsg$inet6(r0, &(0x7f0000002180)=[{{&(0x7f0000000480)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c, &(0x7f0000001600)=[{&(0x7f00000004c0)="7632630ba339f9d3e54b6d9bb6ebca0e898bbb8fa64b9dec54a203a17376f9f0c06feda10ab6b8dc05576ad54f396e32b736a9d65364256ff1623df2ff23474f8728a61bde1dbe95332081588b0449e059e79cf3089228f33f9cb1c59e9b37a2733cd92011e37b5dd71bea53849ee81c19e25197106d2c5c6740d402fc2ecfa62e3447897bd559f9b0af158f7b598ea1b0cee0ed08e20caa1c4fcfc1b228ab62f5197b5923824834160d354d47d02a00d5fbe3aad3840a53f3b0026612dc", 0xbe}, {&(0x7f0000000580)="74d1240a3fd21bafde2a5dacff849f0efe99ab4e0116d3a95cbb9632aeb6cf2adff62c19a3dc78e7affea369ad6251", 0x2f}, {&(0x7f00000005c0)="2a300322326c", 0x6}, {&(0x7f0000000600)="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", 0x3dd}], 0x4}}], 0x1, 0x0) 03:07:56 executing program 2: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000080)={0x387}) 03:07:57 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) 03:07:57 executing program 2: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b4c, 0x0) 03:07:57 executing program 1: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5207, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) 03:07:57 executing program 2: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b4c, 0x0) 03:07:57 executing program 2: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b4c, 0x0) 03:07:57 executing program 1: r0 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000003000/0x1000)=nil) shmctl$IPC_RMID(r0, 0x0) 03:07:57 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmmsg$inet6(r0, &(0x7f0000002180)=[{{&(0x7f0000000480)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c, &(0x7f0000001600)=[{&(0x7f00000004c0)="7632630ba339f9d3e54b6d9bb6ebca0e898bbb8fa64b9dec54a203a17376f9f0c06feda10ab6b8dc05576ad54f396e32b736a9d65364256ff1623df2ff23474f8728a61bde1dbe95332081588b0449e059e79cf3089228f33f9cb1c59e9b37a2733cd92011e37b5dd71bea53849ee81c19e25197106d2c5c6740d402fc2ecfa62e3447897bd559f9b0af158f7b598ea1b0cee0ed08e20caa1c4fcfc1b228ab62f5197b5923824834160d354d47d02a00d5fbe3aad3840a53f3b0026612dc", 0xbe}, {&(0x7f0000000580)="74d1240a3fd21bafde2a5dacff849f0efe99ab4e0116d3a95cbb9632aeb6cf2adff62c19a3dc78e7affea369ad6251", 0x2f}, {&(0x7f00000005c0)="2a300322326c", 0x6}, {&(0x7f0000000600)="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", 0x3dd}], 0x4}}], 0x1, 0x0) 03:07:57 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet6_int(r0, 0x29, 0x46, 0x0, &(0x7f0000000200)) 03:07:57 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000001a80)) 03:07:57 executing program 2: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000080)) 03:07:57 executing program 1: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5207, 0x0) 03:07:57 executing program 2: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000080)) 03:07:57 executing program 1: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5460, 0x0) 03:07:57 executing program 3: set_mempolicy(0x1, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) [ 244.018518][ C0] vkms_vblank_simulate: vblank timer overrun 03:07:58 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmmsg$inet6(r0, &(0x7f0000002180)=[{{&(0x7f0000000480)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c, &(0x7f0000001600)=[{&(0x7f00000004c0)="7632630ba339f9d3e54b6d9bb6ebca0e898bbb8fa64b9dec54a203a17376f9f0c06feda10ab6b8dc05576ad54f396e32b736a9d65364256ff1623df2ff23474f8728a61bde1dbe95332081588b0449e059e79cf3089228f33f9cb1c59e9b37a2733cd92011e37b5dd71bea53849ee81c19e25197106d2c5c6740d402fc2ecfa62e3447897bd559f9b0af158f7b598ea1b0cee0ed08e20caa1c4fcfc1b228ab62f5197b5923824834160d354d47d02a00d5fbe3aad3840a53f3b0026612dc", 0xbe}, {&(0x7f0000000580)="74d1240a3fd21bafde2a5dacff849f0efe99ab4e0116d3a95cbb9632aeb6cf2adff62c19a3dc78e7affea369ad6251", 0x2f}, {&(0x7f00000005c0)="2a300322326c", 0x6}, {&(0x7f0000000600)="8f305daca63523e19093c0c17a5daf2870486d958094000b6afae8b9eee919f2f8408aba14ecbc2db2ae21cda6d7874b706b59f5370a9f0ce295988072a4132fdfe986a62647524b40af651d8e084fa2975aecbdfd4647eeea1a157ba04e442a558abfadf1d432cd039b317bc682062406a8b4f1b45c25c866fcc5d7cfef2e939fa3e0c38b756668071d9d4c5b91da860ffd47e058873f4f3d62ec9bcacba07d58c8bf5b77895d0aea91e82cb9ff159dc52cfa92df8cd65959f85f6a20340e1ba08334e39704e4cfb214bc3bc0953a1bcab124e8e136e453ca1e81563690856caa6386e6de4c960b140e0d11c74578073a099508596d7f00d8fb44b907a82b704fa68ac271fc0757f227369fc0b8390cd3e5fb562d5c146203f727206675412162bf1a40c8085e779c839a567c02aa140fc3164b488369e4d670d32664ac463405ebfd36c34efc5b6177e4e1b94e71767add4fab362632dd82e4e854bb75b22988d01963ef6051ea27e4edfbc70ee9fb151f984838ad63d818a187851dc9247a9b00987461a1fe307f1fd9ca2e39c47dcd0ed598f9344bbacd2d8c8eaf9883daaa574ccf08ffa31d6cfbf720bb4b242b82a2a81942137c669c138427c86bc4b439fcce6dceb8ade83cd45636850b8792b9899f4dc6e89cf43dde70247b9497374a9a57521c28bf5f29241731054c1f01c6380536b5bf3a9fee20b92a6196062a30e66b8a22d5c6a382212f5bc63cf6724079a75fbd54a6dbdbfc7a2950c21f4ce98d442acafe801ea1d513d6ff91d3ed20e75e283f61b4ad79b25744b23898ddc2c692412a3eaf8287b2e9bbd6634fb0e1683c81b8ca782c5e83aa5061542401a6d88af6e15907c27042a562b16a9d2371f5659af7f06cbce5109ddce5e101e23ca0daac34f5da15873a6f2e5da51494e5f4f6cf7f01aee1c5179f4b6f4168a46653b4fcdf4b808c69334a1a97fe3b1a3496144a1550ed8e378277986e007579b6414f9aed74e18002ce8e4aaacf90cb5ceeee83caf38013e402ab2525b39f27359a4c2ac32c51a312da2acbb5561ba735917ab0da5b78fcc116bfe2fca5c978c986937cc012ca2530d64c73297634cb572a784a17f82e1f9be18b5090d45897f6755d3e64a22458ef98373abf8bddeafd0d752661ae524a3d222b496785fd7d51a7cd3d75d56dc8bb86c41e892b3fd3e657ceecaea93e887dcc6cf16301d49f566b2bad7dc0216a5494236a099b60f7e6a12eb852f5bb0bba97630cd8f28bffe28b362da25668093f80661ade8ff511a552eb232f9ed9b1865a61d4dba4d91a80e22ab91d7b5c0f58a9f8589ae1b7e281b6feea2211290270518705904a27c3ea4dfa04ab673b1572257e3fa758fc8b994e8a8848504df9228954ac14", 0x3dd}], 0x4}}], 0x1, 0x0) 03:07:58 executing program 2: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000080)) 03:07:58 executing program 1: socket$inet_sctp(0x2, 0xb, 0x84) 03:07:58 executing program 3: socket$inet6(0xa, 0x0, 0x400) 03:07:58 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, 0x0) 03:07:58 executing program 3: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000), 0x294000, 0x0) 03:07:58 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xc, &(0x7f0000000040)=0x3, 0x4) 03:07:58 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/124, 0x7c}], 0x1) 03:07:59 executing program 2: request_key(&(0x7f0000000140)='id_legacy\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)='asymmetric\x00', 0xfffffffffffffffe) 03:07:59 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af3010004", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) open_tree(r0, &(0x7f0000000000)='./file0\x00', 0x0) 03:07:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@volatile={0x5000000}]}}, &(0x7f0000000180)=""/204, 0x26, 0xcc, 0x1}, 0x20) 03:07:59 executing program 0: pkey_mprotect(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000000, 0xffffffffffffffff) [ 245.044958][ T6565] loop1: detected capacity change from 0 to 69632 03:07:59 executing program 3: add_key(&(0x7f0000000200)='asymmetric\x00', 0x0, &(0x7f0000000280)="1087", 0x2, 0xfffffffffffffffe) 03:07:59 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x12, 0x0, &(0x7f0000000080)) 03:07:59 executing program 2: request_key(&(0x7f0000000140)='id_legacy\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)='asymmetric\x00', 0xfffffffffffffffe) [ 245.101023][ T6565] EXT4-fs (loop1): mounted filesystem without journal. Quota mode: writeback. 03:07:59 executing program 3: bpf$OBJ_GET_PROG(0x8, 0x0, 0x0) 03:07:59 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af3010004", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) open_tree(r0, &(0x7f0000000000)='./file0\x00', 0x0) 03:07:59 executing program 0: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000040)='0', 0x1, 0xfffffffffffffffb) 03:07:59 executing program 2: request_key(&(0x7f0000000140)='id_legacy\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)='asymmetric\x00', 0xfffffffffffffffe) 03:07:59 executing program 3: syz_open_dev$tty20(0xc, 0x4, 0x0) rt_sigreturn() syz_open_dev$loop(&(0x7f0000000100), 0x0, 0x0) [ 245.185556][ T6583] trusted_key: encrypted_key: insufficient parameters specified 03:07:59 executing program 2: request_key(&(0x7f0000000140)='id_legacy\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)='asymmetric\x00', 0xfffffffffffffffe) 03:07:59 executing program 0: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000040)='0', 0x1, 0xfffffffffffffffb) 03:07:59 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000002200), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEAUTHENTICATE(r0, &(0x7f00000023c0)={0x0, 0x0, &(0x7f0000002380)={&(0x7f0000002280)={0x38, r1, 0x831008af235f85df, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_IE={0xd, 0x2a, [@mesh_config={0x71, 0x7}]}]}, 0x38}}, 0x0) [ 245.250982][ T6590] trusted_key: encrypted_key: insufficient parameters specified [ 245.269660][ T6593] loop1: detected capacity change from 0 to 69632 03:07:59 executing program 2: r0 = socket(0x1e, 0x1, 0x0) sendmsg$NL80211_CMD_AUTHENTICATE(r0, &(0x7f0000000280)={&(0x7f0000000140), 0xc, &(0x7f0000000240)={0x0, 0xf0ff7f}}, 0x0) [ 245.317352][ T6593] EXT4-fs (loop1): mounted filesystem without journal. Quota mode: writeback. 03:07:59 executing program 3: syz_open_dev$loop(&(0x7f0000000000), 0xfffffffffffffffc, 0x478103) 03:07:59 executing program 0: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000040)='0', 0x1, 0xfffffffffffffffb) 03:07:59 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$FIONREAD(r0, 0x4b60, &(0x7f0000000000)) 03:07:59 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af3010004", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) open_tree(r0, &(0x7f0000000000)='./file0\x00', 0x0) [ 245.384391][ T6602] trusted_key: encrypted_key: insufficient parameters specified 03:07:59 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)="e1684fb37bb49116c288950e38f5dec68df398424dd1bff744a97a7cea53") getresgid(&(0x7f0000001840), &(0x7f0000001880), &(0x7f00000018c0)) syz_clone(0x142082080, &(0x7f0000001900)="63caf01df1be6236cecd8423c03fb5c818f7f364ab5bdb4e228573563a18d8969cbece953f4bc510f9c99aeb8f0908dcf0148aa3d2d6e810167edb3d33f64da2187620e8b6bcfeabf0e52c37c2442aa997df1facd5bf55c9d8e2936c9c79b50511e4adcab3bbac0372e54761512b147bf5aadb2445749f35e8998ef145843bb8089618c0589318f6375d2e65c0b8d5cb578d704be453e737e534afaf79e91c3306fcdfef6a5437f8ce5c9afab89f8678f544dd07c0ba3395163bf503be872311d3868a3cccedfd5c12e854b1", 0xcc, &(0x7f0000001a00), &(0x7f0000001a40), &(0x7f0000001a80)="da0be9440f26a4e514426cf0b0afc43794458fe82f4c64d2a30af7b4e44814b41ecabb78423d606466c9586dccd3b65dc4b83040205dcc1b2781ed1ddefc140a877ed31b8c856c3b") setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, 0x0, 0x0) 03:07:59 executing program 0: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000040)='0', 0x1, 0xfffffffffffffffb) 03:07:59 executing program 2: getresgid(0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 03:07:59 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$FIONREAD(r0, 0x560d, &(0x7f0000000000)) [ 245.453480][ T6608] trusted_key: encrypted_key: insufficient parameters specified [ 245.489632][ T6612] loop1: detected capacity change from 0 to 69632 [ 245.523438][ T6612] EXT4-fs (loop1): mounted filesystem without journal. Quota mode: writeback. 03:07:59 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) getresgid(0x0, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, 0x0, 0x0) syz_clone(0x8040000, 0x0, 0x0, 0x0, 0x0, 0x0) 03:07:59 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSW(r0, 0x5432, 0x0) 03:08:00 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af3010004", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) open_tree(r0, &(0x7f0000000000)='./file0\x00', 0x0) 03:08:00 executing program 0: prctl$PR_SET_TIMERSLACK(0x1d, 0x7ff) 03:08:00 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$BLKPG(r0, 0x1265, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0}) 03:08:00 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL80211_CMD_DISCONNECT(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, r1, 0x301, 0x0, 0x0, {{0x11}, {@val={0x8, 0x11a}, @void}}}, 0x1c}}, 0x0) [ 245.635667][ T6625] netlink: 'syz-executor.3': attribute type 282 has an invalid length. 03:08:00 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000000040)) ioctl$FIONREAD(r0, 0x4b31, &(0x7f0000000000)) 03:08:00 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) syz_clone(0x142082080, 0x0, 0x0, 0x0, &(0x7f0000001a40), &(0x7f0000001a80)) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, 0x0, 0x0) 03:08:00 executing program 2: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xffffffffffffffff}}, './file0\x00'}) getresuid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) 03:08:00 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSW(r0, 0x4b49, &(0x7f0000000040)={0x3, 0x0, 0x0, 0x0, 0x0, "b4886c5ad620a90c5e1f8b0b6245c0bf2cd3f0"}) [ 245.757674][ T6631] loop1: detected capacity change from 0 to 69632 [ 245.795619][ T6631] EXT4-fs (loop1): mounted filesystem without journal. Quota mode: writeback. 03:08:00 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000040)={0xffffffff, 0x0, 0x0, 0xfffff0d3, 0x0, "b407777c00"}) 03:08:00 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSW(r0, 0x4b49, &(0x7f0000000040)={0x3, 0x0, 0x0, 0x0, 0x0, "b4886c5ad620a90c5e1f8b0b6245c0bf2cd3f0"}) 03:08:00 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSW(r0, 0x4b49, &(0x7f0000000040)={0x3, 0x0, 0x0, 0x0, 0x0, "b4886c5ad620a90c5e1f8b0b6245c0bf2cd3f0"}) 03:08:00 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$FIONREAD(r0, 0x5423, &(0x7f0000000000)) 03:08:00 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$FIONREAD(r0, 0x5423, &(0x7f0000000000)) 03:08:00 executing program 0: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x142082080, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x8040000, 0x0, 0x0, 0x0, 0x0, 0x0) 03:08:00 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSW(r0, 0x4b49, &(0x7f0000000040)={0x3, 0x0, 0x0, 0x0, 0x0, "b4886c5ad620a90c5e1f8b0b6245c0bf2cd3f0"}) 03:08:00 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$BLKPG(r0, 0x4c03, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0}) 03:08:00 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x10, 0x0, 0x0, 0x1}, 0x48) 03:08:00 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x5) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, 0x0, 0x0) 03:08:00 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f0000000080)='[', 0x1, 0x80000001}, {&(0x7f0000000180)='\r', 0x1}], 0x18000, &(0x7f00000002c0)={[], [{@subj_role}]}) 03:08:00 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$FIONREAD(r0, 0x4b2f, &(0x7f0000000000)) 03:08:00 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSW(r0, 0x4b49, &(0x7f0000000040)={0xfe, 0x0, 0x0, 0x0, 0x0, "b4886c5ad620a90c5e1f8b0b6245c0bf2cd3f0"}) [ 246.052934][ T6668] loop3: detected capacity change from 0 to 264192 03:08:00 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$FIONREAD(r0, 0x5411, &(0x7f0000000000)) 03:08:00 executing program 2: r0 = gettid() tkill(r0, 0x20) 03:08:00 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSW(r0, 0x4b49, &(0x7f0000000040)={0xfe, 0x0, 0x0, 0x0, 0x0, "b4886c5ad620a90c5e1f8b0b6245c0bf2cd3f0"}) 03:08:00 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_dev$ptys(0xc, 0x3, 0x0) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, 0x0) 03:08:00 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSW(r0, 0x4b49, &(0x7f0000000040)={0xfe, 0x0, 0x0, 0x0, 0x0, "b4886c5ad620a90c5e1f8b0b6245c0bf2cd3f0"}) 03:08:00 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$FIONREAD(r0, 0x4b48, &(0x7f0000000000)) [ 246.218586][ T38] audit: type=1400 audit(1645240080.629:266): avc: denied { open } for pid=6675 comm="syz-executor.3" path="/dev/ttyqa" dev="devtmpfs" ino=390 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 03:08:00 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$FIONREAD(r0, 0x4b4c, &(0x7f0000000000)) 03:08:00 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_dev$ptys(0xc, 0x3, 0x0) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, 0x0) 03:08:00 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSW(r0, 0x4b49, &(0x7f0000000040)={0xfe, 0x0, 0x0, 0x0, 0x0, "b4886c5ad620a90c5e1f8b0b6245c0bf2cd3f0"}) 03:08:00 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$FIONREAD(r0, 0x4b52, &(0x7f0000000000)) 03:08:00 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_AP(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000008c0)={&(0x7f0000000840)={0x2c, r1, 0x101, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_HE_OBSS_PD={0x10, 0x117, 0x0, 0x1, [@NL80211_HE_OBSS_PD_ATTR_MIN_OFFSET={0x4}]}]}, 0x2c}}, 0x0) 03:08:00 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000000000)) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBDIACR(r1, 0x4b4a, &(0x7f0000000040)=""/60) 03:08:00 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_dev$ptys(0xc, 0x3, 0x0) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, 0x0) [ 246.376868][ T6696] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 03:08:00 executing program 0: bpf$OBJ_GET_MAP(0x8, &(0x7f00000003c0)={0x0, 0x4000}, 0x10) 03:08:00 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSW(r0, 0x4b52, &(0x7f0000000040)={0x0, 0x2000000, 0x0, 0x0, 0x0, "b4886c5ad620a90c5e1f8b0b6245c0bf2cd3f0"}) 03:08:00 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000004c0)='ns/cgroup\x00') 03:08:00 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$FIONREAD(r0, 0x80045440, &(0x7f0000000000)) 03:08:00 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x103081, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'wlan1\x00', 0x1}) write$tun(r0, 0x0, 0x0) 03:08:00 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_dev$ptys(0xc, 0x3, 0x0) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, 0x0) 03:08:00 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'vlan0\x00', 0x2}) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000040)) 03:08:00 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$BLKPG(r0, 0x80041284, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0}) 03:08:00 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$FIONREAD(r0, 0x4b32, &(0x7f0000000000)) 03:08:00 executing program 2: syz_usb_connect$printer(0x0, 0x0, 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) syz_mount_image$ext4(&(0x7f0000000cc0)='ext3\x00', &(0x7f0000000d00)='./file0\x00', 0x0, 0x1, &(0x7f0000002280)=[{0x0}], 0x4, &(0x7f0000002380)={[{@data_writeback}, {@journal_path={'journal_path', 0x3d, './file0'}}]}) r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f0000002640)) syz_usb_connect$printer(0x0, 0x0, 0x0, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000002980)={&(0x7f00000027c0), 0xc, 0x0}, 0x0) 03:08:00 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xfffff0d3, 0x0, "b407777c00"}) [ 246.626183][ T6724] journal_path: Lookup failure for './file0' 03:08:01 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_dev$ptys(0xc, 0x3, 0x0) [ 246.633892][ T6724] EXT4-fs: error: could not find journal device path 03:08:01 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$FIONREAD(r0, 0x5412, &(0x7f0000000000)) 03:08:01 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xfffff0d3, 0x0, "b407777c00"}) 03:08:01 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$FIONREAD(r0, 0x5412, &(0x7f0000000000)) 03:08:01 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xfffff0d3, 0x0, "b407777c00"}) 03:08:01 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) 03:08:01 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, 0x0, &(0x7f00000000c0)) 03:08:01 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xfffff0d3, 0x0, "b407777c00"}) 03:08:01 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$FIONREAD(r0, 0x5412, &(0x7f0000000000)) 03:08:01 executing program 3: ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) 03:08:01 executing program 3: ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) 03:08:01 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSW(r0, 0x5434, 0x0) 03:08:01 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$FIONREAD(r0, 0x5412, &(0x7f0000000000)) 03:08:01 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$FIONREAD(r0, 0x5601, &(0x7f0000000000)) 03:08:01 executing program 3: ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) 03:08:01 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0xfffffffdfffffffb) 03:08:01 executing program 3: syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) 03:08:01 executing program 1: recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) syz_clone(0x142082080, &(0x7f0000001900)="63caf01df1be6236cecd8423c03fb5c818f7f364ab5bdb4e228573563a18d8969cbece953f4bc510f9c99aeb8f0908dcf0148aa3d2d6e810167edb3d33f64da2187620e8b6bcfeabf0e52c37c2442aa997df1facd5bf55c9d8e2936c9c79b50511e4adcab3bbac0372e54761512b147bf5aadb2445749f35e8998ef145843bb8089618c0589318f6375d2e65c0b8d5cb578d704be453e737e534afaf79e91c3306fcdfef6a5437f8ce5c9afab89f8678f544dd07c0ba3395163bf503be872311d3868a3cccedfd5c12e854b1da21ae560fe665c73a0030e456371adc0e5f4bc12eba0fe2ea10ff212a", 0xe9, &(0x7f0000001a00), &(0x7f0000001a40), &(0x7f0000001a80)="da0be9440f26a4e514426cf0b0afc43794458fe82f4c64d2a30af7b4e44814b41ecabb78423d606466c9586dccd3b65dc4b83040205dcc1b2781ed1ddefc140a877ed31b8c856c3b") 03:08:01 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)="e1684fb37bb49116c288950e38f5dec68df398424dd1bff744a97a") syz_clone(0x142082080, &(0x7f0000001900), 0x0, &(0x7f0000001a00), &(0x7f0000001a40), &(0x7f0000001a80)="da0be9440f26a4e514426cf0b0afc43794458fe82f4c64d2a30af7b4e44814b41ecabb78423d606466c9586dccd3b65dc4b83040205dcc1b2781ed1ddefc140a877ed31b8c856c3b") setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, 0x0, 0x0) 03:08:01 executing program 3: syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) 03:08:01 executing program 3: syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) 03:08:01 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(r0, r1, 0x0, 0x8400fffffff7) [ 247.556405][ T6775] loop3: detected capacity change from 0 to 264192 03:08:02 executing program 1: recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) syz_clone(0x142082080, &(0x7f0000001900)="63caf01df1be6236cecd8423c03fb5c818f7f364ab5bdb4e228573563a18d8969cbece953f4bc510f9c99aeb8f0908dcf0148aa3d2d6e810167edb3d33f64da2187620e8b6bcfeabf0e52c37c2442aa997df1facd5bf55c9d8e2936c9c79b50511e4adcab3bbac0372e54761512b147bf5aadb2445749f35e8998ef145843bb8089618c0589318f6375d2e65c0b8d5cb578d704be453e737e534afaf79e91c3306fcdfef6a5437f8ce5c9afab89f8678f544dd07c0ba3395163bf503be872311d3868a3cccedfd5c12e854b1da21ae560fe665c73a0030e456371adc0e5f4bc12eba0fe2ea10ff212a", 0xe9, &(0x7f0000001a00), &(0x7f0000001a40), &(0x7f0000001a80)="da0be9440f26a4e514426cf0b0afc43794458fe82f4c64d2a30af7b4e44814b41ecabb78423d606466c9586dccd3b65dc4b83040205dcc1b2781ed1ddefc140a877ed31b8c856c3b") [ 247.636033][ T38] audit: type=1400 audit(1645240082.039:267): avc: denied { mount } for pid=6774 comm="syz-executor.3" name="/" dev="loop3" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dosfs_t tclass=filesystem permissive=1 [ 247.677327][ T38] audit: type=1804 audit(1645240082.079:268): pid=6775 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir357052190/syzkaller.J6xd9H/345/file1/bus" dev="loop3" ino=1048588 res=1 errno=0 [ 247.888941][ T38] audit: type=1400 audit(1645240082.299:269): avc: denied { unmount } for pid=3701 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dosfs_t tclass=filesystem permissive=1 03:08:02 executing program 2: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(r0, r1, 0x0, 0x8400fffffff7) 03:08:02 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)="e1684fb37bb49116c288950e38f5dec68df398424dd1bff744a97a") syz_clone(0x142082080, &(0x7f0000001900), 0x0, &(0x7f0000001a00), &(0x7f0000001a40), &(0x7f0000001a80)="da0be9440f26a4e514426cf0b0afc43794458fe82f4c64d2a30af7b4e44814b41ecabb78423d606466c9586dccd3b65dc4b83040205dcc1b2781ed1ddefc140a877ed31b8c856c3b") setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, 0x0, 0x0) 03:08:02 executing program 1: recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) syz_clone(0x142082080, &(0x7f0000001900)="63caf01df1be6236cecd8423c03fb5c818f7f364ab5bdb4e228573563a18d8969cbece953f4bc510f9c99aeb8f0908dcf0148aa3d2d6e810167edb3d33f64da2187620e8b6bcfeabf0e52c37c2442aa997df1facd5bf55c9d8e2936c9c79b50511e4adcab3bbac0372e54761512b147bf5aadb2445749f35e8998ef145843bb8089618c0589318f6375d2e65c0b8d5cb578d704be453e737e534afaf79e91c3306fcdfef6a5437f8ce5c9afab89f8678f544dd07c0ba3395163bf503be872311d3868a3cccedfd5c12e854b1da21ae560fe665c73a0030e456371adc0e5f4bc12eba0fe2ea10ff212a", 0xe9, &(0x7f0000001a00), &(0x7f0000001a40), &(0x7f0000001a80)="da0be9440f26a4e514426cf0b0afc43794458fe82f4c64d2a30af7b4e44814b41ecabb78423d606466c9586dccd3b65dc4b83040205dcc1b2781ed1ddefc140a877ed31b8c856c3b") 03:08:02 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(r0, r1, 0x0, 0x8400fffffff7) [ 248.242113][ T6792] loop3: detected capacity change from 0 to 264192 [ 248.259881][ T6795] loop2: detected capacity change from 0 to 264192 [ 248.333596][ T38] audit: type=1804 audit(1645240082.739:270): pid=6795 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/syzkaller-testdir1336744605/syzkaller.HbFjRK/331/file1/bus" dev="loop2" ino=1048589 res=1 errno=0 [ 248.376578][ T38] audit: type=1804 audit(1645240082.739:271): pid=6792 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir357052190/syzkaller.J6xd9H/346/file1/bus" dev="loop3" ino=1048590 res=1 errno=0 03:08:02 executing program 1: recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) syz_clone(0x142082080, &(0x7f0000001900)="63caf01df1be6236cecd8423c03fb5c818f7f364ab5bdb4e228573563a18d8969cbece953f4bc510f9c99aeb8f0908dcf0148aa3d2d6e810167edb3d33f64da2187620e8b6bcfeabf0e52c37c2442aa997df1facd5bf55c9d8e2936c9c79b50511e4adcab3bbac0372e54761512b147bf5aadb2445749f35e8998ef145843bb8089618c0589318f6375d2e65c0b8d5cb578d704be453e737e534afaf79e91c3306fcdfef6a5437f8ce5c9afab89f8678f544dd07c0ba3395163bf503be872311d3868a3cccedfd5c12e854b1da21ae560fe665c73a0030e456371adc0e5f4bc12eba0fe2ea10ff212a", 0xe9, &(0x7f0000001a00), &(0x7f0000001a40), &(0x7f0000001a80)="da0be9440f26a4e514426cf0b0afc43794458fe82f4c64d2a30af7b4e44814b41ecabb78423d606466c9586dccd3b65dc4b83040205dcc1b2781ed1ddefc140a877ed31b8c856c3b") 03:08:02 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)="e1684fb37bb49116c288950e38f5dec68df398424dd1bff744a97a") syz_clone(0x142082080, &(0x7f0000001900), 0x0, &(0x7f0000001a00), &(0x7f0000001a40), &(0x7f0000001a80)="da0be9440f26a4e514426cf0b0afc43794458fe82f4c64d2a30af7b4e44814b41ecabb78423d606466c9586dccd3b65dc4b83040205dcc1b2781ed1ddefc140a877ed31b8c856c3b") setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, 0x0, 0x0) 03:08:03 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(r0, r1, 0x0, 0x8400fffffff7) 03:08:03 executing program 2: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(r0, r1, 0x0, 0x8400fffffff7) 03:08:03 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)="e1684fb37bb49116c288950e38f5dec68df398424dd1bff744a97a") syz_clone(0x142082080, &(0x7f0000001900), 0x0, &(0x7f0000001a00), &(0x7f0000001a40), &(0x7f0000001a80)="da0be9440f26a4e514426cf0b0afc43794458fe82f4c64d2a30af7b4e44814b41ecabb78423d606466c9586dccd3b65dc4b83040205dcc1b2781ed1ddefc140a877ed31b8c856c3b") setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, 0x0, 0x0) 03:08:03 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(r0, r1, 0x0, 0x8400fffffff7) [ 248.794223][ T6811] loop1: detected capacity change from 0 to 264192 [ 248.833506][ T6813] loop2: detected capacity change from 0 to 264192 [ 248.837297][ T6815] loop3: detected capacity change from 0 to 264192 [ 248.887650][ T38] audit: type=1804 audit(1645240083.299:272): pid=6811 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/syzkaller-testdir2877458552/syzkaller.BGx8BS/360/file1/bus" dev="loop1" ino=1048591 res=1 errno=0 [ 248.924967][ T38] audit: type=1804 audit(1645240083.329:273): pid=6813 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/syzkaller-testdir1336744605/syzkaller.HbFjRK/332/file1/bus" dev="loop2" ino=1048592 res=1 errno=0 [ 249.011826][ T38] audit: type=1804 audit(1645240083.339:274): pid=6818 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir357052190/syzkaller.J6xd9H/347/file1/bus" dev="sda1" ino=1166 res=1 errno=0 03:08:03 executing program 0: syz_clone(0x2a000200, 0x0, 0x0, 0x0, 0x0, 0x0) 03:08:03 executing program 0: r0 = syz_io_uring_setup(0x522f, &(0x7f00000010c0), &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000001140), &(0x7f0000001180)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000003740)=[0xffffffffffffffff, 0xffffffffffffffff], 0x2) 03:08:03 executing program 2: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x1000) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) 03:08:03 executing program 0: clock_getres(0x5, &(0x7f0000000340)) [ 249.429983][ T6827] loop2: detected capacity change from 0 to 264192 03:08:04 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(r0, r1, 0x0, 0x8400fffffff7) 03:08:04 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, 0x0) 03:08:04 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$BTRFS_IOC_RESIZE(r0, 0x50009403, 0x0) 03:08:04 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000040)) 03:08:04 executing program 2: syz_open_procfs(0x0, &(0x7f0000000000)='uid_map\x00') 03:08:04 executing program 1: faccessat(0xffffffffffffffff, &(0x7f0000001500)='./file1\x00', 0x0) 03:08:04 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='auxv\x00') sendmsg$netlink(r0, 0x0, 0x0) 03:08:04 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000000)={'tunl0\x00', {0x2, 0x0, @multicast2}}) [ 249.930513][ T6843] loop3: detected capacity change from 0 to 264192 [ 250.007178][ T38] audit: type=1804 audit(1645240084.419:275): pid=6843 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir357052190/syzkaller.J6xd9H/348/file1/bus" dev="loop3" ino=1048594 res=1 errno=0 03:08:04 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r0, 0x0, &(0x7f0000000180)) 03:08:04 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) getsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) 03:08:04 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffff7) 03:08:04 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000004c0), 0x0, 0x4000) 03:08:04 executing program 2: semget$private(0x0, 0x1, 0x205) 03:08:04 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x40000, 0x0) 03:08:04 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$BTRFS_IOC_SET_FEATURES(r0, 0x40309439, 0x0) 03:08:04 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) 03:08:04 executing program 0: openat$vsock(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f00000007c0)='devices.deny\x00', 0x2, 0x0) syz_clone3(&(0x7f0000000a00)={0x900000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000009c0)=[0xffffffffffffffff], 0x1}, 0x58) syz_clone3(&(0x7f0000000e40)={0x104000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000dc0)=[0x0, 0x0, 0x0], 0x3}, 0x58) 03:08:04 executing program 2: pselect6(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={0xfffffffffffffffd}) [ 250.452104][ T6863] loop3: detected capacity change from 0 to 264192 03:08:05 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffff7) 03:08:05 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[{&(0x7f0000000540)="e9", 0x1, 0x58d5}, {&(0x7f0000000640)="e9", 0x1, 0xfffffffffffff800}], 0x0, 0x0) 03:08:05 executing program 0: syz_clone(0x42080000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone3(&(0x7f0000000500)={0x400, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 03:08:05 executing program 2: syz_mount_image$fuse(&(0x7f0000002540), &(0x7f0000002580)='./file0\x00', 0x0, 0x0, 0x0, 0x204040, &(0x7f00000025c0)) [ 250.676163][ T6867] fuse: Bad value for 'fd' [ 250.677096][ T6868] loop1: detected capacity change from 0 to 16376 03:08:05 executing program 2: r0 = syz_open_dev$rtc(&(0x7f0000000080), 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4008700e, 0x0) 03:08:05 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000380)={0x14, 0x3, 0x1, 0x101}, 0x14}}, 0x0) 03:08:05 executing program 2: syz_usb_connect$cdc_ecm(0x0, 0x76, &(0x7f00000001c0)=ANY=[@ANYBLOB="12010002020000202505a1a4400001020301090264000100"], 0x0) [ 250.821843][ T6739] I/O error, dev loop1, sector 16128 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 250.849231][ T6877] loop3: detected capacity change from 0 to 264192 03:08:05 executing program 0: mmap$snddsp_status(&(0x7f0000ffa000/0x3000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x82000000) [ 251.064719][ T3746] usb 7-1: new high-speed USB device number 5 using dummy_hcd [ 251.334817][ T3746] usb 7-1: Using ep0 maxpacket: 32 [ 251.485116][ T3746] usb 7-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 251.505766][ T3746] usb 7-1: config 0 has 0 interfaces, different from the descriptor's value: 1 03:08:06 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffff7) 03:08:06 executing program 0: io_setup(0x96, &(0x7f0000000240)=0x0) io_submit(r0, 0x1, &(0x7f0000000380)=[&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffdca}]) 03:08:06 executing program 1: setresuid(0x0, 0xee00, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x89fa, &(0x7f0000000300)={'ip6gre0\x00', 0x0}) [ 251.694950][ T3746] usb 7-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 251.702293][ T38] kauditd_printk_skb: 5 callbacks suppressed [ 251.702309][ T38] audit: type=1400 audit(1645240086.109:281): avc: denied { ioctl } for pid=6885 comm="syz-executor.1" path="socket:[41755]" dev="sockfs" ino=41755 ioctlcmd=0x89fa scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 251.706186][ T3746] usb 7-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 251.754743][ T3746] usb 7-1: Product: syz [ 251.759243][ T3746] usb 7-1: Manufacturer: syz [ 251.763707][ T3746] usb 7-1: SerialNumber: syz 03:08:06 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x9, 0x200, 0x7ff, 0x19, 0x0, 0xffffffffffffffff, 0xfffffc00, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x48) [ 251.773598][ T3746] usb 7-1: config 0 descriptor?? 03:08:06 executing program 0: pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone3(&(0x7f0000000a00)={0x900000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 03:08:06 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x9, 0x200, 0x7ff, 0x19, 0x0, 0xffffffffffffffff, 0xfffffc00, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x48) [ 251.935759][ T6896] loop3: detected capacity change from 0 to 264192 [ 251.962325][ T38] audit: type=1804 audit(1645240086.369:282): pid=6896 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir357052190/syzkaller.J6xd9H/351/file1/bus" dev="loop3" ino=1048596 res=1 errno=0 [ 252.032122][ T3746] usb 7-1: USB disconnect, device number 5 03:08:06 executing program 2: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000380)='ns/ipc\x00') 03:08:06 executing program 0: pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone3(&(0x7f0000000a00)={0x900000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 03:08:06 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x9, 0x200, 0x7ff, 0x19, 0x0, 0xffffffffffffffff, 0xfffffc00, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x48) 03:08:06 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8400fffffff7) [ 252.583920][ T6903] loop3: detected capacity change from 0 to 264192 03:08:07 executing program 0: r0 = syz_usb_connect$cdc_ecm(0x0, 0x4d, &(0x7f0000000140)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x3b, 0x1, 0x1, 0xfc, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}}}}]}}]}}, 0x0) syz_usb_control_io$cdc_ecm(r0, &(0x7f0000000500)={0x14, 0x0, &(0x7f00000004c0)={0x0, 0x3, 0x1a, {0x1a}}}, 0x0) 03:08:07 executing program 2: openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="362e0f381d00bad00466ed0f01d166b93a0600000f322e0f01cb26f30f1efbba400066ed66d8915d18660f3880404366b9800000c00f326635001000000f30", 0xfffffffffffffe07}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:08:07 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8400fffffff7) 03:08:07 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x9, 0x200, 0x7ff, 0x19, 0x0, 0xffffffffffffffff, 0xfffffc00, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x48) [ 252.770642][ T6914] loop3: detected capacity change from 0 to 264192 03:08:07 executing program 1: creat(0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="362e0f381d00bad00466ed0f01d166b93a0600000f322e0f01cb26f30f1efbba400066ed66d8915d18660f3880404366b9800000c00f326635001000000f30", 0xfffffffffffffe07}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:08:07 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8400fffffff7) [ 252.934884][ T5598] usb 5-1: new high-speed USB device number 4 using dummy_hcd [ 253.000373][ T6919] loop3: detected capacity change from 0 to 264192 03:08:07 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x1000) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(r0, r1, 0x0, 0x8400fffffff7) [ 253.204877][ T5598] usb 5-1: Using ep0 maxpacket: 32 03:08:07 executing program 2: openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="362e0f381d00bad00466ed0f01d166b93a0600000f322e0f01cb26f30f1efbba400066ed66d8915d18660f3880404366b9800000c00f326635001000000f30", 0xfffffffffffffe07}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 253.291996][ T6925] loop3: detected capacity change from 0 to 264192 [ 253.335070][ T5598] usb 5-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 253.343160][ T38] audit: type=1804 audit(1645240087.749:283): pid=6925 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir357052190/syzkaller.J6xd9H/355/file1/bus" dev="loop3" ino=1048599 res=1 errno=0 [ 253.545449][ T5598] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 253.558866][ T5598] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 253.574499][ T5598] usb 5-1: Product: syz [ 253.581268][ T5598] usb 5-1: Manufacturer: syz [ 253.588498][ T5598] usb 5-1: SerialNumber: syz [ 253.857094][ T5598] cdc_ether: probe of 5-1:1.0 failed with error -22 [ 254.077113][ T5598] usb 5-1: USB disconnect, device number 4 03:08:09 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x1000) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(r0, r1, 0x0, 0x8400fffffff7) 03:08:09 executing program 1: creat(0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="362e0f381d00bad00466ed0f01d166b93a0600000f322e0f01cb26f30f1efbba400066ed66d8915d18660f3880404366b9800000c00f326635001000000f30", 0xfffffffffffffe07}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:08:09 executing program 2: openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="362e0f381d00bad00466ed0f01d166b93a0600000f322e0f01cb26f30f1efbba400066ed66d8915d18660f3880404366b9800000c00f326635001000000f30", 0xfffffffffffffe07}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:08:09 executing program 0: socket$inet_udp(0x2, 0x2, 0x0) r0 = syz_open_dev$vcsu(&(0x7f0000000000), 0x3f, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000140)={'gretap0\x00', &(0x7f00000000c0)={'ip_vti0\x00', 0x0, 0x10, 0x10, 0x8, 0x1, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x68, 0x0, 0x4, 0x29, 0x0, @private=0xa010102, @broadcast, {[@generic={0x0, 0x2}]}}}}}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wlan1\x00'}) sendmsg$NL80211_CMD_REGISTER_BEACONS(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40150}, 0x40001) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f00000007c0)={'ip6_vti0\x00', &(0x7f0000000740)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x2, 0x1, 0x22, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @local}}) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect$bt_sco(r1, &(0x7f00000002c0)={0x1f, @none}, 0x8) [ 254.653685][ T38] audit: type=1400 audit(1645240089.059:284): avc: denied { connect } for pid=6927 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 254.664820][ T6934] loop3: detected capacity change from 0 to 264192 03:08:09 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x1000) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(r0, r1, 0x0, 0x8400fffffff7) [ 254.744103][ T38] audit: type=1804 audit(1645240089.149:285): pid=6934 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir357052190/syzkaller.J6xd9H/356/file1/bus" dev="loop3" ino=1048600 res=1 errno=0 [ 255.006884][ T6938] loop3: detected capacity change from 0 to 264192 [ 255.050622][ T38] audit: type=1804 audit(1645240089.459:286): pid=6939 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir357052190/syzkaller.J6xd9H/357/file1/bus" dev="sda1" ino=1164 res=1 errno=0 03:08:09 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(r0, r1, 0x0, 0x8400fffffff7) [ 255.192850][ T6941] loop3: detected capacity change from 0 to 264192 [ 255.279347][ T38] audit: type=1804 audit(1645240089.689:287): pid=6941 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir357052190/syzkaller.J6xd9H/358/file1/bus" dev="loop3" ino=1048601 res=1 errno=0 03:08:09 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(r0, r1, 0x0, 0x8400fffffff7) 03:08:09 executing program 1: creat(0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="362e0f381d00bad00466ed0f01d166b93a0600000f322e0f01cb26f30f1efbba400066ed66d8915d18660f3880404366b9800000c00f326635001000000f30", 0xfffffffffffffe07}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 255.408584][ T6943] loop3: detected capacity change from 0 to 264192 03:08:09 executing program 2: syz_mount_image$nfs(&(0x7f0000000040), 0x0, 0x0, 0x1, &(0x7f0000001400)=[{0x0}], 0x8, 0x0) syz_mount_image$nfs(0x0, 0x0, 0x0, 0x3, &(0x7f0000001a80)=[{&(0x7f0000001580)="93", 0x1, 0xad6a}, {&(0x7f0000001680)="c5", 0x1}, {&(0x7f0000001740)='@', 0x1, 0xfffffffffffffffa}], 0x0, 0x0) 03:08:09 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(r0, r1, 0x0, 0x8400fffffff7) [ 255.447815][ T38] audit: type=1804 audit(1645240089.859:288): pid=6943 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir357052190/syzkaller.J6xd9H/359/file1/bus" dev="loop3" ino=1048602 res=1 errno=0 03:08:09 executing program 0: socket$inet_udp(0x2, 0x2, 0x0) r0 = syz_open_dev$vcsu(&(0x7f0000000000), 0x3f, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000140)={'gretap0\x00', &(0x7f00000000c0)={'ip_vti0\x00', 0x0, 0x10, 0x10, 0x8, 0x1, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x68, 0x0, 0x4, 0x29, 0x0, @private=0xa010102, @broadcast, {[@generic={0x0, 0x2}]}}}}}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wlan1\x00'}) sendmsg$NL80211_CMD_REGISTER_BEACONS(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40150}, 0x40001) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f00000007c0)={'ip6_vti0\x00', &(0x7f0000000740)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x2, 0x1, 0x22, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @local}}) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect$bt_sco(r1, &(0x7f00000002c0)={0x1f, @none}, 0x8) 03:08:10 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_UPDATE_FT_IES(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x14, r1, 0x891, 0x0, 0x0, {{0x5f}, {@void, @void}}}, 0x14}}, 0x0) 03:08:10 executing program 2: syz_mount_image$udf(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x400000000000000, &(0x7f00000006c0), 0x0, &(0x7f0000000d00)=ANY=[@ANYBLOB='umask=00000000000000000000400,utf8,volume=']) [ 255.642377][ T38] audit: type=1804 audit(1645240090.049:289): pid=6953 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir357052190/syzkaller.J6xd9H/360/bus" dev="sda1" ino=1153 res=1 errno=0 03:08:10 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') ftruncate(0xffffffffffffffff, 0x1000) lseek(0xffffffffffffffff, 0x0, 0x2) r0 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(0xffffffffffffffff, r0, 0x0, 0x8400fffffff7) [ 255.710855][ T6959] loop3: detected capacity change from 0 to 264192 03:08:10 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') ftruncate(0xffffffffffffffff, 0x1000) lseek(0xffffffffffffffff, 0x0, 0x2) r0 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(0xffffffffffffffff, r0, 0x0, 0x8400fffffff7) 03:08:10 executing program 1: creat(0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="362e0f381d00bad00466ed0f01d166b93a0600000f322e0f01cb26f30f1efbba400066ed66d8915d18660f3880404366b9800000c00f326635001000000f30", 0xfffffffffffffe07}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:08:10 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') ftruncate(0xffffffffffffffff, 0x1000) lseek(0xffffffffffffffff, 0x0, 0x2) r0 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(0xffffffffffffffff, r0, 0x0, 0x8400fffffff7) [ 255.962560][ T6963] loop3: detected capacity change from 0 to 264192 03:08:10 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(r0, r1, 0x0, 0x8400fffffff7) [ 256.119566][ T6968] loop3: detected capacity change from 0 to 264192 [ 256.159504][ T38] audit: type=1804 audit(1645240090.569:290): pid=6970 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir357052190/syzkaller.J6xd9H/364/bus" dev="sda1" ino=1164 res=1 errno=0 03:08:10 executing program 0: socket$inet_udp(0x2, 0x2, 0x0) r0 = syz_open_dev$vcsu(&(0x7f0000000000), 0x3f, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000140)={'gretap0\x00', &(0x7f00000000c0)={'ip_vti0\x00', 0x0, 0x10, 0x10, 0x8, 0x1, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x68, 0x0, 0x4, 0x29, 0x0, @private=0xa010102, @broadcast, {[@generic={0x0, 0x2}]}}}}}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wlan1\x00'}) sendmsg$NL80211_CMD_REGISTER_BEACONS(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40150}, 0x40001) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f00000007c0)={'ip6_vti0\x00', &(0x7f0000000740)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x2, 0x1, 0x22, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @local}}) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect$bt_sco(r1, &(0x7f00000002c0)={0x1f, @none}, 0x8) 03:08:10 executing program 2: syz_usb_connect$printer(0x0, 0x2d, &(0x7f0000000000)={{0x12, 0x1, 0x300, 0x0, 0x0, 0x0, 0x20, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1}}]}}, &(0x7f0000000340)={0x0, 0x0, 0x11, &(0x7f0000000080)={0x5, 0xf, 0x11, 0x1, [@ssp_cap={0xc}]}}) 03:08:11 executing program 1: creat(0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="362e0f381d00bad00466ed0f01d166b93a0600000f322e0f01cb26f30f1efbba400066ed66d8915d18660f3880404366b9800000c00f326635001000000f30", 0xfffffffffffffe07}], 0x1, 0x3296393731608a96, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 256.764823][ T3788] Bluetooth: hci3: command 0x0405 tx timeout [ 256.814797][ T172] usb 7-1: new high-speed USB device number 6 using dummy_hcd 03:08:11 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(r0, r1, 0x0, 0x8400fffffff7) 03:08:11 executing program 1: creat(0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="362e0f381d00bad00466ed0f01d166b93a0600000f322e0f01cb26f30f1efbba400066ed66d8915d18660f3880404366b9800000c00f326635001000000f30", 0xfffffffffffffe07}], 0x1, 0x3296393731608a96, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 257.069713][ T172] usb 7-1: Using ep0 maxpacket: 32 [ 257.098245][ T6982] loop3: detected capacity change from 0 to 264192 [ 257.126157][ T38] audit: type=1804 audit(1645240091.539:291): pid=6982 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir357052190/syzkaller.J6xd9H/365/bus" dev="sda1" ino=1164 res=1 errno=0 03:08:11 executing program 0: socket$inet_udp(0x2, 0x2, 0x0) r0 = syz_open_dev$vcsu(&(0x7f0000000000), 0x3f, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000140)={'gretap0\x00', &(0x7f00000000c0)={'ip_vti0\x00', 0x0, 0x10, 0x10, 0x8, 0x1, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x68, 0x0, 0x4, 0x29, 0x0, @private=0xa010102, @broadcast, {[@generic={0x0, 0x2}]}}}}}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wlan1\x00'}) sendmsg$NL80211_CMD_REGISTER_BEACONS(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40150}, 0x40001) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f00000007c0)={'ip6_vti0\x00', &(0x7f0000000740)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x2, 0x1, 0x22, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @local}}) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect$bt_sco(r1, &(0x7f00000002c0)={0x1f, @none}, 0x8) 03:08:11 executing program 1: creat(0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="362e0f381d00bad00466ed0f01d166b93a0600000f322e0f01cb26f30f1efbba400066ed66d8915d18660f3880404366b9800000c00f326635001000000f30", 0xfffffffffffffe07}], 0x1, 0x3296393731608a96, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 257.345233][ T172] usb 7-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 03:08:11 executing program 1: creat(0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 257.535352][ T172] usb 7-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 257.550986][ T172] usb 7-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 257.564470][ T172] usb 7-1: Product: syz [ 257.572098][ T172] usb 7-1: Manufacturer: syz [ 257.580204][ T172] usb 7-1: SerialNumber: syz 03:08:12 executing program 1: creat(0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 257.829065][ T172] usb 7-1: USB disconnect, device number 6 03:08:12 executing program 2: setresuid(0x0, 0xee00, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000240)='ns/mnt\x00') 03:08:12 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(r0, r1, 0x0, 0x8400fffffff7) 03:08:12 executing program 1: creat(0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:08:12 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="362e0f381d00bad00466ed0f01d166b93a0600000f322e0f01cb26f30f1efbba400066ed66d8915d18660f3880404366b9800000c00f326635001000000f30", 0xfffffffffffffe07}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x20, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 258.381684][ T7000] loop3: detected capacity change from 0 to 264192 03:08:12 executing program 2: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) io_setup(0x96, &(0x7f0000000240)) socket$inet6_tcp(0xa, 0x1, 0x0) [ 258.451085][ T38] audit: type=1804 audit(1645240092.859:292): pid=7000 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir357052190/syzkaller.J6xd9H/366/bus" dev="sda1" ino=1164 res=1 errno=0 03:08:13 executing program 1: creat(0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="362e0f381d00bad00466ed0f01d166b93a0600000f322e0f01cb26f30f1efbba400066ed66d8915d18660f3880404366b9800000c00f326635001000000f30", 0xfffffffffffffe07}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:08:13 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x105, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x4200}, 0x10) shutdown(r0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 258.684777][ T38] audit: type=1400 audit(1645240093.089:293): avc: denied { shutdown } for pid=7009 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 03:08:13 executing program 2: msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000000)) 03:08:13 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000400)={0x1c, 0x1c, 0x3}, 0x31) 03:08:13 executing program 3: chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(r0, r1, 0x0, 0x8400fffffff7) 03:08:13 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000040)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0xf, &(0x7f0000000100), 0xc) 03:08:13 executing program 1: creat(0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="362e0f381d00bad00466ed0f01d166b93a0600000f322e0f01cb26f30f1efbba400066ed66d8915d18660f3880404366b9800000c00f326635001000000f30", 0xfffffffffffffe07}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:08:13 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="362e0f381d00bad00466ed0f01d166b93a0600000f322e0f01cb26f30f1efbba400066ed66d8915d18660f3880404366b9800000c00f326635001000000f30", 0xfffffffffffffe07}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x20, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:08:13 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000540)=[{0xffffffffffffffff}], 0x1}, 0x0) 03:08:13 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x105, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x4200}, 0x10) sendto(r0, &(0x7f0000001280)="494988006d8e3e4e11c4d352396d9c1fdf2ea692344ba6c72498da18ba45a64cf04117dfab02e2b74d2514f85dedb91b589e2df897f71beeb69f006e540c8a38b5e4d64dc673c356b157928c3a75c0391ad7d47f0173a795ce984afa691d87956318fef7834a84b6e63b21b920a5930e6fde782e0361bf81d4f7d03423fcc1f75c45632c7c2bfdc75b7e12db5fbf6ce276f00aeb79d6b22430eca402f414bfb73f9b8abaa2cc198ad875b6a30f8ca091ab4c2612007bb486778e650819acf51679956244fb2a42d15c26bddfa43018f4bd20174dca99b6c0b12965c3e564167c127eb9223397dd013e7327a645ef442dab5a5016e6d8474c99d70678bfdbea7f8f1ded325c53d30e8ff6cc7f64b05e96826ebe5c63233347c423334fcca1624467efc31e84b99899c717e918cd4563d1f918b44baf02896ccc3df73c3b6547f990f591547d3cb28d9c1f93a86a8a7eb14cdca27fb99b55a8370696b9d31b706487e75082214b2521ddd0e58d1eca378a90b79dbb7a4dfa4be3af0dceec2f244624e251e559cd78fe97bf6842bce27dde34c4ac25addca2cfb8a52e390eec2f71eb860bf02f49df3645f34796435a8e966967f07a5705e972e6b6f54e1dff15b89924b5ffa01c96726e833140ccc3deb571ac4f661d43b93347f5fc342bf2c5cf7483be2e8a1f81d23493ec6fe230190defed800023516c9081e5262252131413617a52dd2d7baefb39072079546c4655eddeda1f5764cdf0a29babd852198bf266c2fb4357f2368e194d98de5a9cda073f96f2d1bc05ec1c29031c29402121368bc0b9dc0a6e84978c28a6067c31c6654eca2b7d6f347f8a28b047aba2257cc7fad4dc0f0df7e9666c0b58d026703a50922e7985cec81249b9b7e9a0d3c41727cba89749bd5d044870f7a76abca64b7de552dbe8dd75bb2e9e982ebd4f471b32c20a127399703353264a3169afcf264a48c0050d63d6deadcf8feeb0b4cbeff1af685e74c5dbbccfae087015f3b00d85971153b9615f9d6a6a3eb7553c8ebb3afad5d8cb921a0a15b159d05bf498d53cbf7f6f38043d43b2bfd995e184a2e759a87aa823cd3cdb4405388836aff2a4c060878d5358e101258a9f0f39264982c0ea4f22d64a99352917607b50096b0d49127e10c6dd0db2e7b77e107e427019ec86f8b8266899062a8f51aa6219844fcd91dbd79fb452ba1e6e93a066e266b156823cfd87d042430f80f42fac5c01bbfe36b9313f33413fae8a9f5b247189b4a240554cfe3f6762da60a2cfb6e53696114080f3464c46c9d1866734e3cf039fdc7376a758249002574e31409947cdf8670e6589cb0eee196a59bd0405841f33ae319942275888f7bb7eb41d0c7aec5580a94c23d9c1c027a07fbbd65c4518f73268e8f7ad86d95d342ad3817337b96cefffa7fa85a834eac3bae093df482309c0c2cb709e82e37488a50670d93b123850c099f4ff28b7afc2fbfa86a535c4ab3ee415872d6fef5470a8bcdfdbfd04fef36c39b63f1a03cc7c1f1394a642cf3b82cdd1ac9be55ee0e77aa4eef3ae5c7e09da06f9db77d429880fb674fc752e97b047e4b9041b624ef4258e0cf4d229bb9e345d5c54eb9e33e6ab2ccd82c5e8f422c132fc88316ad058fb237eb5c14b91f438322609032b838cdd7dcc0fd8076d21d2fa5cfeb4d1de55f92c6eb0149669eea69ef3168da41a2b0896dde3bec394f33bea7497c3f8558676b28d2a75bf70c5dcab1f11f06bd2b1736754f0d1921421284096e036c5099797272593029096dd8443d0d4224208fccc5890d0ba53ec2ff9111b93f6db88100eec4942ae6e6d5281c7d8d4746191431894b624a42b04e8b91f0dbadbe5875dca6b107a56434a425038cee88c0d5abeae5f111b69b83ff9c84505495a25197ed6f06e883f180bfb023c0ab1d92910a0c01085729596b526838229c71853192fc097ec23ef1aeef838d53712e61d88d99335c8323e55eaa6ee5634a6ee20c84a46267cd6edd33107a1d2f8da96e45287d70ba1c026da3817edf1588fa30a5612dd", 0x5a9, 0x0, 0x0, 0x0) 03:08:13 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x105, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x4200}, 0x10) sendto(r0, &(0x7f0000001280)="494988006d8e3e4e11c4d352396d9c1fdf2ea692344ba6c72498da18ba45a64cf04117dfab02e2b74d2514f85dedb91b589e2df897f71beeb69f006e540c8a38b5e4d64dc673c356b157928c3a75c0391ad7d47f0173a795ce984afa691d87956318fef7834a84b6e63b21b920a5930e6fde782e0361bf81d4f7d03423fcc1f75c45632c7c2bfdc75b7e12db5fbf6ce276f00aeb79d6b22430eca402f414bfb73f9b8abaa2cc198ad875b6a30f8ca091ab4c2612007bb486778e650819acf51679956244fb2a42d15c26bddfa43018f4bd20174dca99b6c0b12965c3e564167c127eb9223397dd013e7327a645ef442dab5a5016e6d8474c99d70678bfdbea7f8f1ded325c53d30e8ff6cc7f64b05e96826ebe5c63233347c423334fcca1624467efc31e84b99899c717e918cd4563d1f918b44baf02896ccc3df73c3b6547f990f591547d3cb28d9c1f93a86a8a7eb14cdca27fb99b55a8370696b9d31b706487e75082214b2521ddd0e58d1eca378a90b79dbb7a4dfa4be3af0dceec2f244624e251e559cd78fe97bf6842bce27dde34c4ac25addca2cfb8a52e390eec2f71eb860bf02f49df3645f34796435a8e966967f07a5705e972e6b6f54e1dff15b89924b5ffa01c96726e833140ccc3deb571ac4f661d43b93347f5fc342bf2c5cf7483be2e8a1f81d23493ec6fe230190defed800023516c9081e5262252131413617a52dd2d7baefb39072079546c4655eddeda1f5764cdf0a29babd852198bf266c2fb4357f2368e194d98de5a9cda073f96f2d1bc05ec1c29031c29402121368bc0b9dc0a6e84978c28a6067c31c6654eca2b7d6f347f8a28b047aba2257cc7fad4dc0f0df7e9666c0b58d026703a50922e7985cec81249b9b7e9a0d3c41727cba89749bd5d044870f7a76abca64b7de552dbe8dd75bb2e9e982ebd4f471b32c20a127399703353264a3169afcf264a48c0050d63d6deadcf8feeb0b4cbeff1af685e74c5dbbccfae087015f3b00d85971153b9615f9d6a6a3eb7553c8ebb3afad5d8cb921a0a15b159d05bf498d53cbf7f6f38043d43b2bfd995e184a2e759a87aa823cd3cdb4405388836aff2a4c060878d5358e101258a9f0f39264982c0ea4f22d64a99352917607b50096b0d49127e10c6dd0db2e7b77e107e427019ec86f8b8266899062a8f51aa6219844fcd91dbd79fb452ba1e6e93a066e266b156823cfd87d042430f80f42fac5c01bbfe36b9313f33413fae8a9f5b247189b4a240554cfe3f6762da60a2cfb6e53696114080f3464c46c9d1866734e3cf039fdc7376a758249002574e31409947cdf8670e6589cb0eee196a59bd0405841f33ae319942275888f7bb7eb41d0c7aec5580a94c23d9c1c027a07fbbd65c4518f73268e8f7ad86d95d342ad3817337b96cefffa7fa85a834eac3bae093df482309c0c2cb709e82e37488a50670d93b123850c099f4ff28b7afc2fbfa86a535c4ab3ee415872d6fef5470a8bcdfdbfd04fef36c39b63f1a03cc7c1f1394a642cf3b82cdd1ac9be55ee0e77aa4eef3ae5c7e09da06f9db77d429880fb674fc752e97b047e4b9041b624ef4258e0cf4d229bb9e345d5c54eb9e33e6ab2ccd82c5e8f422c132fc88316ad058fb237eb5c14b91f438322609032b838cdd7dcc0fd8076d21d2fa5cfeb4d1de55f92c6eb0149669eea69ef3168da41a2b0896dde3bec394f33bea7497c3f8558676b28d2a75bf70c5dcab1f11f06bd2b1736754f0d1921421284096e036c5099797272593029096dd8443d0d4224208fccc5890d0ba53ec2ff9111b93f6db88100eec4942ae6e6d5281c7d8d4746191431894b624a42b04e8b91f0dbadbe5875dca6b107a56434a425038cee88c0d5abeae5f111b69b83ff9c84505495a25197ed6f06e883f180bfb023c0ab1d92910a0c01085729596b526838229c71853192fc097ec23ef1aeef838d53712e61d88d99335c8323e55eaa6ee5634a6ee20c84a46267cd6edd33107a1d2f8da96e45287d70ba1c026da3817edf1588fa30a5612dd", 0x5a9, 0x0, 0x0, 0x0) 03:08:13 executing program 1: creat(0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="362e0f381d00bad00466ed0f01d166b93a0600000f322e0f01cb26f30f1efbba400066ed66d8915d18660f3880404366b9800000c00f326635001000000f30", 0xfffffffffffffe07}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 259.507319][ T38] audit: type=1804 audit(1645240093.919:294): pid=7030 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir357052190/syzkaller.J6xd9H/367/bus" dev="sda1" ino=1158 res=1 errno=0 03:08:14 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x105, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x4200}, 0x10) sendto(r0, &(0x7f0000001280)="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", 0x5a9, 0x0, 0x0, 0x0) 03:08:14 executing program 3: chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(r0, r1, 0x0, 0x8400fffffff7) 03:08:14 executing program 1: creat(0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="362e0f381d00bad00466ed0f01d166b93a0600000f322e0f01cb26f30f1efbba400066ed66d8915d18660f3880404366b9800000c00f326635001000000f30", 0xfffffffffffffe07}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 03:08:14 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="362e0f381d00bad00466ed0f01d166b93a0600000f322e0f01cb26f30f1efbba400066ed66d8915d18660f3880404366b9800000c00f326635001000000f30", 0xfffffffffffffe07}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x20, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:08:14 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x105, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x4200}, 0x10) sendto(r0, &(0x7f0000001280)="494988006d8e3e4e11c4d352396d9c1fdf2ea692344ba6c72498da18ba45a64cf04117dfab02e2b74d2514f85dedb91b589e2df897f71beeb69f006e540c8a38b5e4d64dc673c356b157928c3a75c0391ad7d47f0173a795ce984afa691d87956318fef7834a84b6e63b21b920a5930e6fde782e0361bf81d4f7d03423fcc1f75c45632c7c2bfdc75b7e12db5fbf6ce276f00aeb79d6b22430eca402f414bfb73f9b8abaa2cc198ad875b6a30f8ca091ab4c2612007bb486778e650819acf51679956244fb2a42d15c26bddfa43018f4bd20174dca99b6c0b12965c3e564167c127eb9223397dd013e7327a645ef442dab5a5016e6d8474c99d70678bfdbea7f8f1ded325c53d30e8ff6cc7f64b05e96826ebe5c63233347c423334fcca1624467efc31e84b99899c717e918cd4563d1f918b44baf02896ccc3df73c3b6547f990f591547d3cb28d9c1f93a86a8a7eb14cdca27fb99b55a8370696b9d31b706487e75082214b2521ddd0e58d1eca378a90b79dbb7a4dfa4be3af0dceec2f244624e251e559cd78fe97bf6842bce27dde34c4ac25addca2cfb8a52e390eec2f71eb860bf02f49df3645f34796435a8e966967f07a5705e972e6b6f54e1dff15b89924b5ffa01c96726e833140ccc3deb571ac4f661d43b93347f5fc342bf2c5cf7483be2e8a1f81d23493ec6fe230190defed800023516c9081e5262252131413617a52dd2d7baefb39072079546c4655eddeda1f5764cdf0a29babd852198bf266c2fb4357f2368e194d98de5a9cda073f96f2d1bc05ec1c29031c29402121368bc0b9dc0a6e84978c28a6067c31c6654eca2b7d6f347f8a28b047aba2257cc7fad4dc0f0df7e9666c0b58d026703a50922e7985cec81249b9b7e9a0d3c41727cba89749bd5d044870f7a76abca64b7de552dbe8dd75bb2e9e982ebd4f471b32c20a127399703353264a3169afcf264a48c0050d63d6deadcf8feeb0b4cbeff1af685e74c5dbbccfae087015f3b00d85971153b9615f9d6a6a3eb7553c8ebb3afad5d8cb921a0a15b159d05bf498d53cbf7f6f38043d43b2bfd995e184a2e759a87aa823cd3cdb4405388836aff2a4c060878d5358e101258a9f0f39264982c0ea4f22d64a99352917607b50096b0d49127e10c6dd0db2e7b77e107e427019ec86f8b8266899062a8f51aa6219844fcd91dbd79fb452ba1e6e93a066e266b156823cfd87d042430f80f42fac5c01bbfe36b9313f33413fae8a9f5b247189b4a240554cfe3f6762da60a2cfb6e53696114080f3464c46c9d1866734e3cf039fdc7376a758249002574e31409947cdf8670e6589cb0eee196a59bd0405841f33ae319942275888f7bb7eb41d0c7aec5580a94c23d9c1c027a07fbbd65c4518f73268e8f7ad86d95d342ad3817337b96cefffa7fa85a834eac3bae093df482309c0c2cb709e82e37488a50670d93b123850c099f4ff28b7afc2fbfa86a535c4ab3ee415872d6fef5470a8bcdfdbfd04fef36c39b63f1a03cc7c1f1394a642cf3b82cdd1ac9be55ee0e77aa4eef3ae5c7e09da06f9db77d429880fb674fc752e97b047e4b9041b624ef4258e0cf4d229bb9e345d5c54eb9e33e6ab2ccd82c5e8f422c132fc88316ad058fb237eb5c14b91f438322609032b838cdd7dcc0fd8076d21d2fa5cfeb4d1de55f92c6eb0149669eea69ef3168da41a2b0896dde3bec394f33bea7497c3f8558676b28d2a75bf70c5dcab1f11f06bd2b1736754f0d1921421284096e036c5099797272593029096dd8443d0d4224208fccc5890d0ba53ec2ff9111b93f6db88100eec4942ae6e6d5281c7d8d4746191431894b624a42b04e8b91f0dbadbe5875dca6b107a56434a425038cee88c0d5abeae5f111b69b83ff9c84505495a25197ed6f06e883f180bfb023c0ab1d92910a0c01085729596b526838229c71853192fc097ec23ef1aeef838d53712e61d88d99335c8323e55eaa6ee5634a6ee20c84a46267cd6edd33107a1d2f8da96e45287d70ba1c026da3817edf1588fa30a5612dd", 0x5a9, 0x0, 0x0, 0x0) 03:08:14 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000080), 0x98) 03:08:15 executing program 2: syz_emit_ethernet(0x46, &(0x7f0000000040)={@random="d17c074bf296", @remote, @val, {@ipv6}}, 0x0) [ 260.616006][ T38] audit: type=1804 audit(1645240095.029:295): pid=7050 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir357052190/syzkaller.J6xd9H/368/bus" dev="sda1" ino=1155 res=1 errno=0 03:08:15 executing program 1: creat(0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="362e0f381d00bad00466ed0f01d166b93a0600000f322e0f01cb26f30f1efbba400066ed66d8915d18660f3880404366b9800000c00f326635001000000f30", 0xfffffffffffffe07}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 03:08:15 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r0, r1) connect$inet6(r2, &(0x7f0000000600)={0x1c, 0x1c, 0x1}, 0x1c) 03:08:15 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0xa, &(0x7f0000000100)={0x0, @in, 0x0, 0x0, 0x208}, 0x98) sendto(r1, &(0x7f0000000040)='K', 0x1, 0x0, &(0x7f00000000c0)=@in6={0x1c, 0x1c, 0x1}, 0x1c) [ 261.316817][ T1351] ieee802154 phy0 wpan0: encryption failed: -22 [ 261.324821][ T1351] ieee802154 phy1 wpan1: encryption failed: -22 03:08:15 executing program 3: chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(r0, r1, 0x0, 0x8400fffffff7) 03:08:15 executing program 1: creat(0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="362e0f381d00bad00466ed0f01d166b93a0600000f322e0f01cb26f30f1efbba400066ed66d8915d18660f3880404366b9800000c00f326635001000000f30", 0xfffffffffffffe07}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 03:08:15 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="362e0f381d00bad00466ed0f01d166b93a0600000f322e0f01cb26f30f1efbba400066ed66d8915d18660f3880404366b9800000c00f326635001000000f30", 0xfffffffffffffe07}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x20, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:08:15 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x105, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x4200}, 0x10) sendto$inet(r0, 0x0, 0x33, 0x0, 0x0, 0xfffffffffffffe2c) 03:08:15 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000040)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000080)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x2}, 0x1c, &(0x7f0000000280)=[{&(0x7f00000000c0)='7', 0x1}], 0x1, &(0x7f00000002c0)=[@sndinfo={0x1c}], 0x1c}, 0x0) 03:08:15 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendmsg(r0, &(0x7f0000004780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x398}, 0x0) 03:08:16 executing program 1: creat(0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r0, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="362e0f381d00bad00466ed0f01d166b93a0600000f322e0f01cb26f30f1efbba400066ed66d8915d18660f3880404366b9800000c00f326635001000000f30", 0xfffffffffffffe07}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) 03:08:16 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = dup2(r1, r0) bind(r2, &(0x7f0000000000)=@in={0x0, 0x2}, 0x4d) [ 261.688080][ T38] audit: type=1804 audit(1645240096.099:296): pid=7079 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir357052190/syzkaller.J6xd9H/369/bus" dev="sda1" ino=1156 res=1 errno=0 03:08:16 executing program 3: syz_mount_image$msdos(0x0, &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(r0, r1, 0x0, 0x8400fffffff7) 03:08:16 executing program 1: creat(0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r0, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="362e0f381d00bad00466ed0f01d166b93a0600000f322e0f01cb26f30f1efbba400066ed66d8915d18660f3880404366b9800000c00f326635001000000f30", 0xfffffffffffffe07}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) 03:08:16 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) listen(r0, 0x0) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 03:08:16 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="362e0f381d00bad00466ed0f01d166b93a0600000f322e0f01cb26f30f1efbba400066ed66d8915d18660f3880404366b9800000c00f326635001000000f30", 0xfffffffffffffe07}], 0x1, 0x3296393731608a96, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:08:16 executing program 1: creat(0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r0, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="362e0f381d00bad00466ed0f01d166b93a0600000f322e0f01cb26f30f1efbba400066ed66d8915d18660f3880404366b9800000c00f326635001000000f30", 0xfffffffffffffe07}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) 03:08:17 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup(r0) sendmsg$inet_sctp(r1, &(0x7f0000000480)={&(0x7f0000000040)=@in6={0x1c, 0x1c, 0x2}, 0x1c, 0x0, 0x0, &(0x7f0000000400)=[@sndrcv={0x2c}], 0x2c}, 0x0) 03:08:17 executing program 1: creat(0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="362e0f381d00bad00466ed0f01d166b93a0600000f322e0f01cb26f30f1efbba400066ed66d8915d18660f3880404366b9800000c00f326635001000000f30", 0xfffffffffffffe07}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) 03:08:17 executing program 1: creat(0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="362e0f381d00bad00466ed0f01d166b93a0600000f322e0f01cb26f30f1efbba400066ed66d8915d18660f3880404366b9800000c00f326635001000000f30", 0xfffffffffffffe07}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) [ 262.761014][ T7105] loop3: detected capacity change from 0 to 264192 [ 262.776118][ T38] audit: type=1804 audit(1645240097.189:297): pid=7105 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir357052190/syzkaller.J6xd9H/370/file1/bus" dev="sda1" ino=1152 res=1 errno=0 03:08:18 executing program 3: syz_mount_image$msdos(0x0, &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(r0, r1, 0x0, 0x8400fffffff7) 03:08:18 executing program 1: creat(0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="362e0f381d00bad00466ed0f01d166b93a0600000f322e0f01cb26f30f1efbba400066ed66d8915d18660f3880404366b9800000c00f326635001000000f30", 0xfffffffffffffe07}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) 03:08:18 executing program 2: syz_emit_ethernet(0x15b, &(0x7f0000002d40)={@local, @empty, @val, {@ipv6}}, 0x0) 03:08:18 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="362e0f381d00bad00466ed0f01d166b93a0600000f322e0f01cb26f30f1efbba400066ed66d8915d18660f3880404366b9800000c00f326635001000000f30", 0xfffffffffffffe07}], 0x1, 0x3296393731608a96, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:08:18 executing program 2: open$dir(&(0x7f0000000000)='./file0\x00', 0x40220, 0x0) truncate(&(0x7f0000000180)='./file0\x00', 0x0) 03:08:18 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="362e0f381d00bad00466ed0f01d166b93a0600000f322e0f01cb26f30f1efbba400066ed66d8915d18660f3880404366b9800000c00f326635001000000f30", 0xfffffffffffffe07}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:08:18 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000040)={0x6, 0x2}, 0xb) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x105, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x4200}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=""/184, 0xb8}, 0x0) 03:08:18 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000080)={0x0, @in, 0x0, 0x0, 0x99}, 0x98) [ 264.109165][ T7124] loop3: detected capacity change from 0 to 264192 [ 264.128534][ T38] audit: type=1804 audit(1645240098.539:298): pid=7124 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir357052190/syzkaller.J6xd9H/371/file1/bus" dev="sda1" ino=1152 res=1 errno=0 03:08:19 executing program 3: syz_mount_image$msdos(0x0, &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(r0, r1, 0x0, 0x8400fffffff7) 03:08:19 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x125e, 0x20000000) 03:08:19 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="362e0f381d00bad00466ed0f01d166b93a0600000f322e0f01cb26f30f1efbba400066ed66d8915d18660f3880404366b9800000c00f326635001000000f30", 0xfffffffffffffe07}], 0x1, 0x3296393731608a96, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:08:19 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="362e0f381d00bad00466ed0f01d166b93a0600000f322e0f01cb26f30f1efbba400066ed66d8915d18660f3880404366b9800000c00f326635001000000f30", 0xfffffffffffffe07}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:08:19 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="362e0f381d00bad00466ed0f01d166b93a0600000f322e0f01cb26f30f1efbba400066ed66d8915d18660f3880404366b9800000c00f326635001000000f30", 0xfffffffffffffe07}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:08:19 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x1263, 0x0) 03:08:19 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind(r0, &(0x7f0000000480)=@nl=@proc, 0x80) 03:08:19 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="362e0f381d00bad00466ed0f01d166b93a0600000f322e0f01cb26f30f1efbba400066ed66d8915d18660f3880404366b9800000c00f326635001000000f30", 0xfffffffffffffe07}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 265.201201][ T7142] loop3: detected capacity change from 0 to 264192 [ 265.221115][ T38] audit: type=1804 audit(1645240099.629:299): pid=7142 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir357052190/syzkaller.J6xd9H/372/file1/bus" dev="sda1" ino=1152 res=1 errno=0 03:08:20 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), 0x0, 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(r0, r1, 0x0, 0x8400fffffff7) 03:08:20 executing program 2: openat$vcs(0xffffffffffffff9c, 0x0, 0x410000, 0x0) 03:08:20 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="362e0f381d00bad00466ed0f01d166b93a0600000f322e0f01cb26f30f1efbba400066ed66d8915d18660f3880404366b9800000c00f326635001000000f30", 0xfffffffffffffe07}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) 03:08:20 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x20, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:08:20 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="362e0f381d00bad00466ed0f01d166b93a0600000f322e0f01cb26f30f1efbba400066ed66d8915d18660f3880404366b9800000c00f326635001000000f30", 0xfffffffffffffe07}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) 03:08:20 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_GET_BYNAME(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0xe, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:08:20 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="362e0f381d00bad00466ed0f01d166b93a0600000f322e0f01cb26f30f1efbba400066ed66d8915d18660f3880404366b9800000c00f326635001000000f30", 0xfffffffffffffe07}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) 03:08:20 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000100), r0) sendmsg$NET_DM_CMD_STOP(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r2, 0x1, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) [ 266.467082][ T7159] loop3: detected capacity change from 0 to 264192 [ 266.493973][ T38] audit: type=1804 audit(1645240100.899:300): pid=7159 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir357052190/syzkaller.J6xd9H/373/bus" dev="sda1" ino=1151 res=1 errno=0 03:08:21 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), 0x0, 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(r0, r1, 0x0, 0x8400fffffff7) 03:08:21 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000100), r0) sendmsg$NET_DM_CMD_STOP(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r2, 0x1, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) 03:08:21 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="362e0f381d00bad00466ed0f01d166b93a0600000f322e0f01cb26f30f1efbba400066ed66d8915d18660f3880404366b9800000c00f326635001000000f30", 0xfffffffffffffe07}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:08:21 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x20, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:08:21 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x14, 0x1, 0x1, 0x101, 0x0, 0x0, {0xc}}, 0x14}}, 0x0) 03:08:21 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="362e0f381d00bad00466ed0f01d166b93a0600000f322e0f01cb26f30f1efbba400066ed66d8915d18660f3880404366b9800000c00f326635001000000f30", 0xfffffffffffffe07}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 267.466312][ T7171] loop3: detected capacity change from 0 to 264192 03:08:21 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x20, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:08:21 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x14, 0x1, 0x1, 0x101, 0x0, 0x0, {0xc}}, 0x14}}, 0x0) [ 267.579936][ T38] audit: type=1804 audit(1645240101.989:301): pid=7176 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir357052190/syzkaller.J6xd9H/374/bus" dev="sda1" ino=1147 res=1 errno=0 [ 267.672049][ T6739] I/O error, dev loop3, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 03:08:22 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), 0x0, 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(r0, r1, 0x0, 0x8400fffffff7) 03:08:22 executing program 2: ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000140), 0xffffffffffffffff) 03:08:22 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="362e0f381d00bad00466ed0f01d166b93a0600000f322e0f01cb26f30f1efbba400066ed66d8915d18660f3880404366b9800000c00f326635001000000f30", 0xfffffffffffffe07}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:08:22 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="362e0f381d00bad00466ed0f01d166b93a0600000f322e0f01cb26f30f1efbba400066ed66d8915d18660f3880404366b9800000c00f326635001000000f30", 0xfffffffffffffe07}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x20, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:08:22 executing program 2: syz_io_uring_setup(0x5a46, &(0x7f0000000400), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000480), 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) syz_io_uring_setup(0x5c9d, &(0x7f0000000500)={0x0, 0xe100, 0x8, 0x1}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff8000/0x8000)=nil, &(0x7f0000000580), &(0x7f00000005c0)) 03:08:22 executing program 2: syz_emit_ethernet(0x32, &(0x7f0000000000)={@link_local, @remote, @void, {@ipv4={0x800, @dccp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x21, 0x0, @private}, {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "2ff787", 0x0, 's\x00~'}}}}}}, 0x0) 03:08:22 executing program 2: sendmsg$NLBL_MGMT_C_VERSION(0xffffffffffffffff, 0x0, 0x0) [ 268.509638][ T7195] loop3: detected capacity change from 0 to 264192 03:08:22 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="362e0f381d00bad00466ed0f01d166b93a0600000f322e0f01cb26f30f1efbba400066ed66d8915d18660f3880404366b9800000c00f326635001000000f30", 0xfffffffffffffe07}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 268.562945][ T38] audit: type=1804 audit(1645240102.969:302): pid=7195 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir357052190/syzkaller.J6xd9H/375/bus" dev="sda1" ino=1159 res=1 errno=0 03:08:23 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(r0, r1, 0x0, 0x8400fffffff7) 03:08:23 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) fadvise64(r0, 0x4, 0x0, 0x4) 03:08:23 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="362e0f381d00bad00466ed0f01d166b93a0600000f322e0f01cb26f30f1efbba400066ed66d8915d18660f3880404366b9800000c00f326635001000000f30", 0xfffffffffffffe07}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x20, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:08:23 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="362e0f381d00bad00466ed0f01d166b93a0600000f322e0f01cb26f30f1efbba400066ed66d8915d18660f3880404366b9800000c00f326635001000000f30", 0xfffffffffffffe07}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:08:23 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0xc, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:08:23 executing program 2: prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000280)) 03:08:23 executing program 2: msgrcv(0x0, 0x0, 0x0, 0x0, 0x795878087d84ef60) 03:08:23 executing program 2: socketpair(0x25, 0x0, 0x0, &(0x7f0000000200)) [ 269.540443][ T38] audit: type=1400 audit(1645240103.949:303): avc: denied { create } for pid=7215 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 269.558324][ T7218] FAT-fs (loop3): bogus number of reserved sectors [ 269.587121][ T7218] FAT-fs (loop3): Can't find a valid FAT filesystem [ 269.615357][ T38] audit: type=1804 audit(1645240104.019:304): pid=7218 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir357052190/syzkaller.J6xd9H/376/file1/bus" dev="sda1" ino=1151 res=1 errno=0 03:08:24 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(r0, r1, 0x0, 0x8400fffffff7) 03:08:24 executing program 2: syz_clone(0x7810e400, 0x0, 0x0, 0x0, 0x0, 0x0) 03:08:24 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="362e0f381d00bad00466ed0f01d166b93a0600000f322e0f01cb26f30f1efbba400066ed66d8915d18660f3880404366b9800000c00f326635001000000f30", 0xfffffffffffffe07}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:08:24 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="362e0f381d00bad00466ed0f01d166b93a0600000f322e0f01cb26f30f1efbba400066ed66d8915d18660f3880404366b9800000c00f326635001000000f30", 0xfffffffffffffe07}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x20, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:08:25 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="362e0f381d00bad00466ed0f01d166b93a0600000f322e0f01cb26f30f1efbba400066ed66d8915d18660f3880404366b9800000c00f326635001000000f30", 0xfffffffffffffe07}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x20, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) [ 270.644874][ T7229] FAT-fs (loop3): bogus number of reserved sectors [ 270.653335][ T7229] FAT-fs (loop3): Can't find a valid FAT filesystem 03:08:25 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="362e0f381d00bad00466ed0f01d166b93a0600000f322e0f01cb26f30f1efbba400066ed66d8915d18660f3880404366b9800000c00f326635001000000f30", 0xfffffffffffffe07}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 270.668756][ T38] audit: type=1804 audit(1645240105.079:305): pid=7229 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir357052190/syzkaller.J6xd9H/377/file1/bus" dev="sda1" ino=1164 res=1 errno=0 03:08:25 executing program 2: socketpair(0xa, 0x2, 0x91, &(0x7f0000000040)) 03:08:25 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="362e0f381d00bad00466ed0f01d166b93a0600000f322e0f01cb26f30f1efbba400066ed66d8915d18660f3880404366b9800000c00f326635001000000f30", 0xfffffffffffffe07}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x20, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 03:08:25 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(r0, r1, 0x0, 0x8400fffffff7) 03:08:25 executing program 2: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)) 03:08:25 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="362e0f381d00bad00466ed0f01d166b93a0600000f322e0f01cb26f30f1efbba400066ed66d8915d18660f3880404366b9800000c00f326635001000000f30", 0xfffffffffffffe07}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:08:25 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="362e0f381d00bad00466ed0f01d166b93a0600000f322e0f01cb26f30f1efbba400066ed66d8915d18660f3880404366b9800000c00f326635001000000f30", 0xfffffffffffffe07}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x20, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 03:08:25 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func]}}, &(0x7f0000000440)=""/130, 0x26, 0x82, 0x1}, 0x20) 03:08:26 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x4, 0x20000480, 0xffffffff, 0x1d8, 0x1d8, 0xc8, 0xffffffff, 0xffffffff, 0x270, 0x270, 0x270, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @REJECT={0x28}}, {{@ip={@broadcast, @broadcast, 0x0, 0x0, 'ip6gretap0\x00', 'syzkaller0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @REJECT={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) 03:08:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x4, 0x398, 0xffffffff, 0xb8, 0x0, 0xb8, 0xffffffff, 0xffffffff, 0x400, 0x400, 0x400, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @REJECT={0x28}}, {{@ip={@broadcast, @multicast2, 0x0, 0x0, 'ip6gretap0\x00', 'syzkaller0\x00'}, 0x0, 0x70, 0x198}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:var_lib_t:s0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3f8) [ 271.665685][ T7259] FAT-fs (loop3): bogus number of reserved sectors [ 271.674231][ T7259] FAT-fs (loop3): Can't find a valid FAT filesystem 03:08:26 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'ipvlan0\x00', &(0x7f0000000040)=@ethtool_link_settings={0x4c}}) [ 271.771732][ T38] audit: type=1804 audit(1645240106.189:306): pid=7259 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir357052190/syzkaller.J6xd9H/378/file1/bus" dev="sda1" ino=1151 res=1 errno=0 03:08:26 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="362e0f381d00bad00466ed0f01d166b93a0600000f322e0f01cb26f30f1efbba400066ed66d8915d18660f3880404366b9800000c00f326635001000000f30", 0xfffffffffffffe07}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:08:26 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) connect(r0, &(0x7f0000000000)=@nl=@proc, 0xb) 03:08:26 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(r0, r1, 0x0, 0x8400fffffff7) 03:08:26 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r0, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="362e0f381d00bad00466ed0f01d166b93a0600000f322e0f01cb26f30f1efbba400066ed66d8915d18660f3880404366b9800000c00f326635001000000f30", 0xfffffffffffffe07}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x20, 0x0, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) 03:08:26 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r0, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="362e0f381d00bad00466ed0f01d166b93a0600000f322e0f01cb26f30f1efbba400066ed66d8915d18660f3880404366b9800000c00f326635001000000f30", 0xfffffffffffffe07}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x20, 0x0, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) [ 272.526130][ T38] audit: type=1400 audit(1645240106.939:307): avc: denied { connect } for pid=7267 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 03:08:27 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x89f7, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'syztnl2\x00', 0x0, 0x29, 0xff, 0x0, 0x0, 0x43, @loopback, @loopback, 0x80, 0x10, 0x7ff, 0x400}}) r1 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_buf(r1, 0x1, 0xc, 0x0, &(0x7f0000000100)) getpeername(r0, 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(r1, 0x8983, &(0x7f00000000c0)={0x1, 'vlan0\x00', {}, 0xf9d1}) 03:08:27 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r0, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="362e0f381d00bad00466ed0f01d166b93a0600000f322e0f01cb26f30f1efbba400066ed66d8915d18660f3880404366b9800000c00f326635001000000f30", 0xfffffffffffffe07}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x20, 0x0, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) [ 272.656904][ T38] audit: type=1400 audit(1645240107.069:308): avc: denied { getopt } for pid=7275 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 03:08:27 executing program 0: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="362e0f381d00bad00466ed0f01d166b93a0600000f322e0f01cb26f30f1efbba400066ed66d8915d18660f3880404366b9800000c00f326635001000000f30", 0xfffffffffffffe07}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x20, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) 03:08:27 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="362e0f381d00bad00466ed0f01d166b93a0600000f322e0f01cb26f30f1efbba400066ed66d8915d18660f3880404366b9800000c00f326635001000000f30", 0xfffffffffffffe07}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 272.740007][ T38] audit: type=1804 audit(1645240107.149:309): pid=7282 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir357052190/syzkaller.J6xd9H/379/file1/bus" dev="sda1" ino=1157 res=1 errno=0 03:08:27 executing program 0: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="362e0f381d00bad00466ed0f01d166b93a0600000f322e0f01cb26f30f1efbba400066ed66d8915d18660f3880404366b9800000c00f326635001000000f30", 0xfffffffffffffe07}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x20, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) 03:08:28 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(r0, r1, 0x0, 0x8400fffffff7) 03:08:28 executing program 0: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="362e0f381d00bad00466ed0f01d166b93a0600000f322e0f01cb26f30f1efbba400066ed66d8915d18660f3880404366b9800000c00f326635001000000f30", 0xfffffffffffffe07}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x20, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) 03:08:28 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x89f7, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'syztnl2\x00', 0x0, 0x29, 0xff, 0x0, 0x0, 0x43, @loopback, @loopback, 0x80, 0x10, 0x7ff, 0x400}}) r1 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_buf(r1, 0x1, 0xc, 0x0, &(0x7f0000000100)) getpeername(r0, 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(r1, 0x8983, &(0x7f00000000c0)={0x1, 'vlan0\x00', {}, 0xf9d1}) 03:08:28 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="362e0f381d00bad00466ed0f01d166b93a0600000f322e0f01cb26f30f1efbba400066ed66d8915d18660f3880404366b9800000c00f326635001000000f30", 0xfffffffffffffe07}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:08:28 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="362e0f381d00bad00466ed0f01d166b93a0600000f322e0f01cb26f30f1efbba400066ed66d8915d18660f3880404366b9800000c00f326635001000000f30", 0xfffffffffffffe07}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x20, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:08:28 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x89f7, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'syztnl2\x00', 0x0, 0x29, 0xff, 0x0, 0x0, 0x43, @loopback, @loopback, 0x80, 0x10, 0x7ff, 0x400}}) r1 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_buf(r1, 0x1, 0xc, 0x0, &(0x7f0000000100)) getpeername(r0, 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(r1, 0x8983, &(0x7f00000000c0)={0x1, 'vlan0\x00', {}, 0xf9d1}) 03:08:28 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="362e0f381d00bad00466ed0f01d166b93a0600000f322e0f01cb26f30f1efbba400066ed66d8915d18660f3880404366b9800000c00f326635001000000f30", 0xfffffffffffffe07}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x20, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:08:28 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x89f7, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'syztnl2\x00', 0x0, 0x29, 0xff, 0x0, 0x0, 0x43, @loopback, @loopback, 0x80, 0x10, 0x7ff, 0x400}}) r1 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_buf(r1, 0x1, 0xc, 0x0, &(0x7f0000000100)) getpeername(r0, 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(r1, 0x8983, &(0x7f00000000c0)={0x1, 'vlan0\x00', {}, 0xf9d1}) [ 273.776563][ T38] audit: type=1804 audit(1645240108.189:310): pid=7305 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir357052190/syzkaller.J6xd9H/380/file1/bus" dev="sda1" ino=1157 res=1 errno=0 03:08:29 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(r0, r1, 0x0, 0x8400fffffff7) 03:08:29 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="362e0f381d00bad00466ed0f01d166b93a0600000f322e0f01cb26f30f1efbba400066ed66d8915d18660f3880404366b9800000c00f326635001000000f30", 0xfffffffffffffe07}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x20, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:08:29 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x1d8, 0x1d8, 0xc8, 0xffffffff, 0xffffffff, 0x270, 0x270, 0x270, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @REJECT={0x28}}, {{@ip={@broadcast, @broadcast, 0x0, 0x0, 'ip6gretap0\x00', 'syzkaller0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @REJECT={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) 03:08:29 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="362e0f381d00bad00466ed0f01d166b93a0600000f322e0f01cb26f30f1efbba400066ed66d8915d18660f3880404366b9800000c00f326635001000000f30", 0xfffffffffffffe07}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:08:29 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="362e0f381d00bad00466ed0f01d166b93a0600000f322e0f01cb26f30f1efbba400066ed66d8915d18660f3880404366b9800000c00f326635001000000f30", 0xfffffffffffffe07}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x20, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) 03:08:29 executing program 2: socket$inet(0x2, 0x803, 0xff) 03:08:29 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="362e0f381d00bad00466ed0f01d166b93a0600000f322e0f01cb26f30f1efbba400066ed66d8915d18660f3880404366b9800000c00f326635001000000f30", 0xfffffffffffffe07}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x20, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) 03:08:29 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r0, 0x0, 0x29, &(0x7f00000018c0)="8aabe08cb2da7ae063ce00e8b6102200", 0x10) [ 274.850034][ T38] audit: type=1804 audit(1645240109.259:311): pid=7323 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir357052190/syzkaller.J6xd9H/381/file1/bus" dev="sda1" ino=1156 res=1 errno=0 [ 274.896117][ T38] audit: type=1400 audit(1645240109.309:312): avc: denied { rename } for pid=3107 comm="syslogd" name="messages" dev="tmpfs" ino=3 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 274.946913][ T38] audit: type=1400 audit(1645240109.309:313): avc: denied { unlink } for pid=3107 comm="syslogd" name="messages.0" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 274.987010][ T38] audit: type=1400 audit(1645240109.309:314): avc: denied { create } for pid=3107 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 03:08:30 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x0, &(0x7f0000000080), 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(r0, r1, 0x0, 0x8400fffffff7) 03:08:30 executing program 2: recvfrom$inet(0xffffffffffffffff, &(0x7f0000000440)=""/157, 0x9d, 0x10040, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt(r0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000000)={'rose0\x00', {0x2, 0x0, @private}}) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(r1, 0x8983, &(0x7f0000000500)={0x1, 'vlan1\x00', {}, 0xfc2}) r2 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@generic, &(0x7f0000000180)=0x80, 0x800) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r2, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000200)={0x1c, 0x0, 0x200, 0x70bd28, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0xea}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8080}, 0x1c800) setsockopt(r1, 0x0, 0x0, 0x0, 0x0) getsockopt$IP_SET_OP_GET_BYINDEX(r1, 0x1, 0x53, &(0x7f0000000340), &(0x7f0000000380)=0x28) r3 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$sock(r3, &(0x7f0000000300)={&(0x7f0000000040)=@ethernet={0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000240)=[@timestamping={{0x14, 0x1, 0x25, 0x5}}, @txtime={{0x18, 0x1, 0x3d, 0x1}}, @txtime={{0x18, 0x1, 0x3d, 0x5}}, @timestamping={{0x14, 0x1, 0x25, 0x636}}, @timestamping={{0x14, 0x1, 0x25, 0x6}}, @mark={{0x14, 0x1, 0x24, 0x1}}], 0x90}, 0x894) setsockopt$inet_int(r3, 0x0, 0xe, &(0x7f00000000c0)=0x42, 0x4) 03:08:30 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="362e0f381d00bad00466ed0f01d166b93a0600000f322e0f01cb26f30f1efbba400066ed66d8915d18660f3880404366b9800000c00f326635001000000f30", 0xfffffffffffffe07}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x20, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) 03:08:30 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 275.702346][ T7323] syz-executor.3 (7323) used greatest stack depth: 22504 bytes left [ 275.746625][ T38] audit: type=1400 audit(1645240110.129:315): avc: denied { setopt } for pid=7324 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 275.796753][ T7326] device veth0_vlan left promiscuous mode 03:08:30 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="362e0f381d00bad00466ed0f01d166b93a0600000f322e0f01cb26f30f1efbba400066ed66d8915d18660f3880404366b9800000c00f326635001000000f30", 0xfffffffffffffe07}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x20, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 275.952187][ T7337] loop3: detected capacity change from 0 to 264192 03:08:30 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 275.970719][ T7337] FAT-fs (loop3): bogus number of reserved sectors [ 276.011581][ T7337] FAT-fs (loop3): Can't find a valid FAT filesystem [ 276.048287][ T38] audit: type=1804 audit(1645240110.459:316): pid=7337 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir357052190/syzkaller.J6xd9H/382/file1/bus" dev="sda1" ino=1164 res=1 errno=0 03:08:30 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x21, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x1d8, 0x1d8, 0xc8, 0xffffffff, 0xffffffff, 0x270, 0x270, 0x270, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @REJECT={0x28}}, {{@ip={@broadcast, @broadcast, 0x0, 0x0, 'ip6gretap0\x00', 'syzkaller0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @REJECT={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) 03:08:30 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="362e0f381d00bad00466ed0f01d166b93a0600000f322e0f01cb26f30f1efbba400066ed66d8915d18660f3880404366b9800000c00f326635001000000f30", 0xfffffffffffffe07}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x20, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:08:31 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x0, &(0x7f0000000080), 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(r0, r1, 0x0, 0x8400fffffff7) 03:08:31 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000100)={'filter\x00'}, &(0x7f0000000180)=0x54) 03:08:31 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:08:31 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="362e0f381d00bad00466ed0f01d166b93a0600000f322e0f01cb26f30f1efbba400066ed66d8915d18660f3880404366b9800000c00f326635001000000f30", 0xfffffffffffffe07}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x20, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:08:31 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000e80)={@local}, 0x14) 03:08:31 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000003700)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f00000035c0)='f', &(0x7f0000003640)="a2"}, 0x48) 03:08:31 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000014c0)={0x18, 0x3, &(0x7f0000000380)=@framed, &(0x7f00000003c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001440), 0x10}, 0x80) 03:08:31 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, 0x0}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 277.230792][ T7367] loop3: detected capacity change from 0 to 264192 [ 277.296149][ T7367] FAT-fs (loop3): bogus number of reserved sectors [ 277.309123][ T7367] FAT-fs (loop3): Can't find a valid FAT filesystem [ 277.330188][ T38] audit: type=1804 audit(1645240111.739:317): pid=7368 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir357052190/syzkaller.J6xd9H/383/file1/bus" dev="sda1" ino=1156 res=1 errno=0 [ 278.056589][ T7368] syz-executor.3 (7368) used greatest stack depth: 22368 bytes left 03:08:32 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x0, &(0x7f0000000080), 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(r0, r1, 0x0, 0x8400fffffff7) 03:08:32 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000001b40)=[{{&(0x7f0000000140)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c, &(0x7f0000001640)=[{&(0x7f0000000180)="cb", 0x1}, {&(0x7f0000000200)="bb", 0x1}, {&(0x7f0000000300)="1b", 0x1}], 0x3}}, {{0x0, 0x0, &(0x7f0000002b00)=[{&(0x7f0000001800)="95", 0x1}], 0x1, &(0x7f0000002f80)=ANY=[], 0x18}}], 0x2, 0x8000) 03:08:32 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="362e0f381d00bad00466ed0f01d166b93a0600000f322e0f01cb26f30f1efbba400066ed66d8915d18660f3880404366b9800000c00f326635001000000f30", 0xfffffffffffffe07}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x20, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:08:32 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:08:32 executing program 2: mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) munlock(&(0x7f0000ffd000/0x1000)=nil, 0x1000) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) 03:08:32 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_linger(r0, 0xffff, 0x80, 0x0, 0x0) 03:08:32 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@broadcast, @local, @val, {@ipv4}}, 0x0) [ 278.351426][ T7384] loop3: detected capacity change from 0 to 264192 [ 278.385974][ T7384] FAT-fs (loop3): bogus number of reserved sectors 03:08:32 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="362e0f381d00bad00466ed0f01d166b93a0600000f322e0f01cb26f30f1efbba400066ed66d8915d18660f3880404366b9800000c00f326635001000000f30", 0xfffffffffffffe07}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x20, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 278.433279][ T7384] FAT-fs (loop3): Can't find a valid FAT filesystem [ 278.493845][ T38] audit: type=1804 audit(1645240112.899:318): pid=7384 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir357052190/syzkaller.J6xd9H/384/file1/bus" dev="sda1" ino=1152 res=1 errno=0 03:08:33 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{0x0}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(r0, r1, 0x0, 0x8400fffffff7) 03:08:33 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x0) dup2(r0, r1) 03:08:33 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:08:33 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="362e0f381d00bad00466ed0f01d166b93a0600000f322e0f01cb26f30f1efbba400066ed66d8915d18660f3880404366b9800000c00f326635001000000f30", 0xfffffffffffffe07}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x20, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:08:33 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) poll(&(0x7f0000000180)=[{r0, 0x8345941dd89e75a5}], 0x1, 0x0) 03:08:33 executing program 2: r0 = socket(0xa, 0x3, 0x106) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x29, 0xb, 0x0, 0x0) 03:08:33 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000340)={&(0x7f0000000200)={0xa, 0x4e24, 0x0, @mcast1}, 0x1c, 0x0, 0x0, &(0x7f0000000580)=[@hopopts={{0x18}}], 0x18}, 0x0) [ 279.375664][ T7405] loop3: detected capacity change from 0 to 264192 [ 279.422597][ T7405] FAT-fs (loop3): bogus number of reserved sectors [ 279.447219][ T7405] FAT-fs (loop3): Can't find a valid FAT filesystem [ 279.467719][ T38] audit: type=1804 audit(1645240113.879:319): pid=7405 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir357052190/syzkaller.J6xd9H/385/file1/bus" dev="sda1" ino=1164 res=1 errno=0 03:08:33 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000340)={&(0x7f0000000200)={0xa, 0x4e24, 0x0, @mcast1}, 0x1c, 0x0, 0x0, &(0x7f0000000580)=[@hopopts={{0x18}}], 0x18}, 0x0) 03:08:34 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{0x0}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(r0, r1, 0x0, 0x8400fffffff7) 03:08:34 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="362e0f381d00bad00466ed0f01d166b93a0600000f322e0f01cb26f30f1efbba400066ed66d8915d18660f3880404366b9800000c00f326635001000000f30", 0xfffffffffffffe07}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x20, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:08:34 executing program 2: bpf$MAP_CREATE(0x1e, &(0x7f0000000800), 0x48) 03:08:34 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:08:34 executing program 2: r0 = socket(0xa, 0x3, 0x106) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x29, 0x7, 0x0, 0x7) 03:08:34 executing program 2: r0 = socket(0xa, 0x3, 0x106) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x29, 0x33, 0x0, 0x0) 03:08:34 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000340)={&(0x7f0000000200)={0xa, 0x4e24, 0x0, @mcast1}, 0x1c, 0x0, 0x0, &(0x7f0000000580)=[@hopopts={{0x18, 0x29, 0xb}}], 0x18}, 0x0) 03:08:34 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@ipv4_newroute={0x1c, 0x18, 0x1}, 0x1c}}, 0x0) [ 280.514290][ T7429] loop3: detected capacity change from 0 to 264192 [ 280.543570][ T7429] FAT-fs (loop3): bogus number of reserved sectors [ 280.561679][ T7429] FAT-fs (loop3): Can't find a valid FAT filesystem [ 280.594689][ T38] audit: type=1804 audit(1645240114.999:320): pid=7429 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir357052190/syzkaller.J6xd9H/386/file1/bus" dev="sda1" ino=1148 res=1 errno=0 03:08:35 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{0x0}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(r0, r1, 0x0, 0x8400fffffff7) 03:08:35 executing program 2: r0 = socket$inet(0x2, 0x5, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x20, 0x0, &(0x7f0000000040)) 03:08:35 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="362e0f381d00bad00466ed0f01d166b93a0600000f322e0f01cb26f30f1efbba400066ed66d8915d18660f3880404366b9800000c00f326635001000000f30", 0xfffffffffffffe07}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x20, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:08:35 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, 0x0}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:08:35 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x11, 0x4, 0x0, 0x4, 0x0, 0x1}, 0x48) 03:08:35 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x11, 0x3, &(0x7f0000000380)=@framed, &(0x7f0000000400)='syzkaller\x00', 0x0, 0x6f, &(0x7f0000000440)=""/111, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 281.523036][ T7441] loop3: detected capacity change from 0 to 264192 [ 281.549448][ T7441] FAT-fs (loop3): bogus number of reserved sectors 03:08:35 executing program 2: r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f00000007c0), &(0x7f0000000800)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000340), &(0x7f0000000300)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$KEYCTL_MOVE(0x1e, r2, r2, r1, 0x0) [ 281.557455][ T7441] FAT-fs (loop3): Can't find a valid FAT filesystem 03:08:35 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, 0x0}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 281.597951][ T38] audit: type=1804 audit(1645240116.009:321): pid=7441 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir357052190/syzkaller.J6xd9H/387/file1/bus" dev="sda1" ino=1160 res=1 errno=0 03:08:36 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(r0, r1, 0x0, 0x8400fffffff7) 03:08:36 executing program 2: creat(&(0x7f0000000100)='./file0\x00', 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat(r0, &(0x7f0000000240)='.\x00', 0x0, 0x0) 03:08:36 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="362e0f381d00bad00466ed0f01d166b93a0600000f322e0f01cb26f30f1efbba400066ed66d8915d18660f3880404366b9800000c00f326635001000000f30", 0xfffffffffffffe07}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x20, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:08:36 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, 0x0}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 282.371007][ T38] audit: type=1804 audit(1645240116.779:322): pid=7451 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/syzkaller-testdir1336744605/syzkaller.HbFjRK/433/file0" dev="sda1" ino=1158 res=1 errno=0 03:08:36 executing program 2: select(0x40, &(0x7f0000040880), &(0x7f00000408c0)={0xa}, 0x0, 0x0) 03:08:36 executing program 2: r0 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000001480)) io_setup(0x3ff, &(0x7f0000000040)=0x0) io_submit(r1, 0x1, &(0x7f00000003c0)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) [ 282.604540][ T7462] loop3: detected capacity change from 0 to 264192 [ 282.620350][ T7462] FAT-fs (loop3): bogus number of reserved sectors [ 282.630009][ T7462] FAT-fs (loop3): Can't find a valid FAT filesystem [ 282.647051][ T38] audit: type=1804 audit(1645240117.059:323): pid=7462 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir357052190/syzkaller.J6xd9H/388/file1/bus" dev="sda1" ino=1164 res=1 errno=0 03:08:37 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, 0x0}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:08:37 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="362e0f381d00bad00466ed0f01d166b93a0600000f322e0f01cb26f30f1efbba400066ed66d8915d18660f3880404366b9800000c00f326635001000000f30", 0xfffffffffffffe07}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x20, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:08:37 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(r0, r1, 0x0, 0x8400fffffff7) 03:08:37 executing program 2: syz_open_dev$evdev(&(0x7f0000000500), 0x100000000, 0x2) 03:08:37 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, 0x0}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:08:37 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="362e0f381d00bad00466ed0f01d166b93a0600000f322e0f01cb26f30f1efbba400066ed66d8915d18660f3880404366b9800000c00f326635001000000f30", 0xfffffffffffffe07}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x20, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:08:37 executing program 2: r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f00000007c0), &(0x7f0000000800)={'syz', 0x1}, 0x0, 0x0, r0) 03:08:37 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(&(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)={0x0, "a8781657e1892e7da982737d14a5694da9b499369bc9580d62eccb63e3ac111a638665d118a519838416fe47cfe656353ee12c32eae8eb8dc85b9b6f989cfb2f"}, 0x48, r0) keyctl$search(0xa, r1, &(0x7f0000000480)='syzkaller\x00', &(0x7f00000004c0)={'syz', 0x0}, 0x0) 03:08:38 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x46) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x1, 0x0, 0x44}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty}}, 0xe8) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 283.611510][ T38] audit: type=1400 audit(1645240118.019:324): avc: denied { connect } for pid=7482 comm="syz-executor.2" lport=70 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 283.628814][ T7485] loop3: detected capacity change from 0 to 264192 03:08:38 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="362e0f381d00bad00466ed0f01d166b93a0600000f322e0f01cb26f30f1efbba400066ed66d8915d18660f3880404366b9800000c00f326635001000000f30", 0xfffffffffffffe07}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x20, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 283.674104][ T7485] FAT-fs (loop3): bogus number of reserved sectors [ 283.686340][ T7485] FAT-fs (loop3): Can't find a valid FAT filesystem [ 283.707164][ T38] audit: type=1804 audit(1645240118.119:325): pid=7485 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir357052190/syzkaller.J6xd9H/389/file1/bus" dev="sda1" ino=1164 res=1 errno=0 03:08:38 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(r0, r1, 0x0, 0x8400fffffff7) 03:08:38 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, 0x0}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:08:38 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x20, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:08:38 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x46) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x1, 0x0, 0x44}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty}}, 0xe8) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 284.632647][ T7500] loop3: detected capacity change from 0 to 264192 [ 284.651917][ T7500] FAT-fs (loop3): bogus number of reserved sectors [ 284.665503][ T7500] FAT-fs (loop3): Can't find a valid FAT filesystem [ 284.680660][ T38] audit: type=1804 audit(1645240119.089:326): pid=7500 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir357052190/syzkaller.J6xd9H/390/file1/bus" dev="sda1" ino=1164 res=1 errno=0 03:08:39 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, 0x0}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 03:08:39 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x20, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:08:39 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x46) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x1, 0x0, 0x44}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty}}, 0xe8) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) 03:08:39 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, 0x0}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 03:08:39 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="040005090000000066617400", 0xc}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(r0, r1, 0x0, 0x8400fffffff7) 03:08:39 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x20, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:08:39 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, 0x0}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 03:08:39 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x46) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x1, 0x0, 0x44}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty}}, 0xe8) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 285.595741][ T7525] loop3: detected capacity change from 0 to 264192 [ 285.629384][ T7525] FAT-fs (loop3): bogus number of reserved sectors 03:08:40 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, 0x0}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x20, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 285.654122][ T7525] FAT-fs (loop3): Can't find a valid FAT filesystem [ 285.761637][ T38] audit: type=1804 audit(1645240120.159:327): pid=7530 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir357052190/syzkaller.J6xd9H/391/file1/bus" dev="sda1" ino=1164 res=1 errno=0 03:08:40 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x30, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_QOS_MAP={0x14, 0xc7, {[{}, {}, {}, {}], "d3194072badae1e0"}}]}, 0x30}}, 0x0) 03:08:40 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x46) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x1, 0x0, 0x44}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty}}, 0xe8) 03:08:40 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x30, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_QOS_MAP={0x14, 0xc7, {[{}, {}, {}, {}], "d3194072badae1e0"}}]}, 0x30}}, 0x0) 03:08:40 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="040005090000000066617400", 0xc}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(r0, r1, 0x0, 0x8400fffffff7) 03:08:40 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x30, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_QOS_MAP={0x14, 0xc7, {[{}, {}, {}, {}], "d3194072badae1e0"}}]}, 0x30}}, 0x0) 03:08:40 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x20, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:08:40 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x30, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_QOS_MAP={0x14, 0xc7, {[{}, {}, {}, {}], "d3194072badae1e0"}}]}, 0x30}}, 0x0) 03:08:40 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x46) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x1, 0x0, 0x44}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 286.543369][ T7546] loop3: detected capacity change from 0 to 264192 03:08:40 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x30, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_QOS_MAP={0x14, 0xc7, {[{}, {}, {}, {}], "d3194072badae1e0"}}]}, 0x30}}, 0x0) [ 286.567387][ T7546] FAT-fs (loop3): bogus number of reserved sectors [ 286.591339][ T7546] FAT-fs (loop3): Can't find a valid FAT filesystem [ 286.596950][ T7542] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 286.632486][ T38] audit: type=1804 audit(1645240121.029:328): pid=7553 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir357052190/syzkaller.J6xd9H/392/file1/bus" dev="sda1" ino=1164 res=1 errno=0 03:08:41 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x30, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_QOS_MAP={0x14, 0xc7, {[{}, {}, {}, {}], "d3194072badae1e0"}}]}, 0x30}}, 0x0) 03:08:41 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x20, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:08:41 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="040005090000000066617400", 0xc}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(r0, r1, 0x0, 0x8400fffffff7) 03:08:41 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x30, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_QOS_MAP={0x14, 0xc7, {[{}, {}, {}, {}], "d3194072badae1e0"}}]}, 0x30}}, 0x0) 03:08:41 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x46) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x1, 0x0, 0x44}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 03:08:41 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x20, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:08:41 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x30, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r1}, @void}}, [@NL80211_ATTR_QOS_MAP={0x14, 0xc7, {[{}, {}, {}, {}], "d3194072badae1e0"}}]}, 0x30}}, 0x0) 03:08:41 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x30, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r1}, @void}}, [@NL80211_ATTR_QOS_MAP={0x14, 0xc7, {[{}, {}, {}, {}], "d3194072badae1e0"}}]}, 0x30}}, 0x0) [ 287.520779][ T7570] loop3: detected capacity change from 0 to 264192 [ 287.545221][ T7570] FAT-fs (loop3): bogus number of reserved sectors [ 287.557554][ T7570] FAT-fs (loop3): Can't find a valid FAT filesystem 03:08:42 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x30, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r1}, @void}}, [@NL80211_ATTR_QOS_MAP={0x14, 0xc7, {[{}, {}, {}, {}], "d3194072badae1e0"}}]}, 0x30}}, 0x0) [ 287.628002][ T6739] I/O error, dev loop3, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 287.633425][ T38] audit: type=1804 audit(1645240122.039:329): pid=7570 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir357052190/syzkaller.J6xd9H/393/file1/bus" dev="sda1" ino=1151 res=1 errno=0 03:08:42 executing program 1: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_QOS_MAP(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x30, r0, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r1}, @void}}, [@NL80211_ATTR_QOS_MAP={0x14, 0xc7, {[{}, {}, {}, {}], "d3194072badae1e0"}}]}, 0x30}}, 0x0) 03:08:42 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200", 0x12}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(r0, r1, 0x0, 0x8400fffffff7) 03:08:42 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, 0x0}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x20, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:08:42 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x46) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 03:08:42 executing program 1: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_QOS_MAP(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x30, r0, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r1}, @void}}, [@NL80211_ATTR_QOS_MAP={0x14, 0xc7, {[{}, {}, {}, {}], "d3194072badae1e0"}}]}, 0x30}}, 0x0) 03:08:42 executing program 1: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_QOS_MAP(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x30, r0, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r1}, @void}}, [@NL80211_ATTR_QOS_MAP={0x14, 0xc7, {[{}, {}, {}, {}], "d3194072badae1e0"}}]}, 0x30}}, 0x0) 03:08:42 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x30, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_QOS_MAP={0x14, 0xc7, {[{}, {}, {}, {}], "d3194072badae1e0"}}]}, 0x30}}, 0x0) 03:08:42 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x30, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_QOS_MAP={0x14, 0xc7, {[{}, {}, {}, {}], "d3194072badae1e0"}}]}, 0x30}}, 0x0) 03:08:42 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x30, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_QOS_MAP={0x14, 0xc7, {[{}, {}, {}, {}], "d3194072badae1e0"}}]}, 0x30}}, 0x0) [ 288.545602][ T7592] loop3: detected capacity change from 0 to 264192 [ 288.581388][ T7592] FAT-fs (loop3): invalid media value (0x00) [ 288.605179][ T7592] FAT-fs (loop3): Can't find a valid FAT filesystem [ 288.626575][ T38] audit: type=1804 audit(1645240123.039:330): pid=7592 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir357052190/syzkaller.J6xd9H/394/file1/bus" dev="sda1" ino=1159 res=1 errno=0 03:08:43 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200", 0x12}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(r0, r1, 0x0, 0x8400fffffff7) 03:08:43 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x46) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 03:08:43 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, 0x0}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x20, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:08:43 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x30, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_QOS_MAP={0x14, 0xc7, {[{}, {}, {}, {}], "d3194072badae1e0"}}]}, 0x30}}, 0x0) 03:08:43 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x30, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_QOS_MAP={0x14, 0xc7, {[{}, {}, {}, {}], "d3194072badae1e0"}}]}, 0x30}}, 0x0) 03:08:44 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x30, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_QOS_MAP={0x14, 0xc7, {[{}, {}, {}, {}], "d3194072badae1e0"}}]}, 0x30}}, 0x0) [ 289.632185][ T7605] loop3: detected capacity change from 0 to 264192 [ 289.653652][ T7605] FAT-fs (loop3): invalid media value (0x00) [ 289.663568][ T7605] FAT-fs (loop3): Can't find a valid FAT filesystem 03:08:44 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x46) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 03:08:44 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x30, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_QOS_MAP={0x14, 0xc7, {[{}, {}, {}, {}], "d3194072badae1e0"}}]}, 0x30}}, 0x0) [ 289.734524][ T6739] I/O error, dev loop3, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 289.740167][ T38] audit: type=1804 audit(1645240124.149:331): pid=7612 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir357052190/syzkaller.J6xd9H/395/file1/bus" dev="sda1" ino=1160 res=1 errno=0 03:08:44 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200", 0x12}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(r0, r1, 0x0, 0x8400fffffff7) 03:08:44 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, 0x0}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x20, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:08:44 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x30, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_QOS_MAP={0x14, 0xc7, {[{}, {}, {}, {}], "d3194072badae1e0"}}]}, 0x30}}, 0x0) 03:08:44 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x46) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x1, 0x0, 0x44}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 03:08:44 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x30, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_QOS_MAP={0x14, 0xc7, {[{}, {}, {}, {}], "d3194072badae1e0"}}]}, 0x30}}, 0x0) 03:08:44 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x46) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x1, 0x0, 0x44}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 03:08:44 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x46) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x1, 0x0, 0x44}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 03:08:44 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_QOS_MAP(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x30, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_QOS_MAP={0x14, 0xc7, {[{}, {}, {}, {}], "d3194072badae1e0"}}]}, 0x30}}, 0x0) [ 290.645533][ T7629] loop3: detected capacity change from 0 to 264192 [ 290.661454][ T7629] FAT-fs (loop3): invalid media value (0x00) [ 290.669030][ T7629] FAT-fs (loop3): Can't find a valid FAT filesystem [ 290.688217][ T38] audit: type=1804 audit(1645240125.099:332): pid=7629 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir357052190/syzkaller.J6xd9H/396/file1/bus" dev="sda1" ino=1150 res=1 errno=0 03:08:45 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400", 0x15}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(r0, r1, 0x0, 0x8400fffffff7) 03:08:45 executing program 2: connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x1, 0x0, 0x44}}, 0xe8) sendmmsg(0xffffffffffffffff, &(0x7f0000000480), 0x2e9, 0x0) 03:08:45 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_QOS_MAP(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x30, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_QOS_MAP={0x14, 0xc7, {[{}, {}, {}, {}], "d3194072badae1e0"}}]}, 0x30}}, 0x0) 03:08:45 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, 0x0}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x20, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:08:45 executing program 2: connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x1, 0x0, 0x44}}, 0xe8) sendmmsg(0xffffffffffffffff, &(0x7f0000000480), 0x2e9, 0x0) 03:08:45 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_QOS_MAP(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x30, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_QOS_MAP={0x14, 0xc7, {[{}, {}, {}, {}], "d3194072badae1e0"}}]}, 0x30}}, 0x0) 03:08:46 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00'}) sendmsg$NL80211_CMD_SET_QOS_MAP(r0, 0x0, 0x0) 03:08:46 executing program 2: connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x1, 0x0, 0x44}}, 0xe8) sendmmsg(0xffffffffffffffff, &(0x7f0000000480), 0x2e9, 0x0) [ 291.629223][ T7642] loop3: detected capacity change from 0 to 264192 [ 291.646241][ T7642] FAT-fs (loop3): invalid media value (0x00) [ 291.664805][ T7642] FAT-fs (loop3): Can't find a valid FAT filesystem [ 291.731079][ T38] audit: type=1804 audit(1645240126.139:333): pid=7642 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir357052190/syzkaller.J6xd9H/397/file1/bus" dev="sda1" ino=1151 res=1 errno=0 03:08:46 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400", 0x15}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(r0, r1, 0x0, 0x8400fffffff7) 03:08:46 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00'}) sendmsg$NL80211_CMD_SET_QOS_MAP(r0, 0x0, 0x0) 03:08:46 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x46) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x1, 0x0, 0x44}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 03:08:46 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, 0x0}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x20, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:08:46 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00'}) sendmsg$NL80211_CMD_SET_QOS_MAP(r0, 0x0, 0x0) 03:08:47 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00'}) sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) [ 292.624533][ T7662] loop3: detected capacity change from 0 to 264192 03:08:47 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00'}) sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) [ 292.645536][ T7662] FAT-fs (loop3): invalid media value (0x00) 03:08:47 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x46) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x1, 0x0, 0x44}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) [ 292.660205][ T7662] FAT-fs (loop3): Can't find a valid FAT filesystem [ 292.678363][ T38] audit: type=1804 audit(1645240127.089:334): pid=7662 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir357052190/syzkaller.J6xd9H/398/file1/bus" dev="sda1" ino=1164 res=1 errno=0 03:08:47 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400", 0x15}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(r0, r1, 0x0, 0x8400fffffff7) 03:08:47 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, 0x0}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x20, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:08:47 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00'}) sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 03:08:47 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x46) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x1, 0x0, 0x44}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 03:08:47 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00'}) sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={0x0}}, 0x0) 03:08:47 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00'}) sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={0x0}}, 0x0) 03:08:47 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x1, 0x0, 0x44}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 03:08:48 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00'}) sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={0x0}}, 0x0) [ 293.638988][ T7692] loop3: detected capacity change from 0 to 264192 [ 293.655591][ T7692] FAT-fs (loop3): invalid media value (0x00) [ 293.666849][ T7692] FAT-fs (loop3): Can't find a valid FAT filesystem [ 293.748045][ T38] audit: type=1804 audit(1645240128.149:335): pid=7694 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir357052190/syzkaller.J6xd9H/399/file1/bus" dev="sda1" ino=1150 res=1 errno=0 [ 293.795849][ T6739] I/O error, dev loop3, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 03:08:48 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f8", 0x16}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(r0, r1, 0x0, 0x8400fffffff7) 03:08:48 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x30, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r1}, @void}}, [@NL80211_ATTR_QOS_MAP={0x14, 0xc7, {[{}, {}, {}, {}], "d3194072badae1e0"}}]}, 0x30}}, 0x0) 03:08:48 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, 0x0}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:08:48 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x1, 0x0, 0x44}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 03:08:48 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x30, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r1}, @void}}, [@NL80211_ATTR_QOS_MAP={0x14, 0xc7, {[{}, {}, {}, {}], "d3194072badae1e0"}}]}, 0x30}}, 0x0) 03:08:49 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x1, 0x0, 0x44}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 03:08:49 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x30, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r1}, @void}}, [@NL80211_ATTR_QOS_MAP={0x14, 0xc7, {[{}, {}, {}, {}], "d3194072badae1e0"}}]}, 0x30}}, 0x0) 03:08:49 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, 0x0}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 294.730444][ T7717] loop3: detected capacity change from 0 to 264192 [ 294.760729][ T7717] FAT-fs (loop3): bogus number of FAT sectors [ 294.794885][ T7717] FAT-fs (loop3): Can't find a valid FAT filesystem [ 294.854276][ T38] audit: type=1804 audit(1645240129.259:336): pid=7720 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir357052190/syzkaller.J6xd9H/400/file1/bus" dev="sda1" ino=1150 res=1 errno=0 [ 294.909326][ T6739] I/O error, dev loop3, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 03:08:50 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x30, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_QOS_MAP={0x14, 0xc7, {[{}, {}, {}, {}], "d3194072badae1e0"}}]}, 0x30}}, 0x0) 03:08:50 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x46) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x1, 0x0, 0x44}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 03:08:50 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f8", 0x16}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(r0, r1, 0x0, 0x8400fffffff7) 03:08:50 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, 0x0}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 03:08:50 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x30, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_QOS_MAP={0x14, 0xc7, {[{}, {}, {}, {}], "d3194072badae1e0"}}]}, 0x30}}, 0x0) 03:08:50 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x46) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x1, 0x0, 0x44}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 03:08:50 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x46) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x1, 0x0, 0x44}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 03:08:50 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x30, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_QOS_MAP={0x14, 0xc7, {[{}, {}, {}, {}], "d3194072badae1e0"}}]}, 0x30}}, 0x0) [ 295.793504][ T7734] loop3: detected capacity change from 0 to 264192 03:08:50 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x46) connect$inet6(r0, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x1, 0x0, 0x44}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) [ 295.828156][ T7734] FAT-fs (loop3): bogus number of FAT sectors 03:08:50 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00'}) sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x30, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_QOS_MAP={0x14, 0xc7, {[{}, {}, {}, {}], "d3194072badae1e0"}}]}, 0x30}}, 0x0) [ 295.838326][ T7734] FAT-fs (loop3): Can't find a valid FAT filesystem [ 295.855961][ T38] audit: type=1804 audit(1645240130.259:337): pid=7734 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir357052190/syzkaller.J6xd9H/401/file1/bus" dev="sda1" ino=1159 res=1 errno=0 03:08:51 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f8", 0x16}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(r0, r1, 0x0, 0x8400fffffff7) 03:08:51 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x46) connect$inet6(r0, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x1, 0x0, 0x44}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 03:08:51 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00'}) sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x30, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_QOS_MAP={0x14, 0xc7, {[{}, {}, {}, {}], "d3194072badae1e0"}}]}, 0x30}}, 0x0) 03:08:51 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, 0x0}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 03:08:51 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00'}) sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x30, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_QOS_MAP={0x14, 0xc7, {[{}, {}, {}, {}], "d3194072badae1e0"}}]}, 0x30}}, 0x0) 03:08:51 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x46) connect$inet6(r0, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x1, 0x0, 0x44}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 03:08:51 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x1c, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}}, 0x1c}}, 0x0) 03:08:51 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x46) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x1, 0x0, 0x44}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) [ 296.885625][ T7760] loop3: detected capacity change from 0 to 264192 [ 296.918240][ T7760] FAT-fs (loop3): bogus number of FAT sectors [ 296.935623][ T7760] FAT-fs (loop3): Can't find a valid FAT filesystem [ 296.989393][ T38] audit: type=1804 audit(1645240131.399:338): pid=7760 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir357052190/syzkaller.J6xd9H/402/file1/bus" dev="sda1" ino=1152 res=1 errno=0 03:08:52 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x1c, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}}, 0x1c}}, 0x0) 03:08:52 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, 0x0) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(r0, r1, 0x0, 0x8400fffffff7) 03:08:52 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, 0x0}], 0x1, 0x3296393731608a96, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 03:08:52 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x46) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x1, 0x0, 0x44}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 03:08:52 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x1c, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}}, 0x1c}}, 0x0) 03:08:52 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x30, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_QOS_MAP={0x12, 0xc7, {[{}, {}, {}], "d3194072badae1e0"}}]}, 0x30}}, 0x0) 03:08:52 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x30, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_QOS_MAP={0x12, 0xc7, {[{}, {}, {}], "d3194072badae1e0"}}]}, 0x30}}, 0x0) 03:08:52 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x46) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x1, 0x0, 0x44}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 03:08:52 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x30, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_QOS_MAP={0x12, 0xc7, {[{}, {}, {}], "d3194072badae1e0"}}]}, 0x30}}, 0x0) [ 298.297641][ T7780] loop3: detected capacity change from 0 to 264192 [ 298.318898][ T38] audit: type=1804 audit(1645240132.729:339): pid=7780 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir357052190/syzkaller.J6xd9H/403/file1/bus" dev="sda1" ino=1153 res=1 errno=0 03:08:53 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, 0x0) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(r0, r1, 0x0, 0x8400fffffff7) 03:08:53 executing program 0: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180), 0xe2440, 0x0) 03:08:53 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x30, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_QOS_MAP={0x12, 0xc7, {[{}, {}, {}], "d3194072badae1e0"}}]}, 0x30}}, 0x0) 03:08:53 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x46) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, 0x0) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) [ 299.216343][ T38] audit: type=1400 audit(1645240133.619:340): avc: denied { write } for pid=7781 comm="syz-executor.0" name="net" dev="proc" ino=51471 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 03:08:53 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x30, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_QOS_MAP={0x12, 0xc7, {[{}, {}, {}], "d3194072badae1e0"}}]}, 0x30}}, 0x0) 03:08:53 executing program 0: add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)={0x0, "77cad7c62d357736d3f48668be051889ab18d00a861c70e62468bd830961d641f8adb6b3260c9220ed083cd6804951219fbc6d559f5b54146c2f95035f345412"}, 0x48, 0xfffffffffffffffd) 03:08:53 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x30, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_QOS_MAP={0x12, 0xc7, {[{}, {}, {}], "d3194072badae1e0"}}]}, 0x30}}, 0x0) [ 299.316015][ T38] audit: type=1400 audit(1645240133.659:341): avc: denied { add_name } for pid=7781 comm="syz-executor.0" name="pfkey" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 03:08:53 executing program 0: r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000400), 0x0, &(0x7f0000000480)={0x0, "b8394d99a469ba03906290749a447457ffbfab218edaebefc2577f4ebb6ed0284baac4ee73dd7912ff4f4388eabbbf41c9ef474d1e0de1ea80ff987631f92ea5"}, 0x48, r0) [ 299.378787][ T38] audit: type=1400 audit(1645240133.659:342): avc: denied { create } for pid=7781 comm="syz-executor.0" name="pfkey" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=file permissive=1 [ 299.417975][ T38] audit: type=1400 audit(1645240133.659:343): avc: denied { associate } for pid=7781 comm="syz-executor.0" name="pfkey" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 299.453572][ T38] audit: type=1400 audit(1645240133.679:344): avc: denied { append } for pid=7781 comm="syz-executor.0" name="pfkey" dev="proc" ino=4026533025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 299.511550][ T7794] loop3: detected capacity change from 0 to 264192 [ 299.552390][ T38] audit: type=1804 audit(1645240133.959:345): pid=7794 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir357052190/syzkaller.J6xd9H/404/bus" dev="sda1" ino=1151 res=1 errno=0 03:08:54 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, 0x0) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(r0, r1, 0x0, 0x8400fffffff7) 03:08:54 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x3, 0x3, &(0x7f00000001c0)=@framed, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:08:54 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x46) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, 0x0) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 03:08:54 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x30, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_QOS_MAP={0x12, 0xc7, {[{}, {}, {}], "d3194072badae1e0"}}]}, 0x30}}, 0x0) 03:08:54 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x30, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_QOS_MAP={0x12, 0xc7, {[{}, {}, {}], "d3194072badae1e0"}}]}, 0x30}}, 0x0) 03:08:54 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x30, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_QOS_MAP={0x12, 0xc7, {[{}, {}, {}], "d3194072badae1e0"}}]}, 0x30}}, 0x0) 03:08:55 executing program 0: r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f00000007c0), &(0x7f0000000800)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000000)='.dead\x00', &(0x7f0000000040)='}#(.\\B\x00') [ 300.649777][ T7807] loop3: detected capacity change from 0 to 264192 03:08:55 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x30, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_QOS_MAP={0x12, 0xc7, {[{}, {}, {}], "d3194072badae1e0"}}]}, 0x30}}, 0x0) [ 300.717495][ T38] audit: type=1804 audit(1645240135.129:346): pid=7807 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir357052190/syzkaller.J6xd9H/405/file1/bus" dev="sda1" ino=1152 res=1 errno=0 03:08:55 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(0x0) r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(r0, r1, 0x0, 0x8400fffffff7) 03:08:55 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x46) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, 0x0) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 03:08:55 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "2a9d2f946d7c5417bb5fb1c8196ef709a1e227141febdc230fe82172d91ac45d100f8f275664e3b122ff3d4b3c3d96aed91fc1faf479e74d37f6c8fe45b88b0d"}, 0x48, 0xfffffffffffffffd) request_key(&(0x7f0000000100)='id_resolver\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)='\x00', r0) 03:08:55 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x30, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_QOS_MAP={0x12, 0xc7, {[{}, {}, {}], "d3194072badae1e0"}}]}, 0x30}}, 0x0) 03:08:56 executing program 0: semctl$SETVAL(0x0, 0x0, 0x10, &(0x7f0000000300)) 03:08:56 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x30, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_QOS_MAP={0x12, 0xc7, {[{}, {}, {}], "d3194072badae1e0"}}]}, 0x30}}, 0x0) 03:08:56 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x46) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x1, 0x0, 0x44}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_mount_image$squashfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYRESDEC=0x0, @ANYRES16]) 03:08:56 executing program 1: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c837336f4087c726a73b968547268a73a9347ae8557e0bb9567c1b26928f18481018d3389db242557d243ed195e045558807d868c466ea256965a8de8ef70c13"}, 0x48, 0xfffffffffffffffb) keyctl$link(0x8, r0, r0) [ 301.748768][ T38] audit: type=1804 audit(1645240136.159:347): pid=7825 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir357052190/syzkaller.J6xd9H/406/bus" dev="sda1" ino=1155 res=1 errno=0 03:08:57 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(0x0) r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(r0, r1, 0x0, 0x8400fffffff7) 03:08:57 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x46) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x1, 0x0, 0x44}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 03:08:57 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='attr/fscreate\x00') preadv2(r0, &(0x7f00000023c0)=[{&(0x7f0000000240)=""/198, 0xc6}], 0x1, 0x0, 0x0, 0x7) 03:08:57 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x46) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x1, 0x0, 0x44}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_mount_image$squashfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYRESDEC=0x0, @ANYRES16]) 03:08:57 executing program 1: r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f00000007c0), &(0x7f0000000800)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000340), &(0x7f0000000300)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f00000007c0), &(0x7f0000000800)={'syz', 0x1}, 0x0, 0x0, r2) keyctl$KEYCTL_MOVE(0x1e, r2, r2, r1, 0x0) request_key(0x0, &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) 03:08:57 executing program 1: ptrace(0x4207, 0x0) ptrace$getregs(0xe, 0xffffffffffffffff, 0x0, &(0x7f0000000000)=""/159) ptrace$getregs(0xe, 0xffffffffffffffff, 0x0, &(0x7f00000000c0)=""/62) r0 = getpgid(0x0) r1 = getpgid(r0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_clone3(&(0x7f0000002300)={0x200, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x0, {0x8}, &(0x7f00000001c0)=""/102, 0x66, &(0x7f0000000240)=""/56, &(0x7f00000022c0)=[r1, r0, r0, r0, 0x0, 0x0], 0x6}, 0x58) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000002500)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0xc2606640f3a795ba}, 0xc, &(0x7f00000024c0)={&(0x7f0000002480)={0x30, 0x0, 0x800, 0x70bd25, 0x25dfdbfe, {}, [@SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x7a5b}]}, 0x30}, 0x1, 0x0, 0x0, 0x20048001}, 0x20004090) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000002640)={&(0x7f0000002540)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000002600)={&(0x7f0000002580)={0x50, 0x0, 0x300, 0x70bd2a, 0x25dfdbfb, {}, [@ETHTOOL_A_STRSET_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x5}]}, @ETHTOOL_A_STRSET_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}]}, 0x50}, 0x1, 0x0, 0x0, 0x4850}, 0xc0890) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000026c0)='pids.current\x00', 0x0, 0x0) r4 = getegid() write$FUSE_ENTRY(r3, &(0x7f0000004740)={0x90, 0x0, 0x0, {0x0, 0x1, 0x37, 0x9, 0x80000000, 0x0, {0x2, 0x3, 0x6, 0x7, 0x0, 0x0, 0x5, 0x2, 0xe64, 0x4000, 0x5, 0x0, r4, 0x8000}}}, 0x90) getpgid(0x0) r5 = getpgrp(r2) ptrace$getregs(0xc, r5, 0x0, &(0x7f0000004800)=""/87) [ 302.824806][ T7843] loop3: detected capacity change from 0 to 264192 03:08:57 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(0xffffffffffffffff, 0xc008ae05, &(0x7f0000000180)=""/4096) syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_tables_targets\x00') openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x3af4701e) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0x81a0ae8c, 0x0) [ 302.897689][ T38] audit: type=1804 audit(1645240137.309:348): pid=7843 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir357052190/syzkaller.J6xd9H/407/bus" dev="sda1" ino=1165 res=1 errno=0 03:08:57 executing program 1: syz_open_dev$evdev(&(0x7f0000000680), 0x0, 0x200000) [ 302.987224][ T38] audit: type=1400 audit(1645240137.349:349): avc: denied { write } for pid=7844 comm="syz-executor.1" name="ip_tables_targets" dev="proc" ino=4026533133 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 03:08:58 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x46) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x1, 0x0, 0x44}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 03:08:58 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x46) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x1, 0x0, 0x44}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_mount_image$squashfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYRESDEC=0x0, @ANYRES16]) 03:08:58 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(0x0) r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(r0, r1, 0x0, 0x8400fffffff7) 03:08:58 executing program 1: io_setup(0x100, &(0x7f0000000040)=0x0) r1 = signalfd(0xffffffffffffffff, &(0x7f0000000ac0), 0x8) io_submit(r0, 0x1, &(0x7f0000000380)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 03:08:58 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r0) 03:08:58 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x46) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x1, 0x0, 0x44}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 03:08:58 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x8000000}]}]}}, &(0x7f0000000080)=""/139, 0x32, 0x8b, 0x1}, 0x20) [ 303.889315][ T7862] loop3: detected capacity change from 0 to 264192 03:08:58 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000000c0)=""/246, 0x26, 0xf6, 0x1}, 0x20) [ 303.950969][ T38] audit: type=1804 audit(1645240138.349:350): pid=7862 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir357052190/syzkaller.J6xd9H/408/bus" dev="sda1" ino=1147 res=1 errno=0 03:08:58 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$KVM_CREATE_VM(r0, 0x40049409, 0x0) 03:08:58 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x46) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x1, 0x0, 0x44}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_mount_image$squashfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYRESDEC=0x0, @ANYRES16]) [ 304.354799][ T37] Bluetooth: hci1: command 0x0406 tx timeout [ 304.364904][ T32] Bluetooth: hci3: command 0x0406 tx timeout [ 304.371751][ T32] Bluetooth: hci2: command 0x0406 tx timeout [ 304.394789][ T32] Bluetooth: hci0: command 0x0406 tx timeout 03:08:59 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(0x0, 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(r0, r1, 0x0, 0x8400fffffff7) 03:08:59 executing program 1: add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) 03:08:59 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x46) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x1, 0x0, 0x44}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 03:08:59 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x46) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x1, 0x0, 0x44}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) 03:08:59 executing program 1: syz_mount_image$squashfs(0x0, 0x0, 0x0, 0x7, &(0x7f0000003540)=[{&(0x7f0000000100)}, {0x0, 0x0, 0x6}, {&(0x7f0000000180), 0x0, 0x100}, {0x0}, {0x0, 0x0, 0x9}, {0x0}, {0x0}], 0x0, 0x0) [ 304.823710][ T7877] loop1: detected capacity change from 0 to 1 03:08:59 executing program 1: syz_clone(0x1100000, 0x0, 0x0, 0x0, 0x0, 0x0) 03:08:59 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x46) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x1, 0x0, 0x44}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) [ 304.971775][ T6739] I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 03:08:59 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x46) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x1, 0x0, 0x44}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) [ 305.073056][ T7885] loop3: detected capacity change from 0 to 264192 03:08:59 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(0x0, 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(r0, r1, 0x0, 0x8400fffffff7) 03:08:59 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x8, 0x4, &(0x7f0000000000)=@framed={{}, [@generic={0x1e}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:08:59 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x46) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x1, 0x0, 0x44}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 03:08:59 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(0x0, 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(r0, r1, 0x0, 0x8400fffffff7) 03:08:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x6}]}}, &(0x7f0000000080)=""/139, 0x26, 0x8b, 0x1}, 0x20) 03:08:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x1}]}, {0x0, [0x61, 0x5f]}}, &(0x7f0000000200)=""/165, 0x28, 0xa5, 0x1}, 0x20) [ 305.405910][ T7897] loop3: detected capacity change from 0 to 264192 03:08:59 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) r1 = openat$cgroup_devices(r0, &(0x7f0000000140)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r1, &(0x7f0000000000)=ANY=[@ANYRES32], 0x8) mkdirat$cgroup(r0, &(0x7f0000000080)='syz0\x00', 0x1ff) 03:09:00 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x46) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 03:09:00 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x46) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty}, 0x0, @in6=@empty, 0x0, 0x1, 0x0, 0x44}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 03:09:00 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x1000) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(r0, r1, 0x0, 0x8400fffffff7) 03:09:00 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) r1 = openat$cgroup_devices(r0, &(0x7f0000000140)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r1, &(0x7f0000000000)=ANY=[@ANYRES32], 0x8) mkdirat$cgroup(r0, &(0x7f0000000080)='syz0\x00', 0x1ff) [ 305.721160][ T7906] loop3: detected capacity change from 0 to 264192 03:09:00 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) r1 = openat$cgroup_devices(r0, &(0x7f0000000140)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(0xffffffffffffffff, &(0x7f0000000080)={'b', ' *:* ', 'rwm\x00'}, 0xa) write$cgroup_devices(r1, &(0x7f0000000080)=ANY=[], 0x8) [ 305.811957][ T38] audit: type=1804 audit(1645240140.209:351): pid=7906 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir357052190/syzkaller.J6xd9H/412/file1/bus" dev="loop3" ino=1048603 res=1 errno=0 03:09:00 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000029c0)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) sendmsg(r1, &(0x7f0000001980)={0x0, 0x0, 0x0}, 0x0) 03:09:00 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x1000) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(r0, r1, 0x0, 0x8400fffffff7) 03:09:00 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x46) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty}, 0x0, @in6=@empty, 0x0, 0x1, 0x0, 0x44}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) [ 306.024887][ T38] audit: type=1804 audit(1645240140.439:352): pid=7914 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir357052190/syzkaller.J6xd9H/413/bus" dev="sda1" ino=1147 res=1 errno=0 03:09:00 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x46) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 03:09:00 executing program 1: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000140)={0x0, &(0x7f0000000080)=""/139, 0x0, 0x8b}, 0x20) 03:09:00 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x1000) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(r0, r1, 0x0, 0x8400fffffff7) [ 306.131691][ T7923] loop3: detected capacity change from 0 to 264192 03:09:00 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) sendmsg(r1, &(0x7f0000001980)={0x0, 0x0, 0x0}, 0x0) 03:09:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}}, &(0x7f00000000c0)=""/246, 0x2e, 0xf6, 0x1}, 0x20) [ 306.236523][ T38] audit: type=1804 audit(1645240140.649:353): pid=7928 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir357052190/syzkaller.J6xd9H/414/file1/bus" dev="sda1" ino=1151 res=1 errno=0 03:09:00 executing program 1: syz_clone(0x28082000, &(0x7f0000001280), 0x0, &(0x7f0000001340), 0x0, 0x0) r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000001200)='blkio.bfq.io_wait_time_recursive\x00', 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000001240)={0x1, 0x1, [@dev={'\xaa\xaa\xaa\xaa\xaa', 0x21}]}) 03:09:00 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x0) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(r0, r1, 0x0, 0x8400fffffff7) 03:09:00 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x46) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty}, 0x0, @in6=@empty, 0x0, 0x1, 0x0, 0x44}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 03:09:00 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x46) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 03:09:00 executing program 1: syz_clone(0x28082000, &(0x7f0000001280), 0x0, &(0x7f0000001340), 0x0, 0x0) r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000001200)='blkio.bfq.io_wait_time_recursive\x00', 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000001240)={0x1, 0x1, [@dev={'\xaa\xaa\xaa\xaa\xaa', 0x21}]}) 03:09:00 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x0) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(r0, r1, 0x0, 0x8400fffffff7) [ 306.465333][ T38] audit: type=1804 audit(1645240140.869:354): pid=7935 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir357052190/syzkaller.J6xd9H/415/bus" dev="sda1" ino=1157 res=1 errno=0 03:09:01 executing program 1: syz_clone(0x28082000, &(0x7f0000001280), 0x0, &(0x7f0000001340), 0x0, 0x0) r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000001200)='blkio.bfq.io_wait_time_recursive\x00', 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000001240)={0x1, 0x1, [@dev={'\xaa\xaa\xaa\xaa\xaa', 0x21}]}) [ 306.755935][ T38] audit: type=1804 audit(1645240141.129:355): pid=7947 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir357052190/syzkaller.J6xd9H/416/bus" dev="sda1" ino=1162 res=1 errno=0 03:09:01 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x0) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(r0, r1, 0x0, 0x8400fffffff7) 03:09:01 executing program 1: syz_clone(0x28082000, &(0x7f0000001280), 0x0, &(0x7f0000001340), 0x0, 0x0) r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000001200)='blkio.bfq.io_wait_time_recursive\x00', 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000001240)={0x1, 0x1, [@dev={'\xaa\xaa\xaa\xaa\xaa', 0x21}]}) [ 306.926043][ T7951] loop3: detected capacity change from 0 to 264192 03:09:01 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x46) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x1, 0x0, 0x44}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) [ 307.019221][ T38] audit: type=1804 audit(1645240141.429:356): pid=7951 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir357052190/syzkaller.J6xd9H/417/file1/bus" dev="loop3" ino=1048604 res=1 errno=0 03:09:01 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000001900)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000001980)={0x0, 0x0, 0x0}, 0x0) 03:09:01 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(0xffffffffffffffff, 0x0, 0x2) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(r0, r1, 0x0, 0x8400fffffff7) 03:09:01 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x46) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x0, 0x0, 0x44}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 03:09:01 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x46) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x1, 0x0, 0x44}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) [ 307.222947][ T7961] loop3: detected capacity change from 0 to 264192 03:09:01 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) r1 = openat$cgroup_devices(r0, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) write$cgroup_devices(r1, &(0x7f0000000180)=ANY=[@ANYBLOB='b *'], 0xa) 03:09:01 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x46) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x1, 0x0, 0x44}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) [ 307.316332][ T38] audit: type=1804 audit(1645240141.719:357): pid=7966 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir357052190/syzkaller.J6xd9H/418/file1/bus" dev="sda1" ino=1159 res=1 errno=0 03:09:01 executing program 0: connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x1, 0x0, 0x44}}, 0xe8) sendmmsg(0xffffffffffffffff, &(0x7f0000000480), 0x2e9, 0x0) 03:09:01 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(0xffffffffffffffff, 0x0, 0x2) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(r0, r1, 0x0, 0x8400fffffff7) 03:09:01 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) r1 = openat$cgroup_devices(r0, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) write$cgroup_devices(r1, &(0x7f0000000180)=ANY=[@ANYBLOB='b *'], 0xa) 03:09:01 executing program 0: connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x1, 0x0, 0x44}}, 0xe8) sendmmsg(0xffffffffffffffff, &(0x7f0000000480), 0x2e9, 0x0) 03:09:01 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x46) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x0, 0x0, 0x44}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 03:09:01 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) r1 = openat$cgroup_devices(r0, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) write$cgroup_devices(r1, &(0x7f0000000180)=ANY=[@ANYBLOB='b *'], 0xa) 03:09:02 executing program 0: connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x1, 0x0, 0x44}}, 0xe8) sendmmsg(0xffffffffffffffff, &(0x7f0000000480), 0x2e9, 0x0) [ 307.566617][ T7975] loop3: detected capacity change from 0 to 264192 03:09:02 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) r1 = openat$cgroup_devices(r0, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) write$cgroup_devices(r1, &(0x7f0000000180)=ANY=[@ANYBLOB='b *'], 0xa) [ 307.648633][ T38] audit: type=1804 audit(1645240142.059:358): pid=7983 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir357052190/syzkaller.J6xd9H/419/file1/bus" dev="sda1" ino=1160 res=1 errno=0 03:09:02 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) r1 = openat$cgroup_devices(r0, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) write$cgroup_devices(r1, 0x0, 0x0) 03:09:02 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(0xffffffffffffffff, 0x0, 0x2) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(r0, r1, 0x0, 0x8400fffffff7) 03:09:02 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x5, 0x3, 0x1000, 0x401}, 0x48) 03:09:02 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x46) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x1, 0x0, 0x44}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 03:09:02 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x46) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x0, 0x0, 0x44}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 03:09:02 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x46) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x1, 0x0, 0x44}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) [ 308.002211][ T7997] loop3: detected capacity change from 0 to 264192 [ 308.145832][ T38] audit: type=1804 audit(1645240142.559:359): pid=8004 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir357052190/syzkaller.J6xd9H/420/file1/bus" dev="sda1" ino=1164 res=1 errno=0 03:09:02 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x46) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x1, 0x0, 0x44}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 03:09:02 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x0) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(r0, r1, 0x0, 0x8400fffffff7) 03:09:02 executing program 1: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./cgroup\x00'}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') [ 308.463164][ T8014] loop3: detected capacity change from 0 to 264192 03:09:02 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x46) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x1}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 03:09:02 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x1, 0x0, 0x44}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 03:09:02 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) r1 = openat$cgroup_devices(r0, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) write$cgroup_devices(r1, &(0x7f0000000200)=ANY=[@ANYBLOB='b *:'], 0xa) 03:09:02 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x46) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x1}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 03:09:02 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000940)=@base={0x5, 0x3, 0xcc03, 0x3}, 0x48) [ 308.570278][ T38] audit: type=1804 audit(1645240142.979:360): pid=8019 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir357052190/syzkaller.J6xd9H/421/file1/bus" dev="sda1" ino=1146 res=1 errno=0 03:09:03 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x46) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x1}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 03:09:03 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x0) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(r0, r1, 0x0, 0x8400fffffff7) 03:09:03 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x46) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x1, 0x0, 0x44}}, 0xe8) sendmmsg(0xffffffffffffffff, &(0x7f0000000480), 0x2e9, 0x0) 03:09:03 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x7, 0x4, 0x80, 0x23}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r0, 0x0}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x8}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={r1, &(0x7f00000001c0), &(0x7f0000000080)=""/52}, 0x20) [ 308.953028][ T8036] loop3: detected capacity change from 0 to 264192 03:09:03 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x1, 0x0, 0x44}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 03:09:03 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x46) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x1, 0x0, 0x44}}, 0xe8) sendmmsg(0xffffffffffffffff, &(0x7f0000000480), 0x2e9, 0x0) 03:09:03 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000008000000000000000000000850000000500000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='ext4_da_update_reserve_space\x00', r0}, 0x10) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r1, &(0x7f0000000180), 0x9) 03:09:03 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x46) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x1, 0x0, 0x44}}, 0xe8) sendmmsg(0xffffffffffffffff, &(0x7f0000000480), 0x2e9, 0x0) 03:09:03 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x46) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x1, 0x0, 0x44}}, 0xe8) sendmmsg(r0, 0x0, 0x0, 0x0) 03:09:03 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x0) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(r0, r1, 0x0, 0x8400fffffff7) 03:09:03 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x46) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x1, 0x0, 0x44}}, 0xe8) sendmmsg(r0, 0x0, 0x0, 0x0) 03:09:03 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000008000000000000000000000850000000500000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='ext4_da_update_reserve_space\x00', r0}, 0x10) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r1, &(0x7f0000000180), 0x9) 03:09:03 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x1, 0x0, 0x44}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 03:09:03 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x46) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x1, 0x0, 0x44}}, 0xe8) sendmmsg(r0, 0x0, 0x0, 0x0) [ 309.292224][ T8057] loop3: detected capacity change from 0 to 264192 03:09:03 executing program 2: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x58, &(0x7f0000000400)}, 0x10) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 03:09:03 executing program 1: socketpair(0x1, 0x5, 0x2, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000080)={r1}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={0x1, 0x58, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0x58, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$kcm(r0, &(0x7f0000000840)={&(0x7f0000000680)=@x25={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x3}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000700)="66b18d48b5be34edf0d7e966d341533cefea3e7bf7ea79b051bec6b6f47a3de8c62b71daa34c7ec06a8c0353b68aedbd791aee51988e8546ba5e9b3f216eac437c9d6e51eb7c336efef86e556d06334ea37216629ab5b8da00630b0cc04b79523cd00eb9d1fc0cbba524535c65fae2e396b1086bbe1b0dfbb7ac9b5343b9f2522dbc2eed7c6bfc3807fb53e3b92e176b097149857e9145d8fcd039233055450a8513415a8faa082f6ec5ac04c62b1f5c9e5478ca4b97dd57a51cfd1f977c0ec772b652444233f73cfad9d1f01d986d8261eab8f3608d21065e8ff9bff85a860eed5fc9b80dd2e9b13208e3d4fc5ae2483be7acb5d580756a", 0xf8}], 0x1}, 0x4011) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x58, &(0x7f0000000400)}, 0x10) sendmsg$inet(r2, &(0x7f0000000640)={&(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10, &(0x7f0000000240)=[{&(0x7f0000000100)="8368593d6b731259ea75e47d15875a68b600aa64cd086f820417550499ec007bc5bf753d0fb4c658dd900e7cd41e42f796c9f09f17f31312e2a7f9464f69ff2987122448b9e5a982c34bd41def78418e8ce9", 0x52}, {&(0x7f0000000180)="81ac92e674cfac707439cb16fb23586edaa59713", 0x14}, {&(0x7f00000001c0)="b62d488291a59de0cfe3411e96fb1dea5887dd6ae1556a99049b3aba085f3663d0f1851a58bb37e94f5d3a66bd6780e2ea2238e7787fd74cc2431b8c9e790465bc0431fcf085ed7de9", 0x49}], 0x3, &(0x7f00000004c0)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x8001}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x80000001}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010101}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x9}}, @ip_ttl={{0x14, 0x0, 0x2, 0x3ff}}, @ip_retopts={{0x7c, 0x0, 0x7, {[@end, @timestamp={0x44, 0x10, 0x5, 0x0, 0x1, [0x0, 0x9, 0x3]}, @noop, @ra={0x94, 0x4, 0x1}, @timestamp_addr={0x44, 0x24, 0x80, 0x1, 0xa, [{@private=0xa010100, 0x6}, {@multicast1, 0x6}, {@broadcast, 0xf}, {@empty, 0x7}]}, @generic={0x88, 0xb, "83f7374d22b5908594"}, @rr={0x7, 0x3, 0x3c}, @ra={0x94, 0x4, 0x1}, @timestamp_addr={0x44, 0x1c, 0xbe, 0x1, 0x7, [{@multicast2, 0x1f}, {@local, 0x7ff}, {@empty, 0x9}]}, @end]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x2}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @multicast2, @remote}}}], 0x158}, 0x800) r5 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) syz_clone(0x40004000, &(0x7f0000000880)="d0dafa214e4cc12a88b22d590896637d150ec2f7b3e5ff2b65b004e95630490c189f8009a65adb4153da079f32c8cc25f0d1bc15596ab4ec003d545dfe7e70497dbb512272315f521882c4b27cd26e19634fd25677ae0f88c7b98b75d07877d66758144b031b12464f25f8621022dcd35af80fbc842efd479da08744fc15a29e7e8a0936e6945f32738348c8671ee33b33068488f40f0606d7512a7b169106311dd75b48fa8f37df19b4fcf0bc2a1945b82a0c33a9", 0xb5, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="d9d2ca96bddd08832b4a06df3c11c377e64521e3845854804489458ca28a9b8296972f2ec4d940f4d7782a68591fcdf22061eb33de41febbf8a9b48a5c85d4114ce7fa96f0f0a277109c560db0") r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000b80), 0x4) r7 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000040)={r7}, 0xc) r8 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c80)={&(0x7f0000000c40)='./file0\x00', 0x0, 0x10}, 0x10) r9 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x5, [@enum={0x9, 0x6, 0x0, 0x6, 0x4, [{0x5}, {0xb, 0x80000000}, {0x10, 0x7f}, {0x2, 0x1392}, {0x0, 0x7d}, {0x5, 0x7}]}, @const={0x3, 0x0, 0x0, 0xa, 0x4}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x5}}]}, {0x0, [0x0, 0x2e, 0x2e]}}, &(0x7f0000000200)=""/200, 0x7d, 0xc8}, 0x20) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@bloom_filter={0x1e, 0x7, 0x1, 0x8001, 0x8a1, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x4, 0xc}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x18, 0x4, &(0x7f0000000080)=@raw=[@map_idx={0x18, 0x2, 0x5, 0x0, 0x3}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x3}], &(0x7f00000000c0)='syzkaller\x00', 0x80, 0x65, &(0x7f0000000100)=""/101, 0x41000, 0x0, '\x00', 0x0, 0x0, r9, 0x8, &(0x7f0000000340)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x95b, 0xfffffff7, 0x33c}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, r10, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x1e, 0x4, &(0x7f0000000a40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0xf05}, [@generic={0x9, 0x6, 0x5, 0x4, 0xcdc6}]}, &(0x7f0000000a80)='syzkaller\x00', 0x8001, 0x8e, &(0x7f0000000ac0)=""/142, 0x41100, 0x13, '\x00', 0x0, 0x7, r6, 0x8, &(0x7f0000000bc0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000c00)={0x2, 0xa, 0x8261, 0xd5}, 0x10, 0xffffffffffffffff, r7, 0x0, &(0x7f0000000d00)=[r8, r10, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) close(r5) 03:09:03 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) r1 = open(0x0, 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(r0, r1, 0x0, 0x8400fffffff7) 03:09:03 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x46) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x1, 0x0, 0x44}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 03:09:03 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x46) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x1, 0x0, 0x44}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 03:09:04 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) r1 = open(0x0, 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(r0, r1, 0x0, 0x8400fffffff7) 03:09:04 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x46) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x1, 0x0, 0x44}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 03:09:04 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) r1 = open(0x0, 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(r0, r1, 0x0, 0x8400fffffff7) [ 309.825432][ T8083] loop3: detected capacity change from 0 to 264192 03:09:04 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x8b000000, 0x0, 0x0, 0x2}}, &(0x7f0000000240)=""/140, 0x1a, 0x8c, 0x1}, 0x20) 03:09:04 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xd, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x79, 0x11, 0xa8}, [@ldst={0x4}]}, &(0x7f0000000080)='syzkaller\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x36c}, 0x48) 03:09:04 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x46) connect$inet6(r0, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x1, 0x0, 0x44}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 03:09:04 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x46) connect$inet6(r0, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x1, 0x0, 0x44}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 03:09:04 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r0}, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x7d13}) close(r1) 03:09:04 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x46) connect$inet6(r0, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x1, 0x0, 0x44}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 03:09:04 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(0x0, 0x9a8) sendfile(r0, r1, 0x0, 0x8400fffffff7) 03:09:04 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x46) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x1, 0x0, 0x44}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 03:09:04 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xd, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x79, 0x11, 0xa8}, [@ldst={0x4}]}, &(0x7f0000000080)='syzkaller\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x36c}, 0x48) [ 310.253420][ T8099] loop3: detected capacity change from 0 to 264192 03:09:04 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r0}, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x7d13}) close(r1) 03:09:04 executing program 1: bpf$BPF_BTF_LOAD(0x14, &(0x7f0000000280)={0x0, &(0x7f00000001c0)=""/162, 0x0, 0xa2}, 0x20) 03:09:04 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x46) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x1, 0x0, 0x44}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 03:09:04 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x4, 0xfffffffe}]}]}}, &(0x7f00000001c0)=""/162, 0x32, 0xa2, 0x1}, 0x20) 03:09:05 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x15, 0x8, 0x34d9, 0x0, 0x0, 0x1}, 0x48) 03:09:05 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(0x0, 0x9a8) sendfile(r0, r1, 0x0, 0x8400fffffff7) 03:09:05 executing program 2: r0 = socket$kcm(0x29, 0x2, 0x0) recvmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000080)="f1", 0x1}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) 03:09:05 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x8b}]}}, &(0x7f0000000240)=""/140, 0x2a, 0x8c, 0x1}, 0x20) 03:09:05 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x46) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x1, 0x0, 0x44}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) [ 311.077374][ T38] kauditd_printk_skb: 3 callbacks suppressed 03:09:05 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, 0x0) [ 311.077398][ T38] audit: type=1400 audit(1645240145.489:364): avc: denied { read } for pid=8118 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 03:09:05 executing program 1: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_procfs$namespace(0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) [ 311.360739][ T8125] loop3: detected capacity change from 0 to 264192 03:09:05 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x46) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, 0x0) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) [ 311.447399][ T38] audit: type=1804 audit(1645240145.839:365): pid=8125 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir357052190/syzkaller.J6xd9H/428/file1/bus" dev="loop3" ino=1048606 res=1 errno=0 03:09:06 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000001c0)=""/162, 0x1a, 0xa2, 0x1}, 0x20) 03:09:06 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(0x0, 0x9a8) sendfile(r0, r1, 0x0, 0x8400fffffff7) 03:09:06 executing program 2: socketpair(0x2b, 0x1, 0xb54e, &(0x7f0000000000)) 03:09:06 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x46) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, 0x0) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 03:09:06 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={r0, 0xe0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000002c0)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) 03:09:06 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001cc0)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000001fc0)={&(0x7f0000001d00)={0x2, 0x0, @multicast2}, 0x10, 0x0}, 0x0) 03:09:06 executing program 1: socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0x40004000, &(0x7f0000000880), 0x0, &(0x7f0000000940), 0x0, &(0x7f00000009c0)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c80)={&(0x7f0000000c40)='./file0\x00', 0x0, 0x10}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x4}, 0x48) 03:09:06 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xf, 0x4, 0x0, 0x3}, 0x48) 03:09:06 executing program 2: socketpair(0x1, 0x5, 0x2, &(0x7f0000000000)) syz_clone(0x40004000, &(0x7f0000000880)="d0dafa214e4cc12a88b22d590896637d150ec2f7b3e5ff2b65b004e95630490c189f8009a65adb4153da079f32c8cc25f0d1bc15596ab4ec003d545dfe7e70497dbb512272315f521882c4b27cd26e19634fd25677ae0f88c7b98b75d07877d66758144b031b12464f25f8621022dcd35af80fbc842efd479da08744fc15a29e7e8a0936e6945f3273", 0x89, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="d9d2ca96bddd08832b4a06df3c11c377e64521e3845854804489458ca28a9b8296972f2ec4d940f4d7782a68591fcdf22061eb33de41febbf8a9b48a5c85d4114ce7fa96f0f0a277109c560db0") [ 312.326085][ T8151] loop3: detected capacity change from 0 to 264192 [ 312.391360][ T38] audit: type=1804 audit(1645240146.799:366): pid=8151 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir357052190/syzkaller.J6xd9H/429/file1/bus" dev="loop3" ino=1048607 res=1 errno=0 03:09:07 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x0) sendfile(r0, r1, 0x0, 0x8400fffffff7) 03:09:07 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}]}}, &(0x7f00000001c0)=""/4096, 0x3e, 0x1000, 0x1}, 0x20) 03:09:07 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x46) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, 0x0) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 03:09:07 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000080)="f1", 0x1}], 0x1}, 0xc050) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 03:09:07 executing program 1: syz_clone(0x31120040, 0x0, 0x0, 0x0, 0x0, 0x0) 03:09:07 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000cc0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000f40)={0x0, 0x0, 0x0}, 0x0) 03:09:07 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000480)="89000000120081ae08060c0f006b3f3c087f03e3f70000000000e2ffca1b1f0000000000000072f750375ed08a56331dbf64700169381ad6e747033a0093b837dc6cc01e32efaec8c7a6ec00120c000100ff4ce27d1bb215604f192dc70c080800bdad446b9bbc7a46e3988285dcdf12f21308f868fece14955fed0009d78f0a947ee2b49e33538afa", 0x89}], 0x1}, 0x0) [ 312.968427][ T38] audit: type=1400 audit(1645240147.379:367): avc: denied { write } for pid=8166 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 03:09:07 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000ec0)={0x0, 0x0, 0x0}, 0x0) recvmsg(r1, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001000)=[{&(0x7f0000000f00)=""/49, 0x31}], 0x1}, 0x0) [ 313.157949][ T8170] loop3: detected capacity change from 0 to 264192 [ 313.191865][ T38] audit: type=1400 audit(1645240147.459:368): avc: denied { nlmsg_read } for pid=8166 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 03:09:07 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x0) sendfile(r0, r1, 0x0, 0x8400fffffff7) 03:09:07 executing program 2: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={0x1, 0x58, &(0x7f0000000280)}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0x58, &(0x7f0000000340)}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000680)=@x25={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x3}}, 0x80, &(0x7f0000000800)}, 0x4011) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x800) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) syz_clone(0x40004000, &(0x7f0000000880)="d0dafa214e4cc12a88b22d590896637d150ec2f7b3e5ff2b65b004e95630490c189f8009a65adb4153da079f32c8cc25f0d1bc15596ab4ec003d545dfe7e70497dbb512272315f521882c4b27cd26e19634fd25677ae0f88c7b98b75d07877d66758144b031b12464f25f8621022dcd35af80fbc842efd479da08744fc15a29e7e8a0936e6945f32738348c8671ee33b33068488f40f0606d7512a7b169106311dd75b48fa8f37df19b4fcf0bc2a1945b82a0c33a9", 0xb5, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="d9d2ca96bddd08832b4a06df3c11c377e64521e3845854804489458ca28a9b8296972f2ec4d940f4d7782a68591fcdf22061eb33de41febbf8a9b48a5c85d4114ce7fa96f0f0a277109c560db0") bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000b80), 0x4) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000040)={r0}, 0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@bloom_filter={0x1e, 0x0, 0x1, 0x0, 0x8a1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4, 0xc}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x18, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x65, &(0x7f0000000100)=""/101, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x95b, 0xfffffff7, 0x33c}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, r1, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) close(0xffffffffffffffff) [ 313.259516][ T38] audit: type=1804 audit(1645240147.659:369): pid=8173 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir357052190/syzkaller.J6xd9H/430/file1/bus" dev="sda1" ino=1156 res=1 errno=0 03:09:07 executing program 1: syz_clone(0x2e081400, 0x0, 0xfdfc, 0x0, 0x0, 0x0) 03:09:07 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x46) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x1, 0x0, 0x44}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 03:09:07 executing program 1: syz_clone(0x2e081400, 0x0, 0xfdfc, 0x0, 0x0, 0x0) [ 313.661121][ T8187] loop3: detected capacity change from 0 to 264192 03:09:08 executing program 2: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={0x1, 0x58, &(0x7f0000000280)}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0x58, &(0x7f0000000340)}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000680)=@x25={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x3}}, 0x80, &(0x7f0000000800)}, 0x4011) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x800) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) syz_clone(0x40004000, &(0x7f0000000880)="d0dafa214e4cc12a88b22d590896637d150ec2f7b3e5ff2b65b004e95630490c189f8009a65adb4153da079f32c8cc25f0d1bc15596ab4ec003d545dfe7e70497dbb512272315f521882c4b27cd26e19634fd25677ae0f88c7b98b75d07877d66758144b031b12464f25f8621022dcd35af80fbc842efd479da08744fc15a29e7e8a0936e6945f32738348c8671ee33b33068488f40f0606d7512a7b169106311dd75b48fa8f37df19b4fcf0bc2a1945b82a0c33a9", 0xb5, &(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)="d9d2ca96bddd08832b4a06df3c11c377e64521e3845854804489458ca28a9b8296972f2ec4d940f4d7782a68591fcdf22061eb33de41febbf8a9b48a5c85d4114ce7fa96f0f0a277109c560db0") bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000b80), 0x4) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000040)={r0}, 0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@bloom_filter={0x1e, 0x0, 0x1, 0x0, 0x8a1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4, 0xc}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x18, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x65, &(0x7f0000000100)=""/101, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x95b, 0xfffffff7, 0x33c}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, r1, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) close(0xffffffffffffffff) [ 313.692226][ T38] audit: type=1804 audit(1645240148.099:370): pid=8187 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir357052190/syzkaller.J6xd9H/431/file1/bus" dev="loop3" ino=1048608 res=1 errno=0 03:09:08 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x46) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x1, 0x0, 0x44}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 03:09:08 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x0) sendfile(r0, r1, 0x0, 0x8400fffffff7) 03:09:08 executing program 1: syz_clone(0x2a3080, 0x0, 0x0, 0x0, 0x0, 0x0) 03:09:08 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(0xffffffffffffffff, r1, 0x0, 0x8400fffffff7) [ 313.839931][ T38] audit: type=1804 audit(1645240148.249:371): pid=8191 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir357052190/syzkaller.J6xd9H/432/bus" dev="sda1" ino=1155 res=1 errno=0 [ 314.022095][ T8197] loop3: detected capacity change from 0 to 264192 03:09:08 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xd, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) [ 314.075275][ T38] audit: type=1804 audit(1645240148.479:372): pid=8200 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir357052190/syzkaller.J6xd9H/433/file1/bus" dev="sda1" ino=1155 res=1 errno=0 03:09:08 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(0xffffffffffffffff, r1, 0x0, 0x8400fffffff7) 03:09:08 executing program 1: socketpair(0x26, 0x5, 0x0, &(0x7f0000000380)) 03:09:08 executing program 2: sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x40004000, 0x0, 0x0, 0x0, &(0x7f0000000980), 0x0) 03:09:08 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x46) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x1, 0x0, 0x44}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 03:09:08 executing program 1: syz_clone(0xae8100, 0x0, 0x0, 0x0, 0x0, 0x0) [ 314.348984][ T8211] loop3: detected capacity change from 0 to 264192 03:09:08 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000000)="14", 0x1}], 0x1}, 0xc050) close(r0) [ 314.394990][ T38] audit: type=1804 audit(1645240148.809:373): pid=8211 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir357052190/syzkaller.J6xd9H/434/file1/bus" dev="loop3" ino=1048609 res=1 errno=0 03:09:08 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(0xffffffffffffffff, r1, 0x0, 0x8400fffffff7) 03:09:08 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000b00)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000002480)={0x0, 0x0, 0x0}, 0x0) 03:09:08 executing program 1: syz_clone(0x71102040, 0x0, 0x0, 0x0, 0x0, 0x0) 03:09:09 executing program 2: syz_io_uring_setup(0x444da, &(0x7f0000001600)={0x0, 0x0, 0x11}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000001680), &(0x7f00000016c0)) [ 314.695374][ T8224] loop3: detected capacity change from 0 to 264192 03:09:09 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x46) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x1, 0x0, 0x44}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 03:09:09 executing program 2: syz_clone(0x84000400, 0x0, 0x0, 0x0, &(0x7f0000000180), 0x0) 03:09:09 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8400fffffff7) 03:09:09 executing program 2: sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xd, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x79, 0x11, 0xa8}, [@ldst={0x4}]}, &(0x7f0000000080)='syzkaller\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x36c}, 0x48) 03:09:09 executing program 1: syz_clone(0x71102040, 0x0, 0x0, 0x0, 0x0, 0x0) [ 315.043100][ T8239] loop3: detected capacity change from 0 to 264192 03:09:09 executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={r0, 0xe0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, &(0x7f00000002c0)=[0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000000500)}}, 0x10) 03:09:09 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x46) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x1, 0x0, 0x44}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 03:09:09 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8400fffffff7) 03:09:09 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x6, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x2}, {0x5}, {0xb, 0x3}]}]}, {0x0, [0x0, 0x2e, 0x0, 0x0]}}, &(0x7f00000001c0)=""/4096, 0x42, 0x1000, 0x1}, 0x20) 03:09:09 executing program 2: ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000001c00), 0x0, 0x0) ioctl$SNDCTL_DSP_SETFMT(r0, 0xc0045005, &(0x7f0000001c40)) 03:09:10 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8400fffffff7) 03:09:10 executing program 2: ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000001c00), 0x0, 0x0) ioctl$SNDCTL_DSP_SETFMT(r0, 0xc0045005, &(0x7f0000001c40)) [ 315.724508][ T8253] loop3: detected capacity change from 0 to 264192 03:09:10 executing program 1: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) openat$snapshot(0xffffffffffffff9c, &(0x7f0000001ac0), 0x1, 0x0) 03:09:10 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x46) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x1, 0x0, 0x44}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 03:09:10 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(r0, r1, 0x0, 0x0) 03:09:10 executing program 2: bpf$LINK_GET_NEXT_ID(0x14, 0x0, 0x0) 03:09:10 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x0, 0x0, 0x208}, 0x20) 03:09:10 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_SIGNAL_INFO(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x300}, 0x0) [ 316.077883][ T8264] loop3: detected capacity change from 0 to 264192 03:09:10 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x006s\x00\x00\x00\x008\x00'/113], 0x78) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text32={0x20, &(0x7f0000000100)="0f23250f01cf66b83d008ed064660f3a2066f500640f01c4660f6bea66b8ea008ee0b9800000c00f3235008000000f309adb9c52d181000f20d80f22d8", 0x3d}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r3, 0x4400ae8f, &(0x7f0000000040)) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:09:10 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x46) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty}, 0x0, @in6=@empty, 0x0, 0x1, 0x0, 0x44}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 03:09:10 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000002000/0x18000)=nil, &(0x7f0000000340)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x11, r2, 0x0) [ 316.246235][ T38] kauditd_printk_skb: 6 callbacks suppressed [ 316.246253][ T38] audit: type=1804 audit(1645240150.619:380): pid=8271 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir357052190/syzkaller.J6xd9H/439/file1/bus" dev="sda1" ino=1150 res=1 errno=0 03:09:10 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x46) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty}, 0x0, @in6=@empty, 0x0, 0x1, 0x0, 0x44}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 03:09:10 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(r0, r1, 0x0, 0x0) 03:09:10 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x200002, 0x0) mkdirat$cgroup(r0, &(0x7f0000000140)='syz0\x00', 0x1ff) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) write$tun(0xffffffffffffffff, &(0x7f0000000000)={@void, @val={0x3, 0x1, 0x101, 0x9, 0x40, 0x5}, @x25={0x2, 0x4, 0x9, "ae07cbf374d69dd81212f476297fb9be35a4e42ac56b596f11b5c20c1c1d7a41c7db1d392d2cc7af19a8cef375bd29c6d6b49dd9b17e18f2640b92aa236426fdbad48b0b31e2ff7d68b04948bc92bc2d080729ddc251ea0e64deeba2e4a2b4ff993d1b0892d6dc883f8a5c756e5a3b9b20552e758ce23bd8191fc14d4b78dac292e4cc87c7eaad44420ccb0e79f7228eefeff329171fb3a3aca593391406ebe34d2e9f02dfa3ba879432f574f06065201c5f85c8e5be0000000000000000000000000000b8"}}, 0xd2) syz_clone3(&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000240), 0xffffffffffffffff) r2 = syz_open_dev$cec(&(0x7f0000000180), 0x3, 0x2) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, 0x0) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)=ANY=[@ANYRES64=r2, @ANYRES16=r1, @ANYBLOB="080026bd7000fddbdf250100000008002c0009000000"], 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4040050) 03:09:11 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, 0x0, 0x0) 03:09:11 executing program 1: syz_clone3(&(0x7f0000000600)={0xc0b4000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 03:09:11 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000000), 0x0, 0x0, 0x0) 03:09:11 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x46) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty}, 0x0, @in6=@empty, 0x0, 0x1, 0x0, 0x44}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) [ 316.847811][ T8289] loop3: detected capacity change from 0 to 264192 03:09:11 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000), 0x0, 0x2) ioctl$VIDIOC_SUBDEV_G_EDID(r0, 0xc0285628, &(0x7f0000000080)={0x0, 0x0, 0x0, '\x00', 0x0}) 03:09:11 executing program 1: rseq(&(0x7f0000000100), 0x20, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000340), 0xffffffffffffffff) [ 316.959412][ T38] audit: type=1804 audit(1645240151.369:381): pid=8299 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir357052190/syzkaller.J6xd9H/440/file1/bus" dev="sda1" ino=1164 res=1 errno=0 03:09:11 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./bus\x00', 0x9a8) sendfile(r0, r1, 0x0, 0x0) 03:09:11 executing program 2: pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RSTATu(r0, &(0x7f00000022c0)={0x83, 0x7d, 0x0, {{0x0, 0x5c, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '/dev/dsp1\x00', 0x3, '\xe2}]', 0xa, '/dev/dsp1\x00', 0x12, 'mem_return_failed\x00'}, 0x12, 'mem_return_failed\x00', 0xee01}}, 0xfffffffffffffdef) 03:09:11 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000000), 0x3f80000, 0x0) ioctl$VIDIOC_SUBDEV_G_EDID(r0, 0xc0285628, &(0x7f0000000080)={0x0, 0x0, 0x0, '\x00', 0x0}) 03:09:11 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_TP_METER_CANCEL(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x1}, 0x14}}, 0x0) 03:09:11 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_SIGNAL_INFO(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x10}, 0x33fe0}}, 0x0) [ 317.201756][ T38] audit: type=1400 audit(1645240151.619:382): avc: denied { nlmsg_read } for pid=8307 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 03:09:11 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x46) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x0, 0x0, 0x44}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 03:09:11 executing program 1: pipe2$9p(&(0x7f0000000240), 0x0) 03:09:11 executing program 2: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VIDIOC_DQBUF(r0, 0xc0585611, &(0x7f0000000140)=@fd={0x0, 0x3, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "1bdc721e"}}) [ 317.209484][ T8305] loop3: detected capacity change from 0 to 264192 [ 317.284080][ T38] audit: type=1804 audit(1645240151.699:383): pid=8310 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir357052190/syzkaller.J6xd9H/441/bus" dev="sda1" ino=1149 res=1 errno=0 03:09:11 executing program 1: memfd_secret(0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000001ac0), 0x0, 0x0) 03:09:11 executing program 2: syz_clone3(&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, {0x1100}, 0x0, 0x0, 0x0, 0x0}, 0x58) 03:09:11 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, 0x0, &(0x7f00000001c0)) [ 317.495317][ T38] audit: type=1400 audit(1645240151.899:384): avc: denied { read } for pid=8317 comm="syz-executor.1" name="snapshot" dev="devtmpfs" ino=97 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 03:09:11 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) dup2(r0, r1) 03:09:11 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$netlink(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001380)=[{0xffffffffffffffff}], 0x1}, 0x0) 03:09:12 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x46) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x0, 0x0, 0x44}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 03:09:12 executing program 2: r0 = socket$inet(0x2, 0x3, 0x3) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f00000007c0)={0x0, @rand_addr=0x64010102, 0x0, 0x0, 'dh\x00'}, 0x2c) 03:09:12 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) dup2(r0, r1) 03:09:12 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}]}, @NFT_MSG_DELTABLE={0x14, 0x2, 0xa, 0x9}, @NFT_MSG_DELSET={0x14}], {0x14}}, 0x9c}}, 0x0) 03:09:12 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) dup2(r0, r1) [ 317.788180][ T8332] IPVS: set_ctl: invalid protocol: 0 100.1.1.2:0 03:09:12 executing program 3: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0xaa, 0x9d, 0x14, 0x40, 0xc45, 0x628c, 0xa924, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x4e, 0xf4, 0x6e}}]}}]}}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) 03:09:12 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) dup2(r0, r1) 03:09:12 executing program 2: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000600), 0x40001, 0x0) ioctl$SNDCTL_DSP_GETOSPACE(r0, 0x8010500c, &(0x7f0000000640)) 03:09:12 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x46) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x0, 0x0, 0x44}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 03:09:12 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) dup2(r0, 0xffffffffffffffff) 03:09:12 executing program 2: openat$dsp1(0xffffffffffffff9c, &(0x7f0000001c00), 0x0, 0x0) [ 318.205882][ T3742] usb 8-1: new high-speed USB device number 5 using dummy_hcd 03:09:12 executing program 2: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) ioctl$SNDCTL_DSP_SUBDIVIDE(r0, 0xc0045009, &(0x7f0000000000)=0x1a) 03:09:12 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) dup2(r0, 0xffffffffffffffff) [ 318.610814][ T3742] usb 8-1: New USB device found, idVendor=0c45, idProduct=628c, bcdDevice=a9.24 [ 318.624892][ T3742] usb 8-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 318.674388][ T3742] usb 8-1: config 0 descriptor?? [ 318.739238][ T3742] gspca_main: gspca_sn9c20x-2.14.0 probing 0c45:628c [ 319.194776][ T3742] gspca_sn9c20x: Write register 1001 failed -71 [ 319.203905][ T3742] gspca_sn9c20x: Device initialization failed [ 319.215054][ T3742] gspca_sn9c20x: probe of 8-1:0.0 failed with error -71 [ 319.243378][ T3742] usb 8-1: USB disconnect, device number 5 03:09:14 executing program 2: pipe2$9p(0x0, 0x4c00) 03:09:14 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) dup2(r0, 0xffffffffffffffff) 03:09:14 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x46) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x1}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 03:09:14 executing program 3: socket$inet(0x2, 0xa, 0x27e00) 03:09:14 executing program 2: syz_open_dev$rtc(&(0x7f00000002c0), 0x0, 0x182c0) 03:09:14 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x46) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x1}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 03:09:14 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) dup2(0xffffffffffffffff, r0) 03:09:14 executing program 3: openat$dsp1(0xffffffffffffff9c, &(0x7f0000000080), 0x40, 0x0) 03:09:14 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) dup2(0xffffffffffffffff, r0) 03:09:14 executing program 2: socket(0x29, 0x5, 0x6) 03:09:14 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x46) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x1}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 03:09:14 executing program 2: r0 = socket$inet(0x2, 0x3, 0x3) getsockname$inet(r0, 0x0, 0x0) 03:09:14 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) dup2(0xffffffffffffffff, r0) 03:09:14 executing program 3: socketpair(0x3, 0x0, 0xd30, &(0x7f0000000000)) 03:09:14 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x46) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x1, 0x0, 0x44}}, 0xe8) sendmmsg(0xffffffffffffffff, &(0x7f0000000480), 0x2e9, 0x0) 03:09:14 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) dup2(r0, r1) [ 320.212202][ T38] audit: type=1400 audit(1645240154.619:385): avc: denied { create } for pid=8379 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 03:09:14 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x46) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x1, 0x0, 0x44}}, 0xe8) sendmmsg(0xffffffffffffffff, &(0x7f0000000480), 0x2e9, 0x0) 03:09:14 executing program 3: r0 = syz_open_dev$vbi(&(0x7f0000000000), 0x0, 0x2) ioctl$VIDIOC_SUBDEV_G_EDID(r0, 0xc0285628, &(0x7f0000000080)={0x0, 0x0, 0x1, '\x00', 0x0}) 03:09:14 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) dup2(r0, r1) 03:09:14 executing program 2: r0 = memfd_secret(0x0) accept4$inet(r0, 0x0, 0x0, 0x1000) 03:09:14 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) dup2(r0, r1) 03:09:14 executing program 3: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x1e7d, 0x30d4, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f00000001c0)={0x24, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x22, 0x2, {[@local=@item_012={0x1, 0x2, 0x0, ';'}]}}, 0x0}, 0x0) 03:09:14 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x46) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x1, 0x0, 0x44}}, 0xe8) sendmmsg(0xffffffffffffffff, &(0x7f0000000480), 0x2e9, 0x0) 03:09:14 executing program 2: socketpair(0x1a, 0x0, 0x0, &(0x7f0000000480)) 03:09:14 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) dup2(0xffffffffffffffff, r0) 03:09:14 executing program 2: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) ioctl$SNDCTL_DSP_GETIPTR(r0, 0x800c5011, &(0x7f0000000100)) 03:09:14 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x46) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x1, 0x0, 0x44}}, 0xe8) sendmmsg(r0, 0x0, 0x0, 0x0) 03:09:15 executing program 2: openat$audio(0xffffffffffffff9c, &(0x7f0000000280), 0x200000, 0x0) 03:09:15 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) dup2(0xffffffffffffffff, r0) [ 320.734771][ T5596] usb 8-1: new high-speed USB device number 6 using dummy_hcd [ 321.115441][ T5596] usb 8-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 321.137591][ T5596] usb 8-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 321.151811][ T5596] usb 8-1: New USB device found, idVendor=1e7d, idProduct=30d4, bcdDevice= 0.40 [ 321.181583][ T5596] usb 8-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 321.205252][ T5596] usb 8-1: config 0 descriptor?? [ 321.670658][ T5596] arvo 0003:1E7D:30D4.0003: item fetching failed at offset 0/1 [ 321.689134][ T5596] arvo 0003:1E7D:30D4.0003: parse failed [ 321.717331][ T5596] arvo: probe of 0003:1E7D:30D4.0003 failed with error -22 [ 321.888932][ T5596] usb 8-1: USB disconnect, device number 6 03:09:16 executing program 3: linkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0xffffffffffffffff, 0x0, 0xa349906d5c6de20c) 03:09:16 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x46) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x1, 0x0, 0x44}}, 0xe8) sendmmsg(r0, 0x0, 0x0, 0x0) 03:09:16 executing program 2: openat$sw_sync_info(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) read$rfkill(r0, &(0x7f0000000340), 0x8) 03:09:16 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) dup2(0xffffffffffffffff, r0) 03:09:16 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x46) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x1, 0x0, 0x44}}, 0xe8) sendmmsg(r0, 0x0, 0x0, 0x0) 03:09:16 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) socket$rds(0x15, 0x5, 0x0) dup2(r0, 0xffffffffffffffff) 03:09:16 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000240), 0x4) 03:09:16 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$TIPC_NL_LINK_SET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000004c0)={0x28, r1, 0x1, 0x0, 0x0, {0x3}, [@TIPC_NLA_BEARER={0x14, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}]}]}, 0x28}}, 0x0) 03:09:17 executing program 2: memfd_create(&(0x7f0000000000)='-:^&]\'+%/4\x00', 0x2) 03:09:17 executing program 3: r0 = getpgrp(0x0) process_vm_writev(r0, &(0x7f0000002900)=[{&(0x7f0000001800)=""/4096, 0x1000}], 0x1, &(0x7f0000003ac0)=[{&(0x7f0000002940)=""/4096, 0x1000}], 0x1, 0x0) [ 322.648237][ T8427] tipc: Enabling of bearer rejected, failed to enable media 03:09:17 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) socket$rds(0x15, 0x5, 0x0) dup2(r0, 0xffffffffffffffff) 03:09:17 executing program 2: r0 = socket$inet(0x2, 0x3, 0x3) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000040)={'mangle\x00', 0x4, "ee780f45"}, &(0x7f0000000100)=0x28) 03:09:17 executing program 0: sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, 0x0, 0x0) [ 322.761252][ T1351] ieee802154 phy0 wpan0: encryption failed: -22 03:09:17 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)={0x2, 0xa, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_key={0x1, 0x8}, @sadb_key={0x1, 0x9}]}, 0x28}}, 0x0) 03:09:17 executing program 2: syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) syz_clone3(&(0x7f0000000180)={0x40000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 322.771317][ T1351] ieee802154 phy1 wpan1: encryption failed: -22 03:09:17 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) socket$rds(0x15, 0x5, 0x0) dup2(r0, 0xffffffffffffffff) 03:09:17 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@updpolicy={0xb8, 0x19, 0x401, 0x0, 0x0, {{@in6=@loopback={0x3}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x80}}}, 0xb8}}, 0x0) 03:09:17 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000fc0)=@mangle={'mangle\x00', 0x1f, 0x6, 0x408, 0xc0, 0x330, 0xc0, 0x330, 0xc0, 0x3f0, 0x3f0, 0x3f0, 0x3f0, 0x3f0, 0x6, 0x0, {[{{@ip={@broadcast, @local, 0x0, 0x0, 'veth1_to_batadv\x00', 'macvlan0\x00'}, 0x0, 0x98, 0xc0, 0x0, {}, [@common=@ttl={{0x28}}]}, @ECN={0x28}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @private, 0x0, 0x0, 'vxcan1\x00', 'veth0\x00'}, 0x0, 0xc0, 0xe8, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @TTL={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, 0x0, 0x0, 'veth1_virt_wifi\x00', 'macvtap0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE2={0x28}}, {{@ip={@broadcast, @multicast1, 0x0, 0x0, 'sit0\x00', 'bridge0\x00'}, 0x0, 0x70, 0x98}, @ECN={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x468) [ 322.895036][ T38] audit: type=1400 audit(1645240157.309:386): avc: denied { create } for pid=8446 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 03:09:17 executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$pppl2tp(0x18, 0x1, 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000100)={'vcan0\x00'}) socket$pppl2tp(0x18, 0x1, 0x1) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) connect$pppl2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r2, {0x2, 0x0, @dev}, 0x2}}, 0x2e) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, 0xffffffffffffffff, {0x2, 0x0, @dev}, 0x2, 0x0, 0x0, 0x2}}, 0x2e) 03:09:17 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@updpolicy={0xb8, 0x19, 0x401, 0x0, 0x0, {{@in6=@loopback={0x3}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x80}}}, 0xb8}}, 0x0) [ 323.027276][ T38] audit: type=1400 audit(1645240157.439:387): avc: denied { connect } for pid=8449 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 03:09:17 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) syz_clone3(&(0x7f0000000040)={0x20020e200, 0x0, 0x0, 0x0, {}, 0x0, 0xffffffffffffff43, 0x0, 0x0, 0x0, {r0}}, 0x58) [ 323.082194][ T38] audit: type=1400 audit(1645240157.479:388): avc: denied { connect } for pid=8449 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 03:09:17 executing program 2: syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) syz_clone3(&(0x7f0000000180)={0x40000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 323.119454][ T38] audit: type=1400 audit(1645240157.489:389): avc: denied { write } for pid=8453 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 323.165403][ T38] audit: type=1400 audit(1645240157.489:390): avc: denied { nlmsg_write } for pid=8453 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 03:09:17 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SNDCTL_DSP_POST(r0, 0x5008, 0x0) 03:09:17 executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$pppl2tp(0x18, 0x1, 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000100)={'vcan0\x00'}) socket$pppl2tp(0x18, 0x1, 0x1) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) connect$pppl2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r2, {0x2, 0x0, @dev}, 0x2}}, 0x2e) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, 0xffffffffffffffff, {0x2, 0x0, @dev}, 0x2, 0x0, 0x0, 0x2}}, 0x2e) 03:09:17 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_SIGNAL_INFO(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x10}, 0xec1}}, 0x0) 03:09:17 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000fc0)=@mangle={'mangle\x00', 0x1f, 0x6, 0x488, 0xc0, 0x330, 0xc0, 0x330, 0xc0, 0x3f0, 0x3f0, 0x3f0, 0x3f0, 0x3f0, 0x6, 0x0, {[{{@ip={@broadcast, @local, 0x0, 0x0, 'veth1_to_batadv\x00', 'macvlan0\x00'}, 0x0, 0x98, 0xc0, 0x0, {}, [@common=@ttl={{0x28}}]}, @ECN={0x28}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @private, 0x0, 0x0, 'vxcan1\x00', 'veth0\x00'}, 0x0, 0xc0, 0xe8, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @TTL={0x28}}, {{@uncond, 0x0, 0x98, 0xc0, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @ECN={0x28}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, 0x0, 0x0, 'veth1_virt_wifi\x00', 'macvtap0\x00'}, 0x0, 0xa0, 0xc8, 0x0, {}, [@common=@addrtype={{0x30}}]}, @common=@unspec=@NFQUEUE2={0x28}}, {{@ip={@broadcast, @multicast1, 0x0, 0x0, 'sit0\x00', 'bridge0\x00'}, 0x0, 0x98, 0xc0, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @ECN={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 323.328721][ T8466] x_tables: duplicate underflow at hook 1 03:09:17 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CAP_X86_BUS_LOCK_EXIT(r1, 0x4068aea3, &(0x7f0000000640)) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 03:09:17 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) open(0x0, 0x0, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='net_prio.prioidx\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[@ANYRES64, @ANYRESOCT, @ANYBLOB="9141dd287dfc7468514b9a726ef482959a76041c9cf5acd41d8bdcd213a025679af33c9f068b3f3c1d67ef82828dced13389"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x800001, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x339) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 03:09:17 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe1}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendto$inet(r0, &(0x7f00000012c0)="20088a927f1f6588b927481241ba7860686ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) 03:09:18 executing program 2: openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000d00), 0x0, 0x0) 03:09:18 executing program 1: r0 = memfd_secret(0x0) mmap$dsp(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) 03:09:18 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0x3, 0x3800, 0xff, 0x11}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000380)={r0, &(0x7f0000001440)="63d76254d92a187d4897c77ef850f778952547cb770cc96dc271c3e651ea442f83efb818c78b53d0862e1c095789732b9a2dfb65d8254f33b60779923228508375cf5a758def9a831eb2ee43961a056aa4a721dccdc8e03b5b140752d8f372f01ac890ba5460c73967f24ae81c3d0d96716608ac99793717d464fe793e1dc629f1e2a9ee2ad7f3205dbd668ec45b2cdc6f964246af3f7cf707f42b81beea0f96f4abdc2213036d50ce9c8cc81e7f0f2f8a57cc5d7cea5e044ebc577c04137d3bf210b6584f4f832280820e95f70416199bb7b44448afceeadce1580bfcad93e6", &(0x7f0000000340)=@udp6}, 0x20) 03:09:18 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010000000000ffffff7f00000000", @ANYRES32, @ANYBLOB="00000000000000001c001280"], 0x3c}}, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000000)=0x2) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000040)) 03:09:18 executing program 2: r0 = socket$inet(0x2, 0x3, 0x3) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000000)="b388d2187de00e1214936ef7f0f10fb3eb2eb114d232c68a2a36a204d533e6b95dfebd0417172325bb", 0x29) 03:09:18 executing program 1: socketpair(0x22, 0x0, 0x1004000, &(0x7f0000000040)) 03:09:18 executing program 1: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0xe43, 0x0) [ 323.814208][ T38] audit: type=1400 audit(1645240158.219:391): avc: denied { append } for pid=8493 comm="syz-executor.1" name="rtc0" dev="devtmpfs" ino=864 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 03:09:18 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) readlinkat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) r0 = geteuid() r1 = getegid() lchown(&(0x7f0000000080)='./file0\x00', r0, r1) 03:09:18 executing program 1: socketpair(0x15, 0x0, 0x0, &(0x7f0000000080)) 03:09:18 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe1}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendto$inet(r0, &(0x7f00000012c0)="20088a927f1f6588b927481241ba7860686ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) 03:09:18 executing program 3: openat$sw_sync_info(0xffffffffffffff9c, &(0x7f00000000c0), 0x20200, 0x0) 03:09:18 executing program 1: socket(0x1e, 0x0, 0x400) 03:09:18 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000004440)=@base={0x0, 0x0, 0x0, 0x0, 0x1906}, 0x48) 03:09:18 executing program 2: openat$audio(0xffffffffffffff9c, &(0x7f0000000000), 0x24000, 0x0) memfd_secret(0x0) 03:09:18 executing program 3: bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x10) 03:09:19 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000000)="8907040400", 0x5) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='veth1\x00', 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @broadcast}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040)=0xffffffffffffffff, 0x4) connect(r0, &(0x7f0000000200)=@nl=@unspec, 0x80) 03:09:19 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f00000009c0)=[{{&(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10, 0x0}}, {{&(0x7f0000000000)={0x2, 0x4e20, @empty}, 0x10, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="10000000000000000007"], 0x10}}], 0x2, 0x0) 03:09:19 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_SIGNAL_INFO(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x300}, 0x0) 03:09:19 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000000)="8907040400", 0x5) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='veth1\x00', 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @broadcast}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040)=0xffffffffffffffff, 0x4) connect(r0, &(0x7f0000000200)=@nl=@unspec, 0x80) 03:09:19 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000000)="8907040400", 0x5) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='veth1\x00', 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @broadcast}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040)=0xffffffffffffffff, 0x4) connect(r0, &(0x7f0000000200)=@nl=@unspec, 0x80) 03:09:19 executing program 3: socket$inet(0x2, 0x3, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) 03:09:19 executing program 1: bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000001a80), 0x10) 03:09:19 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r1, 0x0) mremap(&(0x7f000000d000/0x2000)=nil, 0xfffffffffffffe74, 0x1000, 0x3, &(0x7f0000007000/0x1000)=nil) 03:09:19 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, 0x0, 0x0) 03:09:19 executing program 1: syz_clone3(&(0x7f0000019340)={0x4000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 325.533661][ T38] audit: type=1804 audit(1645240159.939:392): pid=8533 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/syzkaller-testdir1336744605/syzkaller.HbFjRK/549/bus" dev="sda1" ino=1159 res=1 errno=0 [ 325.552232][ T8533] ------------[ cut here ]------------ [ 325.643566][ T8533] WARNING: CPU: 0 PID: 8533 at arch/x86/kvm/../../../virt/kvm/kvm_main.c:529 kvm_mmu_notifier_invalidate_range_start+0x97a/0xb20 [ 325.668879][ T8533] Modules linked in: 03:09:20 executing program 3: syz_clone3(&(0x7f0000000180)={0x101000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 325.678969][ T8533] CPU: 0 PID: 8533 Comm: syz-executor.2 Not tainted 5.17.0-rc4-syzkaller-00217-g7993e65fdd0f #0 [ 325.698204][ T8533] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014 03:09:20 executing program 0: pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RSTATu(r0, 0x0, 0x83) write$P9_RMKNOD(r0, &(0x7f0000000000)={0x14}, 0x14) [ 325.714791][ T8533] RIP: 0010:kvm_mmu_notifier_invalidate_range_start+0x97a/0xb20 [ 325.735092][ T8533] Code: 00 48 c7 c2 60 0c a2 89 be b9 01 00 00 48 c7 c7 40 0f a2 89 c6 05 cd 0e 76 0c 01 e8 7d e6 00 08 e9 73 ff ff ff e8 46 19 6f 00 <0f> 0b e9 88 fc ff ff e8 3a 19 6f 00 0f 0b e9 58 fc ff ff e8 2e 19 03:09:20 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_NEWTABLE={0x14}, @NFT_MSG_NEWSET={0x24, 0x9, 0xa, 0x0, 0x0, 0x0, {}, [@NFTA_SET_ID={0x8}, @NFTA_SET_KEY_LEN={0x8}]}], {0x14, 0x10}}, 0x60}}, 0x0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000240)={0x0, 0x3ff, 0x7}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text32={0x20, &(0x7f0000000100)="0f23250f01cf66b83d008ed064660f3a2066f500640f01c4660f6bea66b8ea008ee0b9800000c00f3235008000000f309adb9c52d181000f20d80f22d8", 0x3d}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000000)=0x2) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000040)) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 325.785493][ T8533] RSP: 0018:ffffc9000270f948 EFLAGS: 00010212 [ 325.795537][ T8533] RAX: 000000000000126f RBX: 000000002000d000 RCX: ffffc90002d42000 03:09:20 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$SOUND_MIXER_WRITE_RECSRC(r0, 0xc0044dff, &(0x7f00000001c0)=0x7) 03:09:20 executing program 3: bpf$LINK_GET_NEXT_ID(0x16, 0x0, 0x0) [ 325.819370][ T8533] RDX: 0000000000040000 RSI: ffffffff8108f9da RDI: 0000000000000003 [ 325.832915][ T8533] RBP: ffffc90003f5a290 R08: 000000002000d000 R09: ffffc90003f5a2e3 [ 325.850326][ T8533] R10: ffffffff8108f27c R11: 0000000000000001 R12: ffffc90003f63240 [ 325.864979][ T8533] R13: ffffc90003f59000 R14: ffffc9000270fc18 R15: 000000002000d000 [ 325.895066][ T8533] FS: 00007fbb9d50d700(0000) GS:ffff88802ca00000(0000) knlGS:0000000000000000 [ 325.907917][ T8533] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 325.918282][ T8533] CR2: 00007f32e7f0d028 CR3: 0000000066484000 CR4: 0000000000152ef0 [ 325.929828][ T8533] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 325.944837][ T8533] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 325.966901][ T8533] Call Trace: [ 325.972144][ T8533] [ 325.977462][ T8533] ? kvm_mmu_notifier_clear_flush_young+0x660/0x660 [ 325.987953][ T8533] ? lock_release+0x720/0x720 [ 325.996696][ T8533] ? kvm_mmu_notifier_clear_flush_young+0x660/0x660 [ 326.008204][ T8533] __mmu_notifier_invalidate_range_start+0x2ff/0x800 [ 326.019430][ T8533] move_page_tables+0x2642/0x2d20 [ 326.027500][ T8533] ? copy_vma+0x33c/0x830 [ 326.034196][ T8533] ? vma_to_resize+0x550/0x550 [ 326.044520][ T8533] ? validate_mm+0x355/0x800 [ 326.058040][ T8533] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 326.072484][ T8533] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 326.082904][ T8533] ? ksm_madvise+0x2d6/0x390 [ 326.090825][ T8533] move_vma+0x48c/0xf40 [ 326.097758][ T8533] ? move_page_tables+0x2d20/0x2d20 [ 326.107229][ T8533] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 326.117565][ T8533] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 326.127758][ T8533] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 326.137959][ T8533] ? security_mmap_addr+0x73/0x90 [ 326.146273][ T8533] __do_sys_mremap+0xf01/0x1560 [ 326.154012][ T8533] ? move_vma+0xf40/0xf40 [ 326.161260][ T8533] ? syscall_enter_from_user_mode+0x21/0x70 [ 326.171112][ T8533] do_syscall_64+0x35/0xb0 [ 326.180193][ T8533] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 326.189425][ T8533] RIP: 0033:0x7fbb9ebb9059 [ 326.196563][ T8533] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 326.228162][ T8533] RSP: 002b:00007fbb9d50d168 EFLAGS: 00000246 ORIG_RAX: 0000000000000019 [ 326.245900][ T8533] RAX: ffffffffffffffda RBX: 00007fbb9eccc030 RCX: 00007fbb9ebb9059 [ 326.258443][ T8533] RDX: 0000000000001000 RSI: fffffffffffffe74 RDI: 000000002000d000 [ 326.271985][ T8533] RBP: 00007fbb9ec1308d R08: 0000000020007000 R09: 0000000000000000 [ 326.284227][ T8533] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000000 [ 326.296493][ T8533] R13: 00007ffe48cecf1f R14: 00007fbb9d50d300 R15: 0000000000022000 [ 326.308810][ T8533] [ 326.313343][ T8533] Kernel panic - not syncing: panic_on_warn set ... [ 326.323191][ T8533] CPU: 0 PID: 8533 Comm: syz-executor.2 Not tainted 5.17.0-rc4-syzkaller-00217-g7993e65fdd0f #0 [ 326.338681][ T8533] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014 [ 326.352072][ T8533] Call Trace: [ 326.356893][ T8533] [ 326.361246][ T8533] dump_stack_lvl+0xcd/0x134 [ 326.368152][ T8533] panic+0x2b0/0x6dd [ 326.374560][ T8533] ? __warn_printk+0xf3/0xf3 [ 326.382342][ T8533] ? __warn.cold+0x1d1/0x2cf [ 326.389552][ T8533] ? kvm_mmu_notifier_invalidate_range_start+0x97a/0xb20 [ 326.400582][ T8533] __warn.cold+0x1ec/0x2cf [ 326.407526][ T8533] ? kvm_mmu_notifier_invalidate_range_start+0x97a/0xb20 [ 326.419132][ T8533] report_bug+0x1bd/0x210 [ 326.426108][ T8533] handle_bug+0x3c/0x60 [ 326.432678][ T8533] exc_invalid_op+0x14/0x40 [ 326.439783][ T8533] asm_exc_invalid_op+0x12/0x20 [ 326.447429][ T8533] RIP: 0010:kvm_mmu_notifier_invalidate_range_start+0x97a/0xb20 [ 326.459430][ T8533] Code: 00 48 c7 c2 60 0c a2 89 be b9 01 00 00 48 c7 c7 40 0f a2 89 c6 05 cd 0e 76 0c 01 e8 7d e6 00 08 e9 73 ff ff ff e8 46 19 6f 00 <0f> 0b e9 88 fc ff ff e8 3a 19 6f 00 0f 0b e9 58 fc ff ff e8 2e 19 [ 326.490480][ T8533] RSP: 0018:ffffc9000270f948 EFLAGS: 00010212 [ 326.499998][ T8533] RAX: 000000000000126f RBX: 000000002000d000 RCX: ffffc90002d42000 [ 326.512546][ T8533] RDX: 0000000000040000 RSI: ffffffff8108f9da RDI: 0000000000000003 [ 326.525055][ T8533] RBP: ffffc90003f5a290 R08: 000000002000d000 R09: ffffc90003f5a2e3 [ 326.537652][ T8533] R10: ffffffff8108f27c R11: 0000000000000001 R12: ffffc90003f63240 [ 326.550199][ T8533] R13: ffffc90003f59000 R14: ffffc9000270fc18 R15: 000000002000d000 [ 326.562689][ T8533] ? kvm_mmu_notifier_invalidate_range_start+0x21c/0xb20 [ 326.573790][ T8533] ? kvm_mmu_notifier_invalidate_range_start+0x97a/0xb20 [ 326.584901][ T8533] ? kvm_mmu_notifier_invalidate_range_start+0x97a/0xb20 [ 326.596025][ T8533] ? kvm_mmu_notifier_clear_flush_young+0x660/0x660 [ 326.606437][ T8533] ? lock_release+0x720/0x720 [ 326.614005][ T8533] ? kvm_mmu_notifier_clear_flush_young+0x660/0x660 [ 326.625389][ T8533] __mmu_notifier_invalidate_range_start+0x2ff/0x800 [ 326.636823][ T8533] move_page_tables+0x2642/0x2d20 [ 326.645560][ T8533] ? copy_vma+0x33c/0x830 [ 326.653030][ T8533] ? vma_to_resize+0x550/0x550 [ 326.661134][ T8533] ? validate_mm+0x355/0x800 [ 326.669016][ T8533] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 326.679046][ T8533] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 326.689720][ T8533] ? ksm_madvise+0x2d6/0x390 [ 326.700290][ T8533] move_vma+0x48c/0xf40 [ 326.705129][ T8533] ? move_page_tables+0x2d20/0x2d20 [ 326.725243][ T8533] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 326.732762][ T8533] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 326.752813][ T8533] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 326.761254][ T8533] ? security_mmap_addr+0x73/0x90 [ 326.769727][ T8533] __do_sys_mremap+0xf01/0x1560 [ 326.777757][ T8533] ? move_vma+0xf40/0xf40 [ 326.784906][ T8533] ? syscall_enter_from_user_mode+0x21/0x70 [ 326.793238][ T8533] do_syscall_64+0x35/0xb0 [ 326.800820][ T8533] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 326.811102][ T8533] RIP: 0033:0x7fbb9ebb9059 [ 326.817263][ T8533] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 326.838183][ T8533] RSP: 002b:00007fbb9d50d168 EFLAGS: 00000246 ORIG_RAX: 0000000000000019 [ 326.847793][ T8533] RAX: ffffffffffffffda RBX: 00007fbb9eccc030 RCX: 00007fbb9ebb9059 [ 326.861095][ T8533] RDX: 0000000000001000 RSI: fffffffffffffe74 RDI: 000000002000d000 [ 326.872917][ T8533] RBP: 00007fbb9ec1308d R08: 0000000020007000 R09: 0000000000000000 [ 326.883950][ T8533] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000000 [ 326.895413][ T8533] R13: 00007ffe48cecf1f R14: 00007fbb9d50d300 R15: 0000000000022000 [ 326.906142][ T8533] [ 326.912117][ T8533] Kernel Offset: disabled [ 326.919118][ T8533] Rebooting in 86400 seconds.. VM DIAGNOSIS: 03:09:20 Registers: info registers vcpu 0 RAX=000000000000002e RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff84432561 RDI=ffffffff907ec2e0 RBP=ffffffff907ec2a0 RSP=ffffc9000270f320 R8 =0000000000000000 R9 =0000000000000000 R10=ffffffff84432552 R11=000000000000001f R12=0000000000000000 R13=000000000000002e R14=ffffffff907ec2a0 R15=dffffc0000000000 RIP=ffffffff8443258a RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 ffffffff 00c00000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 ffffffff 00c00000 FS =0000 00007fbb9d50d700 ffffffff 00c00000 GS =0000 ffff88802ca00000 ffffffff 00c00000 LDT=0000 0000000000000000 ffffffff 00c00000 TR =0040 fffffe0000003000 00000067 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 0000ffff CR0=80050033 CR2=0000001b32d25000 CR3=0000000066484000 CR4=00152ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000fffe0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=ffffffffffffffffffffffffffffffff XMM02=00000000000000000000000000000000 XMM03=00000000000000000000000000000000 XMM04=000000000000000000000000000000ff XMM05=00000000000000000000000000000000 XMM06=0000000000000000000000524f525245 XMM07=00000000000000000000000000000000 XMM08=000000000000000000524f5252450040 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=0000000000000005 RBX=ffff888067ea4c48 RCX=0000000000000001 RDX=0000000000000000 RSI=ffffffff8bb817a0 RDI=ffff888067ea4c48 RBP=ffffffff8bb817a0 RSP=ffffc900029efa20 R8 =0000000000000000 R9 =ffffffff8d93cfd7 R10=fffffbfff1b279fa R11=0000000000000000 R12=ffff888067ea41c0 R13=ffff888067ea4c20 R14=00000000ffffffff R15=ffff888067ea4c48 RIP=ffffffff894da9be RFL=00000087 [--S--PC] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 ffffffff 00c00000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 ffffffff 00c00000 FS =0000 0000000000000000 ffffffff 00c00000 GS =0000 ffff88802cb00000 ffffffff 00c00000 LDT=0000 0000000000000000 00000000 00000000 TR =0040 fffffe000004a000 00000067 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 0000ffff CR0=80050033 CR2=0000000000000000 CR3=0000000021579000 CR4=00152ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000fffe0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=0a0a0a0a0a0a0a0a0a0a0a0a0a0a0a0a XMM01=00000000000000000000000000000000 XMM02=00000000000000000000000000000000 XMM03=696669746f6e5f756d6d5f6d766b2039 XMM04=735f65676e61725f65746164696c6176 XMM05=6d766b203932353a632e6e69616d5f6d XMM06=2e2f2e2e2f6d766b2f3638782f686372 XMM07=203a555043203a474e494e524157205d XMM08=656c75646f4d205d3333353854205b5d XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 2 RAX=0000000000000046 RBX=0000000000000004 RCX=0000000000000001 RDX=0000000000000000 RSI=0000000000000001 RDI=0000000000000000 RBP=ffffffff8bb817a0 RSP=ffffc900029cfa88 R8 =0000000000000000 R9 =ffffffff8d93cfd7 R10=fffffbfff1b279fa R11=0000000000000000 R12=ffff888067cd6140 R13=0000000000000000 R14=00000000ffffffff R15=ffff888067cd6c18 RIP=ffffffff894dab60 RFL=00000046 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 ffffffff 00c00000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 ffffffff 00c00000 FS =0000 0000000000000000 ffffffff 00c00000 GS =0000 ffff88802cc00000 ffffffff 00c00000 LDT=0000 0000000000000000 00000000 00000000 TR =0040 fffffe0000091000 00000067 00008b00 DPL=0 TSS64-busy GDT= fffffe000008f000 0000007f IDT= fffffe0000000000 0000ffff CR0=80050033 CR2=00007f152a17c028 CR3=0000000021645000 CR4=00152ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000fffe0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000000 XMM02=00ff000000000000000000000000ff00 XMM03=00000000000000000000000000ff0000 XMM04=2e726f7475636578652d7a7973223d6d XMM05=00000000000000000000000000ff0000 XMM06=2e656f7461632072632d5f6469000a30 XMM07=203a555043203a474e494e524157205d XMM08=2500656c6f736e6f632f7665642f000a XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 3 RAX=0000000000000000 RBX=ffffea00018ed080 RCX=0000000000000000 RDX=ffff888016310200 RSI=ffffffff81ad684e RDI=0000000000000003 RBP=ffffea00018ed080 RSP=ffffc90000e27760 R8 =0000000000000000 R9 =0000000000000000 R10=ffffffff81ad6840 R11=0000000000000000 R12=ffffea00018ed088 R13=ffff88806ccd13b0 R14=dffffc0000000000 R15=00007f32e7277000 RIP=ffffffff81781320 RFL=00000293 [--S-A-C] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 ffffffff 00c00000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 ffffffff 00c00000 FS =0000 0000000000000000 ffffffff 00c00000 GS =0000 ffff88802cd00000 ffffffff 00c00000 LDT=0000 0000000000000000 00000000 00000000 TR =0040 fffffe00000d8000 00000067 00008b00 DPL=0 TSS64-busy GDT= fffffe00000d6000 0000007f IDT= fffffe0000000000 0000ffff CR0=80050033 CR2=00007f152a580000 CR3=0000000064f8a000 CR4=00152ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000fffe0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=ffffffffffffffffffffffffffffffff XMM02=00000000000000000000000000000000 XMM03=00000000000000000000000000000000 XMM04=000000000000000000000000000000ff XMM05=00000000000000000000000000000000 XMM06=0000000000000000000000524f525245 XMM07=00000000000000000000000000000000 XMM08=000000000000000000524f5252450040 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000