[ 5.928211][ T1477] 8021q: adding VLAN 0 to HW filter on device bond0 [ 5.930230][ T1477] eql: remember to turn off Van-Jacobson compression on your slave devices Starting sshd: OK syzkaller syzkaller login: [ 13.900628][ T24] kauditd_printk_skb: 38 callbacks suppressed [ 13.900641][ T24] audit: type=1400 audit(1652045758.821:72): avc: denied { transition } for pid=1638 comm="sshd" path="/bin/sh" dev="sda1" ino=73 scontext=system_u:system_r:initrc_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 13.904711][ T24] audit: type=1400 audit(1652045758.821:73): avc: denied { write } for pid=1638 comm="sh" path="pipe:[14935]" dev="pipefs" ino=14935 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:initrc_t tclass=fifo_file permissive=1 Warning: Permanently added '10.128.0.39' (ECDSA) to the list of known hosts. 2022/05/08 21:36:05 fuzzer started 2022/05/08 21:36:05 dialing manager at 10.128.0.163:41047 [ 20.554525][ T24] audit: type=1400 audit(1652045765.471:74): avc: denied { mounton } for pid=1807 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1136 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 20.555340][ T1807] cgroup: Unknown subsys name 'net' [ 20.577358][ T24] audit: type=1400 audit(1652045765.471:75): avc: denied { mount } for pid=1807 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 20.604581][ T24] audit: type=1400 audit(1652045765.501:76): avc: denied { unmount } for pid=1807 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 20.709694][ T1807] cgroup: Unknown subsys name 'rlimit' 2022/05/08 21:36:05 syscalls: 2727 2022/05/08 21:36:05 code coverage: enabled 2022/05/08 21:36:05 comparison tracing: enabled 2022/05/08 21:36:05 extra coverage: enabled 2022/05/08 21:36:05 delay kcov mmap: enabled 2022/05/08 21:36:05 setuid sandbox: enabled 2022/05/08 21:36:05 namespace sandbox: enabled 2022/05/08 21:36:05 Android sandbox: enabled 2022/05/08 21:36:05 fault injection: enabled 2022/05/08 21:36:05 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2022/05/08 21:36:05 net packet injection: enabled 2022/05/08 21:36:05 net device setup: enabled 2022/05/08 21:36:05 concurrency sanitizer: enabled 2022/05/08 21:36:05 devlink PCI setup: PCI device 0000:00:10.0 is not available 2022/05/08 21:36:05 USB emulation: /dev/raw-gadget does not exist 2022/05/08 21:36:05 hci packet injection: /dev/vhci does not exist 2022/05/08 21:36:05 wifi device emulation: /sys/class/mac80211_hwsim/ does not exist 2022/05/08 21:36:05 802.15.4 emulation: enabled [ 20.830688][ T24] audit: type=1400 audit(1652045765.751:77): avc: denied { mounton } for pid=1807 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 20.855524][ T24] audit: type=1400 audit(1652045765.751:78): avc: denied { mount } for pid=1807 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 20.878728][ T24] audit: type=1400 audit(1652045765.751:79): avc: denied { create } for pid=1807 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 20.899131][ T24] audit: type=1400 audit(1652045765.751:80): avc: denied { write } for pid=1807 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 20.919800][ T24] audit: type=1400 audit(1652045765.761:81): avc: denied { read } for pid=1807 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 2022/05/08 21:36:06 suppressing KCSAN reports in functions: 'prandom_seed' 'dd_has_work' 'd_delete' 'dont_mount' 'ext4_dio_write_end_io' '__xa_clear_mark' 'pcpu_alloc' 'blk_mq_sched_dispatch_requests' 'tick_sched_timer' 'do_sys_poll' 'can_receive' 'generic_write_end' 'ext4_fill_raw_inode' 2022/05/08 21:36:06 fetching corpus: 0, signal 0/2000 (executing program) 2022/05/08 21:36:06 fetching corpus: 50, signal 17993/21527 (executing program) 2022/05/08 21:36:07 fetching corpus: 100, signal 25607/30676 (executing program) 2022/05/08 21:36:07 fetching corpus: 150, signal 30788/37280 (executing program) 2022/05/08 21:36:07 fetching corpus: 200, signal 34327/42260 (executing program) 2022/05/08 21:36:07 fetching corpus: 250, signal 38856/48029 (executing program) 2022/05/08 21:36:07 fetching corpus: 300, signal 42412/52839 (executing program) 2022/05/08 21:36:07 fetching corpus: 350, signal 45432/57030 (executing program) 2022/05/08 21:36:07 fetching corpus: 400, signal 49145/61770 (executing program) 2022/05/08 21:36:07 fetching corpus: 450, signal 51763/65464 (executing program) 2022/05/08 21:36:07 fetching corpus: 500, signal 54206/68950 (executing program) 2022/05/08 21:36:07 fetching corpus: 550, signal 56920/72568 (executing program) 2022/05/08 21:36:07 fetching corpus: 600, signal 59421/75982 (executing program) 2022/05/08 21:36:07 fetching corpus: 650, signal 65125/81995 (executing program) 2022/05/08 21:36:07 fetching corpus: 700, signal 67043/84773 (executing program) 2022/05/08 21:36:07 fetching corpus: 749, signal 68779/87322 (executing program) 2022/05/08 21:36:07 fetching corpus: 799, signal 70301/89693 (executing program) 2022/05/08 21:36:08 fetching corpus: 849, signal 71749/91941 (executing program) 2022/05/08 21:36:08 fetching corpus: 899, signal 73548/94448 (executing program) 2022/05/08 21:36:08 fetching corpus: 949, signal 75939/97448 (executing program) 2022/05/08 21:36:08 fetching corpus: 999, signal 77354/99559 (executing program) 2022/05/08 21:36:08 fetching corpus: 1049, signal 79844/102397 (executing program) 2022/05/08 21:36:08 fetching corpus: 1099, signal 81066/104254 (executing program) 2022/05/08 21:36:08 fetching corpus: 1149, signal 82487/106294 (executing program) 2022/05/08 21:36:08 fetching corpus: 1199, signal 83738/108171 (executing program) 2022/05/08 21:36:08 fetching corpus: 1249, signal 84910/109994 (executing program) 2022/05/08 21:36:08 fetching corpus: 1299, signal 86277/111882 (executing program) 2022/05/08 21:36:08 fetching corpus: 1349, signal 87659/113715 (executing program) 2022/05/08 21:36:08 fetching corpus: 1399, signal 88875/115406 (executing program) 2022/05/08 21:36:08 fetching corpus: 1449, signal 90241/117186 (executing program) 2022/05/08 21:36:09 fetching corpus: 1499, signal 91250/118694 (executing program) 2022/05/08 21:36:09 fetching corpus: 1549, signal 92756/120460 (executing program) 2022/05/08 21:36:09 fetching corpus: 1599, signal 94581/122366 (executing program) 2022/05/08 21:36:09 fetching corpus: 1649, signal 95704/123873 (executing program) 2022/05/08 21:36:09 fetching corpus: 1699, signal 97029/125426 (executing program) 2022/05/08 21:36:09 fetching corpus: 1749, signal 98614/127092 (executing program) 2022/05/08 21:36:09 fetching corpus: 1799, signal 100393/128877 (executing program) 2022/05/08 21:36:09 fetching corpus: 1849, signal 101335/130170 (executing program) 2022/05/08 21:36:09 fetching corpus: 1899, signal 102471/131489 (executing program) 2022/05/08 21:36:09 fetching corpus: 1949, signal 103504/132727 (executing program) 2022/05/08 21:36:09 fetching corpus: 1999, signal 104280/133858 (executing program) 2022/05/08 21:36:09 fetching corpus: 2049, signal 105037/134904 (executing program) 2022/05/08 21:36:09 fetching corpus: 2099, signal 105868/136047 (executing program) 2022/05/08 21:36:10 fetching corpus: 2149, signal 108326/137822 (executing program) 2022/05/08 21:36:10 fetching corpus: 2199, signal 109172/138882 (executing program) 2022/05/08 21:36:10 fetching corpus: 2248, signal 110517/140180 (executing program) 2022/05/08 21:36:10 fetching corpus: 2298, signal 111326/141189 (executing program) 2022/05/08 21:36:10 fetching corpus: 2348, signal 112364/142196 (executing program) 2022/05/08 21:36:10 fetching corpus: 2398, signal 113917/143385 (executing program) 2022/05/08 21:36:10 fetching corpus: 2448, signal 114809/144296 (executing program) 2022/05/08 21:36:10 fetching corpus: 2498, signal 115708/145167 (executing program) 2022/05/08 21:36:10 fetching corpus: 2548, signal 116529/146012 (executing program) 2022/05/08 21:36:10 fetching corpus: 2598, signal 117315/146798 (executing program) 2022/05/08 21:36:10 fetching corpus: 2648, signal 118257/147634 (executing program) 2022/05/08 21:36:10 fetching corpus: 2698, signal 119070/148455 (executing program) 2022/05/08 21:36:10 fetching corpus: 2747, signal 120171/149304 (executing program) 2022/05/08 21:36:11 fetching corpus: 2797, signal 121084/150139 (executing program) 2022/05/08 21:36:11 fetching corpus: 2847, signal 122282/151015 (executing program) 2022/05/08 21:36:11 fetching corpus: 2897, signal 123007/151711 (executing program) 2022/05/08 21:36:11 fetching corpus: 2946, signal 123999/152439 (executing program) 2022/05/08 21:36:11 fetching corpus: 2996, signal 125085/153172 (executing program) 2022/05/08 21:36:11 fetching corpus: 3046, signal 125616/153744 (executing program) 2022/05/08 21:36:11 fetching corpus: 3095, signal 126735/154403 (executing program) 2022/05/08 21:36:11 fetching corpus: 3145, signal 127361/154945 (executing program) 2022/05/08 21:36:11 fetching corpus: 3195, signal 128208/155542 (executing program) 2022/05/08 21:36:11 fetching corpus: 3243, signal 128706/156035 (executing program) 2022/05/08 21:36:11 fetching corpus: 3293, signal 129947/156656 (executing program) 2022/05/08 21:36:11 fetching corpus: 3343, signal 130847/157184 (executing program) 2022/05/08 21:36:11 fetching corpus: 3393, signal 131742/157696 (executing program) 2022/05/08 21:36:12 fetching corpus: 3443, signal 132752/158185 (executing program) 2022/05/08 21:36:12 fetching corpus: 3493, signal 133277/158610 (executing program) 2022/05/08 21:36:12 fetching corpus: 3543, signal 133946/159049 (executing program) 2022/05/08 21:36:12 fetching corpus: 3593, signal 134630/159477 (executing program) 2022/05/08 21:36:12 fetching corpus: 3643, signal 135055/159840 (executing program) 2022/05/08 21:36:12 fetching corpus: 3693, signal 135717/160226 (executing program) 2022/05/08 21:36:12 fetching corpus: 3743, signal 136259/160596 (executing program) 2022/05/08 21:36:12 fetching corpus: 3793, signal 137114/160940 (executing program) 2022/05/08 21:36:12 fetching corpus: 3843, signal 137962/161303 (executing program) 2022/05/08 21:36:12 fetching corpus: 3893, signal 138444/161582 (executing program) 2022/05/08 21:36:12 fetching corpus: 3943, signal 139006/161901 (executing program) 2022/05/08 21:36:12 fetching corpus: 3993, signal 139964/161923 (executing program) 2022/05/08 21:36:13 fetching corpus: 4043, signal 140415/161926 (executing program) 2022/05/08 21:36:13 fetching corpus: 4093, signal 141328/161926 (executing program) 2022/05/08 21:36:13 fetching corpus: 4143, signal 142323/161926 (executing program) 2022/05/08 21:36:13 fetching corpus: 4193, signal 143171/161931 (executing program) 2022/05/08 21:36:13 fetching corpus: 4243, signal 143825/161943 (executing program) 2022/05/08 21:36:13 fetching corpus: 4293, signal 144165/161943 (executing program) 2022/05/08 21:36:13 fetching corpus: 4343, signal 144918/161945 (executing program) 2022/05/08 21:36:13 fetching corpus: 4393, signal 145551/161973 (executing program) 2022/05/08 21:36:13 fetching corpus: 4443, signal 146063/161973 (executing program) 2022/05/08 21:36:13 fetching corpus: 4493, signal 147074/161980 (executing program) 2022/05/08 21:36:13 fetching corpus: 4543, signal 147504/161980 (executing program) 2022/05/08 21:36:13 fetching corpus: 4593, signal 148099/161980 (executing program) 2022/05/08 21:36:13 fetching corpus: 4643, signal 148489/161980 (executing program) 2022/05/08 21:36:13 fetching corpus: 4693, signal 149058/161980 (executing program) 2022/05/08 21:36:13 fetching corpus: 4743, signal 149465/161980 (executing program) 2022/05/08 21:36:14 fetching corpus: 4793, signal 149836/161980 (executing program) 2022/05/08 21:36:14 fetching corpus: 4843, signal 150333/161980 (executing program) 2022/05/08 21:36:14 fetching corpus: 4893, signal 150952/161980 (executing program) 2022/05/08 21:36:14 fetching corpus: 4943, signal 151532/161980 (executing program) 2022/05/08 21:36:14 fetching corpus: 4992, signal 152329/161981 (executing program) 2022/05/08 21:36:14 fetching corpus: 5040, signal 152811/161987 (executing program) 2022/05/08 21:36:14 fetching corpus: 5090, signal 153273/161987 (executing program) 2022/05/08 21:36:14 fetching corpus: 5140, signal 153724/161989 (executing program) 2022/05/08 21:36:14 fetching corpus: 5190, signal 154283/161989 (executing program) 2022/05/08 21:36:14 fetching corpus: 5240, signal 154827/161989 (executing program) 2022/05/08 21:36:14 fetching corpus: 5290, signal 155391/161989 (executing program) 2022/05/08 21:36:14 fetching corpus: 5340, signal 156042/161989 (executing program) 2022/05/08 21:36:15 fetching corpus: 5390, signal 156653/161995 (executing program) 2022/05/08 21:36:15 fetching corpus: 5440, signal 157138/161995 (executing program) 2022/05/08 21:36:15 fetching corpus: 5489, signal 157501/161999 (executing program) 2022/05/08 21:36:15 fetching corpus: 5537, signal 158039/162045 (executing program) 2022/05/08 21:36:15 fetching corpus: 5587, signal 158591/162045 (executing program) 2022/05/08 21:36:15 fetching corpus: 5637, signal 159058/162058 (executing program) 2022/05/08 21:36:15 fetching corpus: 5685, signal 159421/162058 (executing program) 2022/05/08 21:36:15 fetching corpus: 5685, signal 159421/162058 (executing program) 2022/05/08 21:36:17 starting 6 fuzzer processes 21:36:17 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x0, 0x0) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0x15) shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(0x0, &(0x7f0000000000/0x13000)=nil, 0x4000) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x17ab6, &(0x7f0000000080)={&(0x7f0000000180)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @veth={{0x9}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_NET_NS_PID={0x8, 0x13, r1}]}, 0x3c}}, 0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000004140)={{0x3}, 0x0, 0x5c6, 0x80000000000008b, 0x7fff, r1, 0x0, 0x7}) r2 = shmget$private(0x0, 0xb000, 0x100, &(0x7f0000182000/0xb000)=nil) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f00000000c0)=0xc) r4 = getpgrp(r1) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000100)={{0x3, 0xee00, 0xee00, r3, 0x0, 0x0, 0x1}, 0x2702, 0xffffffffffffffff, 0xb4, 0x2, r4, r1, 0x7}) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f00000041c0)='./file0\x00', 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000306000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000116000/0x1000)=nil) 21:36:17 executing program 2: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = socket$netlink(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000080)={'wg2\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000140)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl1\x00', r2, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @loopback={0xff00000000000000, 0x460c6}}}) 21:36:17 executing program 5: r0 = eventfd2(0x0, 0x0) read$eventfd(r0, &(0x7f0000000040), 0x8) write$eventfd(r0, &(0x7f0000000000), 0x8) 21:36:17 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = dup2(r3, r0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@bridge_setlink={0x24, 0x11, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@IFLA_AF_SPEC={0x4}]}, 0x24}}, 0x0) 21:36:17 executing program 4: unshare(0x40400) r0 = syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) connect(r0, &(0x7f0000000240)=@ieee802154, 0x2) 21:36:17 executing program 1: setresgid(0xee01, 0x0, 0xee00) setreuid(0xffffffffffffffff, 0xee00) r0 = getgid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setresgid(r1, r0, 0x0) setresgid(0x0, 0xffffffffffffffff, 0x0) [ 32.146148][ T24] audit: type=1400 audit(1652045777.061:82): avc: denied { execmem } for pid=1815 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 32.203315][ T24] audit: type=1400 audit(1652045777.081:83): avc: denied { read } for pid=1818 comm="syz-executor.2" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 32.224698][ T24] audit: type=1400 audit(1652045777.081:84): avc: denied { open } for pid=1818 comm="syz-executor.2" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 32.248080][ T24] audit: type=1400 audit(1652045777.081:85): avc: denied { mounton } for pid=1818 comm="syz-executor.2" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 32.269545][ T24] audit: type=1400 audit(1652045777.081:86): avc: denied { module_request } for pid=1818 comm="syz-executor.2" kmod="netdev-nr2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 32.291420][ T24] audit: type=1400 audit(1652045777.091:87): avc: denied { sys_module } for pid=1818 comm="syz-executor.2" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 32.431135][ T1818] chnl_net:caif_netlink_parms(): no params data found [ 32.515350][ T1818] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.522430][ T1818] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.530187][ T1818] device bridge_slave_0 entered promiscuous mode [ 32.538123][ T1818] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.545216][ T1818] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.552735][ T1818] device bridge_slave_1 entered promiscuous mode [ 32.592784][ T1818] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 32.604109][ T1818] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 32.628145][ T1818] team0: Port device team_slave_0 added [ 32.635985][ T1818] team0: Port device team_slave_1 added [ 32.674675][ T1818] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 32.681692][ T1818] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 32.707576][ T1818] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 32.720116][ T1818] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 32.727041][ T1818] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 32.752994][ T1818] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 32.794689][ T1832] chnl_net:caif_netlink_parms(): no params data found [ 32.834668][ T1818] device hsr_slave_0 entered promiscuous mode [ 32.841247][ T1818] device hsr_slave_1 entered promiscuous mode [ 32.890705][ T1835] chnl_net:caif_netlink_parms(): no params data found [ 32.904752][ T1830] chnl_net:caif_netlink_parms(): no params data found [ 32.963144][ T1832] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.970348][ T1832] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.977944][ T1832] device bridge_slave_0 entered promiscuous mode [ 33.004883][ T1832] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.011962][ T1832] bridge0: port 2(bridge_slave_1) entered disabled state [ 33.019548][ T1832] device bridge_slave_1 entered promiscuous mode [ 33.038139][ T1845] chnl_net:caif_netlink_parms(): no params data found [ 33.069407][ T1851] chnl_net:caif_netlink_parms(): no params data found [ 33.082488][ T1832] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 33.097556][ T1835] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.104773][ T1835] bridge0: port 1(bridge_slave_0) entered disabled state [ 33.112341][ T1835] device bridge_slave_0 entered promiscuous mode [ 33.124251][ T1832] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 33.141478][ T1835] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.148559][ T1835] bridge0: port 2(bridge_slave_1) entered disabled state [ 33.156399][ T1835] device bridge_slave_1 entered promiscuous mode [ 33.177637][ T1830] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.184736][ T1830] bridge0: port 1(bridge_slave_0) entered disabled state [ 33.192147][ T1830] device bridge_slave_0 entered promiscuous mode [ 33.209284][ T1832] team0: Port device team_slave_0 added [ 33.214935][ T1830] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.222058][ T1830] bridge0: port 2(bridge_slave_1) entered disabled state [ 33.229756][ T1830] device bridge_slave_1 entered promiscuous mode [ 33.245113][ T1835] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 33.256804][ T1832] team0: Port device team_slave_1 added [ 33.286735][ T1835] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 33.300169][ T1832] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 33.307106][ T1832] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 33.333087][ T1832] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 33.347118][ T1830] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 33.376000][ T1832] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 33.383001][ T1832] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 33.408900][ T1832] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 33.422738][ T1830] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 33.431886][ T1845] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.438941][ T1845] bridge0: port 1(bridge_slave_0) entered disabled state [ 33.446445][ T1845] device bridge_slave_0 entered promiscuous mode [ 33.453790][ T1835] team0: Port device team_slave_0 added [ 33.460607][ T1835] team0: Port device team_slave_1 added [ 33.466530][ T1851] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.473602][ T1851] bridge0: port 1(bridge_slave_0) entered disabled state [ 33.481163][ T1851] device bridge_slave_0 entered promiscuous mode [ 33.488757][ T1818] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 33.497298][ T1818] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 33.509795][ T1845] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.516822][ T1845] bridge0: port 2(bridge_slave_1) entered disabled state [ 33.525824][ T1845] device bridge_slave_1 entered promiscuous mode [ 33.540149][ T1851] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.547366][ T1851] bridge0: port 2(bridge_slave_1) entered disabled state [ 33.554839][ T1851] device bridge_slave_1 entered promiscuous mode [ 33.573656][ T1818] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 33.599053][ T1832] device hsr_slave_0 entered promiscuous mode [ 33.605399][ T1832] device hsr_slave_1 entered promiscuous mode [ 33.611840][ T1832] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 33.619391][ T1832] Cannot create hsr debugfs directory [ 33.624863][ T1818] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 33.633615][ T1830] team0: Port device team_slave_0 added [ 33.643775][ T1845] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 33.653113][ T1835] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 33.660060][ T1835] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 33.685990][ T1835] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 33.697774][ T1851] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 33.708022][ T1830] team0: Port device team_slave_1 added [ 33.714367][ T1845] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 33.727691][ T1835] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 33.734628][ T1835] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 33.760586][ T1835] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 33.772163][ T1851] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 33.804551][ T1845] team0: Port device team_slave_0 added [ 33.811066][ T1845] team0: Port device team_slave_1 added [ 33.822979][ T1851] team0: Port device team_slave_0 added [ 33.828796][ T1830] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 33.835713][ T1830] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 33.861677][ T1830] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 33.885296][ T1851] team0: Port device team_slave_1 added [ 33.893514][ T1830] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 33.900539][ T1830] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 33.926429][ T1830] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 33.943599][ T1835] device hsr_slave_0 entered promiscuous mode [ 33.950111][ T1835] device hsr_slave_1 entered promiscuous mode [ 33.956320][ T1835] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 33.963882][ T1835] Cannot create hsr debugfs directory [ 33.981651][ T1845] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 33.988606][ T1845] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 34.014511][ T1845] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 34.025943][ T1845] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 34.032891][ T1845] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 34.058773][ T1845] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 34.074750][ T1851] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 34.081701][ T1851] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 34.107569][ T1851] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 34.126193][ T1830] device hsr_slave_0 entered promiscuous mode [ 34.132872][ T1830] device hsr_slave_1 entered promiscuous mode [ 34.139544][ T1830] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 34.147136][ T1830] Cannot create hsr debugfs directory [ 34.155674][ T1851] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 34.162802][ T1851] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 34.188677][ T1851] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 34.226756][ T1845] device hsr_slave_0 entered promiscuous mode [ 34.233271][ T1845] device hsr_slave_1 entered promiscuous mode [ 34.239749][ T1845] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 34.247324][ T1845] Cannot create hsr debugfs directory [ 34.271474][ T1851] device hsr_slave_0 entered promiscuous mode [ 34.277861][ T1851] device hsr_slave_1 entered promiscuous mode [ 34.284413][ T1851] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 34.291965][ T1851] Cannot create hsr debugfs directory [ 34.323033][ T1832] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 34.344232][ T1832] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 34.353030][ T1832] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 34.361530][ T1832] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 34.396361][ T1818] 8021q: adding VLAN 0 to HW filter on device bond0 [ 34.429107][ T1835] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 34.443515][ T1835] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 34.458556][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 34.466139][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 34.474890][ T1818] 8021q: adding VLAN 0 to HW filter on device team0 [ 34.485539][ T1835] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 34.496192][ T1830] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 34.503196][ T24] audit: type=1400 audit(1652045779.421:88): avc: denied { remove_name } for pid=1422 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 34.525821][ T24] audit: type=1400 audit(1652045779.421:89): avc: denied { rename } for pid=1422 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 34.539983][ T1835] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 34.565866][ T1832] 8021q: adding VLAN 0 to HW filter on device bond0 [ 34.574767][ T1830] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 34.586132][ T1830] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 34.594830][ T1851] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 34.603123][ T1851] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 34.611711][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 34.620257][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 34.628592][ T1914] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.635614][ T1914] bridge0: port 1(bridge_slave_0) entered forwarding state [ 34.643296][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 34.651781][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 34.660038][ T1914] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.667216][ T1914] bridge0: port 2(bridge_slave_1) entered forwarding state [ 34.681504][ T1830] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 34.698768][ T1851] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 34.709405][ T1832] 8021q: adding VLAN 0 to HW filter on device team0 [ 34.716457][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 34.724519][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 34.733184][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 34.741690][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 34.749951][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 34.758419][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 34.765902][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 34.773672][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 34.788938][ T1851] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 34.800210][ T1808] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 34.808678][ T1808] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 34.817287][ T1808] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 34.825823][ T1808] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 34.834131][ T1808] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.841163][ T1808] bridge0: port 1(bridge_slave_0) entered forwarding state [ 34.848924][ T1808] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 34.857298][ T1808] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 34.865654][ T1808] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.872769][ T1808] bridge0: port 2(bridge_slave_1) entered forwarding state [ 34.887319][ T1818] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 34.897684][ T1818] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 34.922250][ T1904] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 34.930305][ T1904] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 34.939531][ T1904] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 34.947823][ T1904] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 34.956025][ T1904] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 34.964057][ T1904] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 34.972864][ T1904] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 34.982128][ T1904] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 34.990577][ T1845] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 34.999789][ T1845] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 35.012663][ T1832] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 35.023123][ T1832] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 35.034279][ T1808] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 35.043843][ T1808] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 35.052757][ T1808] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 35.061158][ T1808] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 35.070042][ T1808] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 35.078342][ T1808] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 35.086929][ T1808] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 35.095212][ T1808] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 35.109128][ T1818] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 35.122514][ T1845] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 35.135568][ T1832] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 35.149270][ T1808] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 35.157172][ T1808] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 35.164954][ T1808] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 35.172368][ T1808] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 35.179895][ T1808] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 35.187296][ T1808] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 35.199846][ T1845] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 35.223254][ T1835] 8021q: adding VLAN 0 to HW filter on device bond0 [ 35.234232][ T1830] 8021q: adding VLAN 0 to HW filter on device bond0 [ 35.257543][ T1851] 8021q: adding VLAN 0 to HW filter on device bond0 [ 35.268176][ T1835] 8021q: adding VLAN 0 to HW filter on device team0 [ 35.275423][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 35.284188][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 35.302853][ T1851] 8021q: adding VLAN 0 to HW filter on device team0 [ 35.320996][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 35.331217][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 35.340688][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 35.348342][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 35.356073][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 35.364676][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 35.373095][ T1913] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.380124][ T1913] bridge0: port 1(bridge_slave_0) entered forwarding state [ 35.387689][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 35.396439][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 35.404853][ T1913] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.411947][ T1913] bridge0: port 2(bridge_slave_1) entered forwarding state [ 35.419734][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 35.428380][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 35.436961][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 35.445277][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 35.453747][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 35.462466][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 35.470958][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 35.479434][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 35.487830][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 35.496152][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 35.517285][ T1845] 8021q: adding VLAN 0 to HW filter on device bond0 [ 35.524783][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 35.532845][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 35.540785][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 35.549381][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 35.557699][ T1917] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.564804][ T1917] bridge0: port 1(bridge_slave_0) entered forwarding state [ 35.573391][ T1830] 8021q: adding VLAN 0 to HW filter on device team0 [ 35.591528][ T1835] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 35.602726][ T1835] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 35.613220][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 35.621128][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 35.629654][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 35.637853][ T1908] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.644958][ T1908] bridge0: port 2(bridge_slave_1) entered forwarding state [ 35.652671][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 35.661292][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 35.670223][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 35.678647][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 35.687146][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 35.695467][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 35.704056][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 35.712452][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 35.720535][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 35.728791][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 35.739006][ T1851] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 35.749883][ T1851] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 35.760737][ T1845] 8021q: adding VLAN 0 to HW filter on device team0 [ 35.773472][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 35.782106][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 35.790518][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 35.799575][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 35.807964][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 35.816383][ T1908] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.823466][ T1908] bridge0: port 1(bridge_slave_0) entered forwarding state [ 35.831114][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 35.838712][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 35.846389][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 35.853807][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 35.861285][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 35.869816][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 35.878108][ T1908] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.885182][ T1908] bridge0: port 2(bridge_slave_1) entered forwarding state [ 35.900608][ T1851] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 35.908574][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 35.916468][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 35.923937][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 35.931313][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 35.958160][ T1835] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 35.967443][ T1904] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 35.977186][ T1904] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 35.985546][ T1904] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.992582][ T1904] bridge0: port 1(bridge_slave_0) entered forwarding state [ 36.000741][ T1904] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 36.009242][ T1904] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 36.017403][ T1904] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.024493][ T1904] bridge0: port 2(bridge_slave_1) entered forwarding state [ 36.032146][ T1904] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 36.040691][ T1904] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 36.049652][ T1904] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 36.057943][ T1904] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 36.066433][ T1904] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 36.074474][ T1904] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 36.082908][ T1904] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 36.091611][ T1904] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 36.100007][ T1904] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 36.108475][ T1904] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 36.117077][ T1904] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 36.125530][ T1904] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 36.133729][ T1904] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 36.141852][ T1904] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 36.150075][ T1904] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 36.158260][ T1904] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 36.166823][ T1904] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 36.176947][ T1818] device veth0_vlan entered promiscuous mode [ 36.184113][ T1830] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 36.197421][ T1845] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 36.207998][ T1845] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 36.221206][ T1904] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 36.229337][ T1904] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 36.237145][ T1904] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 36.245245][ T1904] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 36.253086][ T1904] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 36.260984][ T1904] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 36.269225][ T1904] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 36.277620][ T1904] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 36.286404][ T1904] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 36.294863][ T1904] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 36.303290][ T1904] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 36.313909][ T1818] device veth1_vlan entered promiscuous mode [ 36.327028][ T1830] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 36.340222][ T1904] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 36.348289][ T1904] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 36.356185][ T1904] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 36.363852][ T1904] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 36.371352][ T1904] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 36.378834][ T1904] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 36.392562][ T1845] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 36.410926][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 36.425890][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 36.441749][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 36.453053][ T1818] device veth0_macvtap entered promiscuous mode [ 36.468245][ T1832] device veth0_vlan entered promiscuous mode [ 36.479810][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 36.488202][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 36.497224][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 36.505303][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 36.514578][ T1818] device veth1_macvtap entered promiscuous mode [ 36.527526][ T1832] device veth1_vlan entered promiscuous mode [ 36.534258][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 36.549108][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 36.557085][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 36.565992][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 36.573756][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 36.582668][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 36.591032][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 36.609816][ T1818] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 36.618872][ T1818] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 36.627273][ T1818] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 36.636028][ T1818] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 36.644745][ T1818] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 36.653425][ T1818] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 36.668791][ T1851] device veth0_vlan entered promiscuous mode [ 36.676048][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 36.684697][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 36.693200][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 36.701933][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 36.710390][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 36.718615][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 36.735415][ T1832] device veth0_macvtap entered promiscuous mode [ 36.750760][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 36.759939][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 36.772658][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 36.781320][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 36.789914][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 36.798304][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 36.808088][ T1832] device veth1_macvtap entered promiscuous mode [ 36.818320][ T24] audit: type=1400 audit(1652045781.731:90): avc: denied { mounton } for pid=1818 comm="syz-executor.2" path="/dev/binderfs" dev="devtmpfs" ino=450 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 36.823456][ T1835] device veth0_vlan entered promiscuous mode [ 36.861155][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 36.869566][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 36.877239][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 36.885363][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 36.894139][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 36.901730][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 36.912622][ T1832] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 36.919598][ T24] audit: type=1400 audit(1652045781.831:91): avc: denied { read write } for pid=1818 comm="syz-executor.2" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 36.923122][ T1832] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 36.935730][ T1832] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 36.967213][ T1832] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 36.977764][ T1832] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 36.989205][ T1832] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 36.997339][ T1851] device veth1_vlan entered promiscuous mode [ 37.005248][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 37.014368][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 37.023382][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready 21:36:21 executing program 2: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = socket$netlink(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000080)={'wg2\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000140)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl1\x00', r2, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @loopback={0xff00000000000000, 0x460c6}}}) [ 37.032787][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 37.044278][ T1835] device veth1_vlan entered promiscuous mode [ 37.054459][ T1832] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.063287][ T1832] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.072002][ T1832] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.080776][ T1832] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.113841][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 37.122636][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 37.131344][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 37.139808][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 37.147803][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 37.157452][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 37.165450][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 37.173326][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 37.185528][ T1830] device veth0_vlan entered promiscuous mode [ 37.202471][ T1835] device veth0_macvtap entered promiscuous mode 21:36:22 executing program 2: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = socket$netlink(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000080)={'wg2\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000140)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl1\x00', r2, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @loopback={0xff00000000000000, 0x460c6}}}) [ 37.216999][ T1851] device veth0_macvtap entered promiscuous mode [ 37.224892][ T1900] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 37.233715][ T1900] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 37.242427][ T1900] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 37.250886][ T1900] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 37.259431][ T1900] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 37.267290][ T1900] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 37.283664][ T1835] device veth1_macvtap entered promiscuous mode [ 37.292103][ T1851] device veth1_macvtap entered promiscuous mode [ 37.301763][ T1830] device veth1_vlan entered promiscuous mode 21:36:22 executing program 2: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = socket$netlink(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000080)={'wg2\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000140)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl1\x00', r2, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @loopback={0xff00000000000000, 0x460c6}}}) [ 37.317385][ T1845] device veth0_vlan entered promiscuous mode [ 37.333142][ T1851] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 37.343591][ T1851] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 37.353463][ T1851] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 37.363862][ T1851] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 37.374832][ T1851] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 37.388813][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 37.396849][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 37.405233][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 37.413279][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 37.421490][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 37.429800][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 37.438097][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 37.446788][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 37.456856][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 37.468902][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 37.491223][ T1830] device veth0_macvtap entered promiscuous mode [ 37.498103][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 37.506610][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 37.515333][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 37.523794][ T1851] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 37.534331][ T1851] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 37.544139][ T1851] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 37.554550][ T1851] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 21:36:22 executing program 2: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = socket$netlink(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000080)={'wg2\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000140)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl1\x00', r2, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @loopback={0xff00000000000000, 0x460c6}}}) [ 37.566373][ T1851] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 37.574355][ T1845] device veth1_vlan entered promiscuous mode [ 37.583514][ T1830] device veth1_macvtap entered promiscuous mode [ 37.591369][ T1835] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 37.601827][ T1835] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 37.611839][ T1835] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 37.622342][ T1835] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 37.632200][ T1835] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 37.642690][ T1835] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 37.653830][ T1835] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 37.662686][ T1808] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 37.670759][ T1808] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 37.679019][ T1808] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 37.687628][ T1808] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 37.696395][ T1808] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 37.705040][ T1808] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 37.716204][ T1851] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.725021][ T1851] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.733715][ T1851] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.742474][ T1851] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 21:36:22 executing program 2: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = socket$netlink(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000080)={'wg2\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000140)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl1\x00', r2, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @loopback={0xff00000000000000, 0x460c6}}}) [ 37.776522][ T1830] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 37.786998][ T1830] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 37.796890][ T1830] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 37.807298][ T1830] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 37.817113][ T1830] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 37.827575][ T1830] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 37.837386][ T1830] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 37.847806][ T1830] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 37.860039][ T1830] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 37.867472][ T1835] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 37.878137][ T1835] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 37.888030][ T1835] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 37.898481][ T1835] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 37.908269][ T1835] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 37.918724][ T1835] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 37.931039][ T1835] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 37.943287][ T1845] device veth0_macvtap entered promiscuous mode [ 37.954993][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 37.964037][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready 21:36:22 executing program 2: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r1 = socket$netlink(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000080)={'wg2\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000140)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl1\x00', r2, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @loopback={0xff00000000000000, 0x460c6}}}) [ 37.972782][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 37.981698][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 37.990538][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 38.000475][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 38.012506][ T1830] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 38.023033][ T1830] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 38.032984][ T1830] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 38.043393][ T1830] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 38.053240][ T1830] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 38.063681][ T1830] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 38.073485][ T1830] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 38.083891][ T1830] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 38.095079][ T1830] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 38.106178][ T1835] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.114974][ T1835] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.123752][ T1835] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.132504][ T1835] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.146066][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 38.154142][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 38.162668][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 38.176320][ T1830] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.185460][ T1830] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.194189][ T1830] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.203013][ T1830] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.214191][ T1845] device veth1_macvtap entered promiscuous mode [ 38.274361][ T24] kauditd_printk_skb: 2 callbacks suppressed [ 38.274373][ T24] audit: type=1400 audit(1652045783.191:94): avc: denied { create } for pid=2034 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 38.303424][ T1845] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 38.313873][ T1845] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 38.314633][ T24] audit: type=1400 audit(1652045783.191:95): avc: denied { ioctl } for pid=2034 comm="syz-executor.3" path="socket:[17415]" dev="sockfs" ino=17415 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 38.323741][ T1845] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 38.323755][ T1845] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 38.368987][ T1845] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 38.379523][ T1845] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 38.389322][ T1845] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 38.399798][ T1845] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 38.409598][ T1845] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 38.420013][ T1845] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 38.431203][ T1845] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 38.446857][ T1904] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 38.471412][ T24] audit: type=1400 audit(1652045783.391:96): avc: denied { open } for pid=2038 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 38.493137][ T1904] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 38.494365][ T24] audit: type=1400 audit(1652045783.411:97): avc: denied { perfmon } for pid=2038 comm="syz-executor.0" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 38.507148][ T1904] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 38.531969][ T1845] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 38.542454][ T1845] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 38.552270][ T1845] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 38.562736][ T1845] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 38.572592][ T1845] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 38.583019][ T1845] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 38.592814][ T1845] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 38.603256][ T1845] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 38.613049][ T1845] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 21:36:23 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x0, 0x0) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0x15) shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(0x0, &(0x7f0000000000/0x13000)=nil, 0x4000) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x17ab6, &(0x7f0000000080)={&(0x7f0000000180)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @veth={{0x9}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_NET_NS_PID={0x8, 0x13, r1}]}, 0x3c}}, 0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000004140)={{0x3}, 0x0, 0x5c6, 0x80000000000008b, 0x7fff, r1, 0x0, 0x7}) r2 = shmget$private(0x0, 0xb000, 0x100, &(0x7f0000182000/0xb000)=nil) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f00000000c0)=0xc) r4 = getpgrp(r1) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000100)={{0x3, 0xee00, 0xee00, r3, 0x0, 0x0, 0x1}, 0x2702, 0xffffffffffffffff, 0xb4, 0x2, r4, r1, 0x7}) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f00000041c0)='./file0\x00', 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000306000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000116000/0x1000)=nil) 21:36:23 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x2, 0x4, 0x8}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0), &(0x7f0000000280), 0xd5, r0}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000740), 0x0, 0x9, r0}, 0x38) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) 21:36:23 executing program 5: r0 = eventfd2(0x0, 0x0) read$eventfd(r0, &(0x7f0000000040), 0x8) write$eventfd(r0, &(0x7f0000000000), 0x8) 21:36:23 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = dup2(r3, r0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@bridge_setlink={0x24, 0x11, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@IFLA_AF_SPEC={0x4}]}, 0x24}}, 0x0) [ 38.623456][ T1845] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 38.634521][ T1845] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 38.652328][ T2041] syz-executor.0 (2041) used greatest stack depth: 10216 bytes left [ 38.657178][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 38.678192][ T1916] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 38.679888][ T24] audit: type=1400 audit(1652045783.591:98): avc: denied { map_create } for pid=2047 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 38.705690][ T24] audit: type=1400 audit(1652045783.601:99): avc: denied { map_read map_write } for pid=2047 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 38.729868][ T1845] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.738607][ T1845] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.738854][ T2050] syz-executor.0 (2050) used greatest stack depth: 9960 bytes left [ 38.747395][ T1845] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.763973][ T1845] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 21:36:23 executing program 4: unshare(0x40400) r0 = syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) connect(r0, &(0x7f0000000240)=@ieee802154, 0x2) 21:36:23 executing program 1: setresgid(0xee01, 0x0, 0xee00) setreuid(0xffffffffffffffff, 0xee00) r0 = getgid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setresgid(r1, r0, 0x0) setresgid(0x0, 0xffffffffffffffff, 0x0) 21:36:23 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x2, 0x4, 0x8}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0), &(0x7f0000000280), 0xd5, r0}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000740), 0x0, 0x9, r0}, 0x38) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) 21:36:23 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x0, 0x0) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0x15) shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(0x0, &(0x7f0000000000/0x13000)=nil, 0x4000) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x17ab6, &(0x7f0000000080)={&(0x7f0000000180)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @veth={{0x9}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_NET_NS_PID={0x8, 0x13, r1}]}, 0x3c}}, 0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000004140)={{0x3}, 0x0, 0x5c6, 0x80000000000008b, 0x7fff, r1, 0x0, 0x7}) r2 = shmget$private(0x0, 0xb000, 0x100, &(0x7f0000182000/0xb000)=nil) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f00000000c0)=0xc) r4 = getpgrp(r1) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000100)={{0x3, 0xee00, 0xee00, r3, 0x0, 0x0, 0x1}, 0x2702, 0xffffffffffffffff, 0xb4, 0x2, r4, r1, 0x7}) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f00000041c0)='./file0\x00', 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000306000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000116000/0x1000)=nil) 21:36:23 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = dup2(r3, r0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@bridge_setlink={0x24, 0x11, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@IFLA_AF_SPEC={0x4}]}, 0x24}}, 0x0) 21:36:23 executing program 1: setresgid(0xee01, 0x0, 0xee00) setreuid(0xffffffffffffffff, 0xee00) r0 = getgid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setresgid(r1, r0, 0x0) setresgid(0x0, 0xffffffffffffffff, 0x0) 21:36:23 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x2, 0x4, 0x8}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0), &(0x7f0000000280), 0xd5, r0}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000740), 0x0, 0x9, r0}, 0x38) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) [ 38.833612][ T24] audit: type=1400 audit(1652045783.751:100): avc: denied { create } for pid=2053 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 38.853889][ T24] audit: type=1400 audit(1652045783.751:101): avc: denied { connect } for pid=2053 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 21:36:23 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = dup2(r3, r0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@bridge_setlink={0x24, 0x11, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@IFLA_AF_SPEC={0x4}]}, 0x24}}, 0x0) 21:36:23 executing program 4: unshare(0x40400) r0 = syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) connect(r0, &(0x7f0000000240)=@ieee802154, 0x2) 21:36:23 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x2, 0x4, 0x8}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0), &(0x7f0000000280), 0xd5, r0}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000740), 0x0, 0x9, r0}, 0x38) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) [ 38.959085][ T2060] syz-executor.0 (2060) used greatest stack depth: 9768 bytes left 21:36:24 executing program 5: r0 = eventfd2(0x0, 0x0) read$eventfd(r0, &(0x7f0000000040), 0x8) write$eventfd(r0, &(0x7f0000000000), 0x8) 21:36:24 executing program 3: unshare(0x40400) r0 = syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) connect(r0, &(0x7f0000000240)=@ieee802154, 0x2) 21:36:24 executing program 1: setresgid(0xee01, 0x0, 0xee00) setreuid(0xffffffffffffffff, 0xee00) r0 = getgid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setresgid(r1, r0, 0x0) setresgid(0x0, 0xffffffffffffffff, 0x0) 21:36:24 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x2, 0x4, 0x8}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0), &(0x7f0000000280), 0xd5, r0}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000740), 0x0, 0x9, r0}, 0x38) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) 21:36:24 executing program 4: unshare(0x40400) r0 = syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) connect(r0, &(0x7f0000000240)=@ieee802154, 0x2) 21:36:24 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x0, 0x0) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0x15) shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(0x0, &(0x7f0000000000/0x13000)=nil, 0x4000) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x17ab6, &(0x7f0000000080)={&(0x7f0000000180)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @veth={{0x9}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_NET_NS_PID={0x8, 0x13, r1}]}, 0x3c}}, 0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000004140)={{0x3}, 0x0, 0x5c6, 0x80000000000008b, 0x7fff, r1, 0x0, 0x7}) r2 = shmget$private(0x0, 0xb000, 0x100, &(0x7f0000182000/0xb000)=nil) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f00000000c0)=0xc) r4 = getpgrp(r1) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000100)={{0x3, 0xee00, 0xee00, r3, 0x0, 0x0, 0x1}, 0x2702, 0xffffffffffffffff, 0xb4, 0x2, r4, r1, 0x7}) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f00000041c0)='./file0\x00', 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000306000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000116000/0x1000)=nil) 21:36:24 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x2, 0x4, 0x8}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0), &(0x7f0000000280), 0xd5, r0}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000740), 0x0, 0x9, r0}, 0x38) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) 21:36:24 executing program 3: unshare(0x40400) r0 = syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) connect(r0, &(0x7f0000000240)=@ieee802154, 0x2) 21:36:24 executing program 1: prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x0, 0x0) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0x15) shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(0x0, &(0x7f0000000000/0x13000)=nil, 0x4000) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x17ab6, &(0x7f0000000080)={&(0x7f0000000180)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @veth={{0x9}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_NET_NS_PID={0x8, 0x13, r1}]}, 0x3c}}, 0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000004140)={{0x3}, 0x0, 0x5c6, 0x80000000000008b, 0x7fff, r1, 0x0, 0x7}) r2 = shmget$private(0x0, 0xb000, 0x100, &(0x7f0000182000/0xb000)=nil) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f00000000c0)=0xc) r4 = getpgrp(r1) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000100)={{0x3, 0xee00, 0xee00, r3, 0x0, 0x0, 0x1}, 0x2702, 0xffffffffffffffff, 0xb4, 0x2, r4, r1, 0x7}) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f00000041c0)='./file0\x00', 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000306000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000116000/0x1000)=nil) 21:36:24 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x2, 0x4, 0x8}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0), &(0x7f0000000280), 0xd5, r0}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000740), 0x0, 0x9, r0}, 0x38) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) 21:36:24 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x2, 0x4, 0x8}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0), &(0x7f0000000280), 0xd5, r0}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000740), 0x0, 0x9, r0}, 0x38) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) 21:36:24 executing program 3: unshare(0x40400) r0 = syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) connect(r0, &(0x7f0000000240)=@ieee802154, 0x2) 21:36:25 executing program 5: r0 = eventfd2(0x0, 0x0) read$eventfd(r0, &(0x7f0000000040), 0x8) write$eventfd(r0, &(0x7f0000000000), 0x8) 21:36:25 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x2, 0x4, 0x8}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0), &(0x7f0000000280), 0xd5, r0}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000740), 0x0, 0x9, r0}, 0x38) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) 21:36:25 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x2, 0x4, 0x8}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0), &(0x7f0000000280), 0xd5, r0}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000740), 0x0, 0x9, r0}, 0x38) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) 21:36:25 executing program 3: prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x0, 0x0) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0x15) shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(0x0, &(0x7f0000000000/0x13000)=nil, 0x4000) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x17ab6, &(0x7f0000000080)={&(0x7f0000000180)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @veth={{0x9}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_NET_NS_PID={0x8, 0x13, r1}]}, 0x3c}}, 0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000004140)={{0x3}, 0x0, 0x5c6, 0x80000000000008b, 0x7fff, r1, 0x0, 0x7}) r2 = shmget$private(0x0, 0xb000, 0x100, &(0x7f0000182000/0xb000)=nil) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f00000000c0)=0xc) r4 = getpgrp(r1) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000100)={{0x3, 0xee00, 0xee00, r3, 0x0, 0x0, 0x1}, 0x2702, 0xffffffffffffffff, 0xb4, 0x2, r4, r1, 0x7}) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f00000041c0)='./file0\x00', 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000306000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000116000/0x1000)=nil) 21:36:25 executing program 1: prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x0, 0x0) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0x15) shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(0x0, &(0x7f0000000000/0x13000)=nil, 0x4000) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x17ab6, &(0x7f0000000080)={&(0x7f0000000180)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @veth={{0x9}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_NET_NS_PID={0x8, 0x13, r1}]}, 0x3c}}, 0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000004140)={{0x3}, 0x0, 0x5c6, 0x80000000000008b, 0x7fff, r1, 0x0, 0x7}) r2 = shmget$private(0x0, 0xb000, 0x100, &(0x7f0000182000/0xb000)=nil) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f00000000c0)=0xc) r4 = getpgrp(r1) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000100)={{0x3, 0xee00, 0xee00, r3, 0x0, 0x0, 0x1}, 0x2702, 0xffffffffffffffff, 0xb4, 0x2, r4, r1, 0x7}) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f00000041c0)='./file0\x00', 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000306000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000116000/0x1000)=nil) 21:36:25 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x0, 0x0) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0x15) shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(0x0, &(0x7f0000000000/0x13000)=nil, 0x4000) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x17ab6, &(0x7f0000000080)={&(0x7f0000000180)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @veth={{0x9}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_NET_NS_PID={0x8, 0x13, r1}]}, 0x3c}}, 0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000004140)={{0x3}, 0x0, 0x5c6, 0x80000000000008b, 0x7fff, r1, 0x0, 0x7}) r2 = shmget$private(0x0, 0xb000, 0x100, &(0x7f0000182000/0xb000)=nil) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f00000000c0)=0xc) r4 = getpgrp(r1) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000100)={{0x3, 0xee00, 0xee00, r3, 0x0, 0x0, 0x1}, 0x2702, 0xffffffffffffffff, 0xb4, 0x2, r4, r1, 0x7}) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f00000041c0)='./file0\x00', 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000306000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000116000/0x1000)=nil) 21:36:25 executing program 4: setresgid(0xee01, 0x0, 0xee00) setreuid(0xffffffffffffffff, 0xee00) r0 = getgid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setresgid(r1, r0, 0x0) setresgid(0x0, 0xffffffffffffffff, 0x0) 21:36:25 executing program 2: r0 = eventfd2(0x0, 0x0) read$eventfd(r0, &(0x7f0000000040), 0x8) write$eventfd(r0, &(0x7f0000000000), 0x8) 21:36:25 executing program 4: setresgid(0xee01, 0x0, 0xee00) setreuid(0xffffffffffffffff, 0xee00) r0 = getgid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setresgid(r1, r0, 0x0) setresgid(0x0, 0xffffffffffffffff, 0x0) 21:36:25 executing program 4: setresgid(0xee01, 0x0, 0xee00) setreuid(0xffffffffffffffff, 0xee00) r0 = getgid() getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setresgid(r1, r0, 0x0) setresgid(0x0, 0xffffffffffffffff, 0x0) 21:36:25 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x0, 0x0) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0x15) shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(0x0, &(0x7f0000000000/0x13000)=nil, 0x4000) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x17ab6, &(0x7f0000000080)={&(0x7f0000000180)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @veth={{0x9}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_NET_NS_PID={0x8, 0x13, r1}]}, 0x3c}}, 0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000004140)={{0x3}, 0x0, 0x5c6, 0x80000000000008b, 0x7fff, r1, 0x0, 0x7}) r2 = shmget$private(0x0, 0xb000, 0x100, &(0x7f0000182000/0xb000)=nil) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f00000000c0)=0xc) r4 = getpgrp(r1) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000100)={{0x3, 0xee00, 0xee00, r3, 0x0, 0x0, 0x1}, 0x2702, 0xffffffffffffffff, 0xb4, 0x2, r4, r1, 0x7}) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f00000041c0)='./file0\x00', 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000306000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000116000/0x1000)=nil) 21:36:25 executing program 1: prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x0, 0x0) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0x15) shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(0x0, &(0x7f0000000000/0x13000)=nil, 0x4000) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x17ab6, &(0x7f0000000080)={&(0x7f0000000180)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @veth={{0x9}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_NET_NS_PID={0x8, 0x13, r1}]}, 0x3c}}, 0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000004140)={{0x3}, 0x0, 0x5c6, 0x80000000000008b, 0x7fff, r1, 0x0, 0x7}) r2 = shmget$private(0x0, 0xb000, 0x100, &(0x7f0000182000/0xb000)=nil) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f00000000c0)=0xc) r4 = getpgrp(r1) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000100)={{0x3, 0xee00, 0xee00, r3, 0x0, 0x0, 0x1}, 0x2702, 0xffffffffffffffff, 0xb4, 0x2, r4, r1, 0x7}) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f00000041c0)='./file0\x00', 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000306000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000116000/0x1000)=nil) 21:36:26 executing program 3: prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x0, 0x0) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0x15) shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(0x0, &(0x7f0000000000/0x13000)=nil, 0x4000) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x17ab6, &(0x7f0000000080)={&(0x7f0000000180)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @veth={{0x9}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_NET_NS_PID={0x8, 0x13, r1}]}, 0x3c}}, 0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000004140)={{0x3}, 0x0, 0x5c6, 0x80000000000008b, 0x7fff, r1, 0x0, 0x7}) r2 = shmget$private(0x0, 0xb000, 0x100, &(0x7f0000182000/0xb000)=nil) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f00000000c0)=0xc) r4 = getpgrp(r1) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000100)={{0x3, 0xee00, 0xee00, r3, 0x0, 0x0, 0x1}, 0x2702, 0xffffffffffffffff, 0xb4, 0x2, r4, r1, 0x7}) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f00000041c0)='./file0\x00', 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000306000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000116000/0x1000)=nil) 21:36:26 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)={0x20, 0x33, 0x7e2881d4b0058261, 0x0, 0x0, {0x3}, [@typed={0x4}, @typed={0x8, 0x8, 0x0, 0x0, @binary="c8cc664d"}]}, 0x20}}, 0x0) 21:36:26 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x0, 0x0) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0x15) shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(0x0, &(0x7f0000000000/0x13000)=nil, 0x4000) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x17ab6, &(0x7f0000000080)={&(0x7f0000000180)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @veth={{0x9}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_NET_NS_PID={0x8, 0x13, r1}]}, 0x3c}}, 0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000004140)={{0x3}, 0x0, 0x5c6, 0x80000000000008b, 0x7fff, r1, 0x0, 0x7}) r2 = shmget$private(0x0, 0xb000, 0x100, &(0x7f0000182000/0xb000)=nil) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f00000000c0)=0xc) r4 = getpgrp(r1) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000100)={{0x3, 0xee00, 0xee00, r3, 0x0, 0x0, 0x1}, 0x2702, 0xffffffffffffffff, 0xb4, 0x2, r4, r1, 0x7}) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f00000041c0)='./file0\x00', 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000306000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000116000/0x1000)=nil) 21:36:26 executing program 1: r0 = gettid() r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000140), 0x0) read(r1, &(0x7f0000000280)=""/248, 0xf8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x32b, @time}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r1, 0xc0bc5351, &(0x7f0000000040)={0x700, 0x0, 'client0\x00', 0x0, "865d4b77bd26429b", "636942df7d2d5e2dd27ee7669aa8e2736552dee6a444364949e36dadcb846cae"}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0x40605346, &(0x7f0000000180)) tkill(r0, 0xb) 21:36:26 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @private2}, 0x1c) shutdown(r0, 0x1) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0x70, &(0x7f0000000080), &(0x7f0000000140)=0x4) 21:36:26 executing program 2: r0 = eventfd2(0x0, 0x0) read$eventfd(r0, &(0x7f0000000040), 0x8) write$eventfd(r0, &(0x7f0000000000), 0x8) 21:36:26 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)={0x20, 0x33, 0x7e2881d4b0058261, 0x0, 0x0, {0x3}, [@typed={0x4}, @typed={0x8, 0x8, 0x0, 0x0, @binary="c8cc664d"}]}, 0x20}}, 0x0) 21:36:26 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)={0x20, 0x33, 0x7e2881d4b0058261, 0x0, 0x0, {0x3}, [@typed={0x4}, @typed={0x8, 0x8, 0x0, 0x0, @binary="c8cc664d"}]}, 0x20}}, 0x0) 21:36:26 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @private2}, 0x1c) shutdown(r0, 0x1) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0x70, &(0x7f0000000080), &(0x7f0000000140)=0x4) [ 41.281908][ T24] audit: type=1400 audit(1652045786.201:102): avc: denied { create } for pid=2138 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 21:36:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000000)=@filter={'filter\x00', 0x42, 0x4, 0x370, 0xffffffff, 0x1b8, 0xb0, 0x0, 0xffffffff, 0xffffffff, 0x2d8, 0x2d8, 0x2d8, 0xffffffff, 0x4, 0x0, {[{{@ip={@local, @loopback, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bond\x00'}, 0x0, 0x70, 0xb0, 0x0, {0x100000000000000}}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00', 0x0, 0x9}}}, {{@uncond, 0x0, 0xe0, 0x108, 0x0, {}, [@common=@inet=@socket1={{0x28}, 0x56}, @common=@unspec=@helper={{0x48}, {0x0, 'snmp\x00'}}]}, @REJECT={0x28}}, {{@ip={@remote, @dev, 0x0, 0x0, 'batadv_slave_0\x00', 'rose0\x00'}, 0x0, 0xc0, 0x120, 0x0, {}, [@common=@ttl={{0x28}}, @common=@ttl={{0x28}}]}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@broadcast}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 21:36:26 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)={0x20, 0x33, 0x7e2881d4b0058261, 0x0, 0x0, {0x3}, [@typed={0x4}, @typed={0x8, 0x8, 0x0, 0x0, @binary="c8cc664d"}]}, 0x20}}, 0x0) 21:36:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r1, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x2, 0x4, 0x1, 0x21}, 0x48) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000000)=r2, 0x4) [ 41.315853][ T24] audit: type=1400 audit(1652045786.211:103): avc: denied { connect } for pid=2138 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 21:36:26 executing program 3: prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x0, 0x0) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0x15) shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(0x0, &(0x7f0000000000/0x13000)=nil, 0x4000) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x17ab6, &(0x7f0000000080)={&(0x7f0000000180)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @veth={{0x9}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_NET_NS_PID={0x8, 0x13, r1}]}, 0x3c}}, 0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000004140)={{0x3}, 0x0, 0x5c6, 0x80000000000008b, 0x7fff, r1, 0x0, 0x7}) r2 = shmget$private(0x0, 0xb000, 0x100, &(0x7f0000182000/0xb000)=nil) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f00000000c0)=0xc) r4 = getpgrp(r1) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000100)={{0x3, 0xee00, 0xee00, r3, 0x0, 0x0, 0x1}, 0x2702, 0xffffffffffffffff, 0xb4, 0x2, r4, r1, 0x7}) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f00000041c0)='./file0\x00', 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000306000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000116000/0x1000)=nil) 21:36:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r1, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x2, 0x4, 0x1, 0x21}, 0x48) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000000)=r2, 0x4) 21:36:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000000)=@filter={'filter\x00', 0x42, 0x4, 0x370, 0xffffffff, 0x1b8, 0xb0, 0x0, 0xffffffff, 0xffffffff, 0x2d8, 0x2d8, 0x2d8, 0xffffffff, 0x4, 0x0, {[{{@ip={@local, @loopback, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bond\x00'}, 0x0, 0x70, 0xb0, 0x0, {0x100000000000000}}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00', 0x0, 0x9}}}, {{@uncond, 0x0, 0xe0, 0x108, 0x0, {}, [@common=@inet=@socket1={{0x28}, 0x56}, @common=@unspec=@helper={{0x48}, {0x0, 'snmp\x00'}}]}, @REJECT={0x28}}, {{@ip={@remote, @dev, 0x0, 0x0, 'batadv_slave_0\x00', 'rose0\x00'}, 0x0, 0xc0, 0x120, 0x0, {}, [@common=@ttl={{0x28}}, @common=@ttl={{0x28}}]}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@broadcast}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 41.358251][ T2151] xt_socket: unknown flags 0x56 [ 41.402797][ T2160] xt_socket: unknown flags 0x56 21:36:26 executing program 1: r0 = gettid() r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000140), 0x0) read(r1, &(0x7f0000000280)=""/248, 0xf8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x32b, @time}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r1, 0xc0bc5351, &(0x7f0000000040)={0x700, 0x0, 'client0\x00', 0x0, "865d4b77bd26429b", "636942df7d2d5e2dd27ee7669aa8e2736552dee6a444364949e36dadcb846cae"}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0x40605346, &(0x7f0000000180)) tkill(r0, 0xb) 21:36:26 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @private2}, 0x1c) shutdown(r0, 0x1) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0x70, &(0x7f0000000080), &(0x7f0000000140)=0x4) 21:36:27 executing program 2: r0 = eventfd2(0x0, 0x0) read$eventfd(r0, &(0x7f0000000040), 0x8) write$eventfd(r0, &(0x7f0000000000), 0x8) 21:36:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000000)=@filter={'filter\x00', 0x42, 0x4, 0x370, 0xffffffff, 0x1b8, 0xb0, 0x0, 0xffffffff, 0xffffffff, 0x2d8, 0x2d8, 0x2d8, 0xffffffff, 0x4, 0x0, {[{{@ip={@local, @loopback, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bond\x00'}, 0x0, 0x70, 0xb0, 0x0, {0x100000000000000}}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00', 0x0, 0x9}}}, {{@uncond, 0x0, 0xe0, 0x108, 0x0, {}, [@common=@inet=@socket1={{0x28}, 0x56}, @common=@unspec=@helper={{0x48}, {0x0, 'snmp\x00'}}]}, @REJECT={0x28}}, {{@ip={@remote, @dev, 0x0, 0x0, 'batadv_slave_0\x00', 'rose0\x00'}, 0x0, 0xc0, 0x120, 0x0, {}, [@common=@ttl={{0x28}}, @common=@ttl={{0x28}}]}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@broadcast}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 21:36:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r1, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x2, 0x4, 0x1, 0x21}, 0x48) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000000)=r2, 0x4) 21:36:27 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r1, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x2, 0x4, 0x1, 0x21}, 0x48) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000000)=r2, 0x4) 21:36:27 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @private2}, 0x1c) shutdown(r0, 0x1) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0x70, &(0x7f0000000080), &(0x7f0000000140)=0x4) 21:36:27 executing program 1: r0 = gettid() r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000140), 0x0) read(r1, &(0x7f0000000280)=""/248, 0xf8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x32b, @time}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r1, 0xc0bc5351, &(0x7f0000000040)={0x700, 0x0, 'client0\x00', 0x0, "865d4b77bd26429b", "636942df7d2d5e2dd27ee7669aa8e2736552dee6a444364949e36dadcb846cae"}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0x40605346, &(0x7f0000000180)) tkill(r0, 0xb) 21:36:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r1, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x2, 0x4, 0x1, 0x21}, 0x48) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000000)=r2, 0x4) 21:36:27 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r1, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x2, 0x4, 0x1, 0x21}, 0x48) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000000)=r2, 0x4) 21:36:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000000)=@filter={'filter\x00', 0x42, 0x4, 0x370, 0xffffffff, 0x1b8, 0xb0, 0x0, 0xffffffff, 0xffffffff, 0x2d8, 0x2d8, 0x2d8, 0xffffffff, 0x4, 0x0, {[{{@ip={@local, @loopback, 0x0, 0x0, 'team_slave_0\x00', 'veth1_to_bond\x00'}, 0x0, 0x70, 0xb0, 0x0, {0x100000000000000}}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00', 0x0, 0x9}}}, {{@uncond, 0x0, 0xe0, 0x108, 0x0, {}, [@common=@inet=@socket1={{0x28}, 0x56}, @common=@unspec=@helper={{0x48}, {0x0, 'snmp\x00'}}]}, @REJECT={0x28}}, {{@ip={@remote, @dev, 0x0, 0x0, 'batadv_slave_0\x00', 'rose0\x00'}, 0x0, 0xc0, 0x120, 0x0, {}, [@common=@ttl={{0x28}}, @common=@ttl={{0x28}}]}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@broadcast}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 21:36:27 executing program 4: r0 = gettid() r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000140), 0x0) read(r1, &(0x7f0000000280)=""/248, 0xf8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x32b, @time}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r1, 0xc0bc5351, &(0x7f0000000040)={0x700, 0x0, 'client0\x00', 0x0, "865d4b77bd26429b", "636942df7d2d5e2dd27ee7669aa8e2736552dee6a444364949e36dadcb846cae"}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0x40605346, &(0x7f0000000180)) tkill(r0, 0xb) 21:36:27 executing program 5: r0 = gettid() r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000140), 0x0) read(r1, &(0x7f0000000280)=""/248, 0xf8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x32b, @time}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r1, 0xc0bc5351, &(0x7f0000000040)={0x700, 0x0, 'client0\x00', 0x0, "865d4b77bd26429b", "636942df7d2d5e2dd27ee7669aa8e2736552dee6a444364949e36dadcb846cae"}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0x40605346, &(0x7f0000000180)) tkill(r0, 0xb) [ 42.122716][ T2177] xt_socket: unknown flags 0x56 21:36:27 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r1, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x2, 0x4, 0x1, 0x21}, 0x48) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000000)=r2, 0x4) [ 42.171910][ T2188] xt_socket: unknown flags 0x56 21:36:27 executing program 3: r0 = gettid() r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000140), 0x0) read(r1, &(0x7f0000000280)=""/248, 0xf8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x32b, @time}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r1, 0xc0bc5351, &(0x7f0000000040)={0x700, 0x0, 'client0\x00', 0x0, "865d4b77bd26429b", "636942df7d2d5e2dd27ee7669aa8e2736552dee6a444364949e36dadcb846cae"}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0x40605346, &(0x7f0000000180)) tkill(r0, 0xb) 21:36:27 executing program 0: r0 = gettid() r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000140), 0x0) read(r1, &(0x7f0000000280)=""/248, 0xf8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x32b, @time}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r1, 0xc0bc5351, &(0x7f0000000040)={0x700, 0x0, 'client0\x00', 0x0, "865d4b77bd26429b", "636942df7d2d5e2dd27ee7669aa8e2736552dee6a444364949e36dadcb846cae"}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0x40605346, &(0x7f0000000180)) tkill(r0, 0xb) 21:36:27 executing program 1: r0 = gettid() r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000140), 0x0) read(r1, &(0x7f0000000280)=""/248, 0xf8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x32b, @time}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r1, 0xc0bc5351, &(0x7f0000000040)={0x700, 0x0, 'client0\x00', 0x0, "865d4b77bd26429b", "636942df7d2d5e2dd27ee7669aa8e2736552dee6a444364949e36dadcb846cae"}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0x40605346, &(0x7f0000000180)) tkill(r0, 0xb) 21:36:27 executing program 4: r0 = gettid() r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000140), 0x0) read(r1, &(0x7f0000000280)=""/248, 0xf8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x32b, @time}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r1, 0xc0bc5351, &(0x7f0000000040)={0x700, 0x0, 'client0\x00', 0x0, "865d4b77bd26429b", "636942df7d2d5e2dd27ee7669aa8e2736552dee6a444364949e36dadcb846cae"}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0x40605346, &(0x7f0000000180)) tkill(r0, 0xb) 21:36:27 executing program 5: r0 = gettid() r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000140), 0x0) read(r1, &(0x7f0000000280)=""/248, 0xf8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x32b, @time}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r1, 0xc0bc5351, &(0x7f0000000040)={0x700, 0x0, 'client0\x00', 0x0, "865d4b77bd26429b", "636942df7d2d5e2dd27ee7669aa8e2736552dee6a444364949e36dadcb846cae"}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0x40605346, &(0x7f0000000180)) tkill(r0, 0xb) 21:36:27 executing program 2: ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000200)={"10d322952625e65e87f10523d4bd7c7d", 0x0, 0x0, {0x3}}) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x474c, 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f0000000040)=0x10001, 0x4) setsockopt$inet_int(r0, 0x0, 0xc, &(0x7f0000000140)=0x7f, 0x4) recvmmsg(r0, &(0x7f0000000040), 0x55, 0x45833af92e4b39ff, 0x0) 21:36:27 executing program 2: ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000200)={"10d322952625e65e87f10523d4bd7c7d", 0x0, 0x0, {0x3}}) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x474c, 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f0000000040)=0x10001, 0x4) setsockopt$inet_int(r0, 0x0, 0xc, &(0x7f0000000140)=0x7f, 0x4) recvmmsg(r0, &(0x7f0000000040), 0x55, 0x45833af92e4b39ff, 0x0) 21:36:28 executing program 2: ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000200)={"10d322952625e65e87f10523d4bd7c7d", 0x0, 0x0, {0x3}}) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x474c, 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f0000000040)=0x10001, 0x4) setsockopt$inet_int(r0, 0x0, 0xc, &(0x7f0000000140)=0x7f, 0x4) recvmmsg(r0, &(0x7f0000000040), 0x55, 0x45833af92e4b39ff, 0x0) 21:36:28 executing program 4: r0 = gettid() r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000140), 0x0) read(r1, &(0x7f0000000280)=""/248, 0xf8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x32b, @time}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r1, 0xc0bc5351, &(0x7f0000000040)={0x700, 0x0, 'client0\x00', 0x0, "865d4b77bd26429b", "636942df7d2d5e2dd27ee7669aa8e2736552dee6a444364949e36dadcb846cae"}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0x40605346, &(0x7f0000000180)) tkill(r0, 0xb) 21:36:28 executing program 3: r0 = gettid() r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000140), 0x0) read(r1, &(0x7f0000000280)=""/248, 0xf8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x32b, @time}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r1, 0xc0bc5351, &(0x7f0000000040)={0x700, 0x0, 'client0\x00', 0x0, "865d4b77bd26429b", "636942df7d2d5e2dd27ee7669aa8e2736552dee6a444364949e36dadcb846cae"}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0x40605346, &(0x7f0000000180)) tkill(r0, 0xb) 21:36:28 executing program 1: ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000200)={"10d322952625e65e87f10523d4bd7c7d", 0x0, 0x0, {0x3}}) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x474c, 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f0000000040)=0x10001, 0x4) setsockopt$inet_int(r0, 0x0, 0xc, &(0x7f0000000140)=0x7f, 0x4) recvmmsg(r0, &(0x7f0000000040), 0x55, 0x45833af92e4b39ff, 0x0) 21:36:28 executing program 5: r0 = gettid() r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000140), 0x0) read(r1, &(0x7f0000000280)=""/248, 0xf8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x32b, @time}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r1, 0xc0bc5351, &(0x7f0000000040)={0x700, 0x0, 'client0\x00', 0x0, "865d4b77bd26429b", "636942df7d2d5e2dd27ee7669aa8e2736552dee6a444364949e36dadcb846cae"}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0x40605346, &(0x7f0000000180)) tkill(r0, 0xb) 21:36:28 executing program 0: r0 = gettid() r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000140), 0x0) read(r1, &(0x7f0000000280)=""/248, 0xf8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x32b, @time}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r1, 0xc0bc5351, &(0x7f0000000040)={0x700, 0x0, 'client0\x00', 0x0, "865d4b77bd26429b", "636942df7d2d5e2dd27ee7669aa8e2736552dee6a444364949e36dadcb846cae"}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0x40605346, &(0x7f0000000180)) tkill(r0, 0xb) 21:36:28 executing program 2: ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000200)={"10d322952625e65e87f10523d4bd7c7d", 0x0, 0x0, {0x3}}) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x474c, 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f0000000040)=0x10001, 0x4) setsockopt$inet_int(r0, 0x0, 0xc, &(0x7f0000000140)=0x7f, 0x4) recvmmsg(r0, &(0x7f0000000040), 0x55, 0x45833af92e4b39ff, 0x0) 21:36:28 executing program 1: ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000200)={"10d322952625e65e87f10523d4bd7c7d", 0x0, 0x0, {0x3}}) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x474c, 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f0000000040)=0x10001, 0x4) setsockopt$inet_int(r0, 0x0, 0xc, &(0x7f0000000140)=0x7f, 0x4) recvmmsg(r0, &(0x7f0000000040), 0x55, 0x45833af92e4b39ff, 0x0) 21:36:28 executing program 2: r0 = syz_io_uring_setup(0x5de6, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000380)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r1, r2, &(0x7f00000000c0)=@IORING_OP_SPLICE={0x1e, 0x4, 0x0, @fd_index, 0x1}, 0x1) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ee7000/0x3000)=nil, 0x3000, 0x6, 0x11, r0, 0x10000000) syz_io_uring_submit(r1, r2, &(0x7f0000002d40)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r3, &(0x7f0000000340)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x0, 0x0, @fd_index}, 0x0) r4 = mmap$IORING_OFF_SQES(&(0x7f00000da000/0x4000)=nil, 0x4000, 0x3, 0x12, r0, 0x10000000) syz_io_uring_submit(r1, r2, &(0x7f0000000140)=@IORING_OP_SYNC_FILE_RANGE, 0x0) syz_io_uring_submit(r1, r4, &(0x7f00000001c0)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r4, &(0x7f0000000080)=@IORING_OP_TIMEOUT_REMOVE, 0x0) syz_io_uring_submit(r1, r4, &(0x7f0000000240)=@IORING_OP_FADVISE, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_CLOSE, 0x0) io_uring_enter(r0, 0x6372, 0x0, 0x0, 0x0, 0x0) 21:36:28 executing program 2: r0 = syz_io_uring_setup(0x5de6, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000380)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r1, r2, &(0x7f00000000c0)=@IORING_OP_SPLICE={0x1e, 0x4, 0x0, @fd_index, 0x1}, 0x1) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ee7000/0x3000)=nil, 0x3000, 0x6, 0x11, r0, 0x10000000) syz_io_uring_submit(r1, r2, &(0x7f0000002d40)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r3, &(0x7f0000000340)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x0, 0x0, @fd_index}, 0x0) r4 = mmap$IORING_OFF_SQES(&(0x7f00000da000/0x4000)=nil, 0x4000, 0x3, 0x12, r0, 0x10000000) syz_io_uring_submit(r1, r2, &(0x7f0000000140)=@IORING_OP_SYNC_FILE_RANGE, 0x0) syz_io_uring_submit(r1, r4, &(0x7f00000001c0)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r4, &(0x7f0000000080)=@IORING_OP_TIMEOUT_REMOVE, 0x0) syz_io_uring_submit(r1, r4, &(0x7f0000000240)=@IORING_OP_FADVISE, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_CLOSE, 0x0) io_uring_enter(r0, 0x6372, 0x0, 0x0, 0x0, 0x0) [ 43.442348][ T24] kauditd_printk_skb: 5 callbacks suppressed [ 43.442361][ T24] audit: type=1400 audit(1652045788.361:109): avc: denied { create } for pid=2272 comm="syz-executor.2" dev="anon_inodefs" ino=17394 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 21:36:28 executing program 2: r0 = syz_io_uring_setup(0x5de6, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000380)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r1, r2, &(0x7f00000000c0)=@IORING_OP_SPLICE={0x1e, 0x4, 0x0, @fd_index, 0x1}, 0x1) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ee7000/0x3000)=nil, 0x3000, 0x6, 0x11, r0, 0x10000000) syz_io_uring_submit(r1, r2, &(0x7f0000002d40)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r3, &(0x7f0000000340)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x0, 0x0, @fd_index}, 0x0) r4 = mmap$IORING_OFF_SQES(&(0x7f00000da000/0x4000)=nil, 0x4000, 0x3, 0x12, r0, 0x10000000) syz_io_uring_submit(r1, r2, &(0x7f0000000140)=@IORING_OP_SYNC_FILE_RANGE, 0x0) syz_io_uring_submit(r1, r4, &(0x7f00000001c0)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r4, &(0x7f0000000080)=@IORING_OP_TIMEOUT_REMOVE, 0x0) syz_io_uring_submit(r1, r4, &(0x7f0000000240)=@IORING_OP_FADVISE, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_CLOSE, 0x0) io_uring_enter(r0, 0x6372, 0x0, 0x0, 0x0, 0x0) 21:36:28 executing program 2: r0 = syz_io_uring_setup(0x5de6, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000380)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r1, r2, &(0x7f00000000c0)=@IORING_OP_SPLICE={0x1e, 0x4, 0x0, @fd_index, 0x1}, 0x1) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ee7000/0x3000)=nil, 0x3000, 0x6, 0x11, r0, 0x10000000) syz_io_uring_submit(r1, r2, &(0x7f0000002d40)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r3, &(0x7f0000000340)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x0, 0x0, @fd_index}, 0x0) r4 = mmap$IORING_OFF_SQES(&(0x7f00000da000/0x4000)=nil, 0x4000, 0x3, 0x12, r0, 0x10000000) syz_io_uring_submit(r1, r2, &(0x7f0000000140)=@IORING_OP_SYNC_FILE_RANGE, 0x0) syz_io_uring_submit(r1, r4, &(0x7f00000001c0)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r4, &(0x7f0000000080)=@IORING_OP_TIMEOUT_REMOVE, 0x0) syz_io_uring_submit(r1, r4, &(0x7f0000000240)=@IORING_OP_FADVISE, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_CLOSE, 0x0) io_uring_enter(r0, 0x6372, 0x0, 0x0, 0x0, 0x0) [ 43.482380][ T24] audit: type=1400 audit(1652045788.361:110): avc: denied { map } for pid=2272 comm="syz-executor.2" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=17394 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 43.506858][ T24] audit: type=1400 audit(1652045788.361:111): avc: denied { read write } for pid=2272 comm="syz-executor.2" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=17394 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 21:36:28 executing program 1: ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000200)={"10d322952625e65e87f10523d4bd7c7d", 0x0, 0x0, {0x3}}) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x474c, 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f0000000040)=0x10001, 0x4) setsockopt$inet_int(r0, 0x0, 0xc, &(0x7f0000000140)=0x7f, 0x4) recvmmsg(r0, &(0x7f0000000040), 0x55, 0x45833af92e4b39ff, 0x0) 21:36:28 executing program 4: r0 = memfd_create(&(0x7f0000000180)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\x91\x1b\x80\x93\x81v\xc5o\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x97z\xd9c\xecR\xd6\xe8\xf3Y\x12\"p^\xc1\x0f\x00\x00\x00\x00\x00\x00\x00t\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00Y\x8f\xc6S[\xceS\xa1b \x1d\x14\xfc\x89\xad\xa2\x83V\x93\xb8\vT\x02bS\xcdqE$O\xdbW\x9b<\xc8~\"\x1c\xf5\xa2~\xa4I&RB\xf5\xa5\xc8\x85R\x10\x15\x8d.\xb1_\xedMe!\x9bm\xdd\xd4\xc0E<\"\x8c\a6D6\x13\x10\x02IEWax\xf6C\xa4\xf4#\xa8\xb9\x86\xd2101p1\x0f\xd8e\xda\xbb3W\x8b\x9e\xa5Ed9\xdb\xdap\xe5\xf0\xb1\xe7\x14\xdd_#\xe1*D1\x92\xe5\xef\xa7?\x8fi\xe5\x18\xe2nc\f\xd3\xb6\xa4\xa0\xe7\a}>nL\xd24\xb3\xb3[\xd3\x7f]4\\\xda\f\x91\xfb\xcf\xd5\x92\x9bc10ZK\x82a\x1e\x85;[6\xe6\x98\x11\xd4\xb0\xe9\xddb5\xd8\x9e\x8eAO\xbe\xa7,\xa0RF\x96\xc9\x86x\xd1\x85\xee\xaa\xe3\xea\x02\xff\xa7\x16ix}\xc0%\x06r\xe2\xc7I\xff\xb1\x0e\x83\xd4\xc0#\xdeM\xb9+\n\xf2Si\xc1\xcc_\x90q#\x1b\xa6=\xe2-\xdaX\xb9\xac\xf6M\x1c1\xb0\x18\xadG\xf9\xe5\xe2\x87\xf3\x1e{\x8e\xe6\b\xbe!\xcdP\xe3\x85p\x04\xf7\xfcm\xe3\x05\xea\xce\xa6\xd5\xac\xf9z\x98\x18\x8a\x1c.\x02\xce\xc6\tI\x85\xe8\xb0\x84Pz\v\x18\x19\xea\x11\xf9C\x00\x00\x00\x00\x00', 0x5) fallocate(r0, 0x0, 0x2000028, 0x35e) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x0, @multicast1}, 0x10) 21:36:28 executing program 3: r0 = gettid() r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000140), 0x0) read(r1, &(0x7f0000000280)=""/248, 0xf8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x32b, @time}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r1, 0xc0bc5351, &(0x7f0000000040)={0x700, 0x0, 'client0\x00', 0x0, "865d4b77bd26429b", "636942df7d2d5e2dd27ee7669aa8e2736552dee6a444364949e36dadcb846cae"}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0x40605346, &(0x7f0000000180)) tkill(r0, 0xb) 21:36:28 executing program 5: syz_emit_ethernet(0x46, &(0x7f0000000640)={@broadcast, @random="e0d35b1004bb", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x5, 0x24, 0x0, 0x3, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @local}, "00006371ae9b1c01"}}}}}, 0x0) [ 43.532095][ T24] audit: type=1400 audit(1652045788.361:112): avc: denied { execute } for pid=2272 comm="syz-executor.2" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=17394 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 21:36:28 executing program 0: r0 = gettid() r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000140), 0x0) read(r1, &(0x7f0000000280)=""/248, 0xf8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x32b, @time}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r1, 0xc0bc5351, &(0x7f0000000040)={0x700, 0x0, 'client0\x00', 0x0, "865d4b77bd26429b", "636942df7d2d5e2dd27ee7669aa8e2736552dee6a444364949e36dadcb846cae"}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0x40605346, &(0x7f0000000180)) tkill(r0, 0xb) [ 43.600101][ T24] audit: type=1400 audit(1652045788.521:113): avc: denied { execute } for pid=2290 comm="syz-executor.4" path=2F6D656D66643A202864656C6574656429 dev="hugetlbfs" ino=17739 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:hugetlbfs_t tclass=file permissive=1 21:36:28 executing program 5: syz_emit_ethernet(0x46, &(0x7f0000000640)={@broadcast, @random="e0d35b1004bb", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x5, 0x24, 0x0, 0x3, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @local}, "00006371ae9b1c01"}}}}}, 0x0) 21:36:28 executing program 4: r0 = memfd_create(&(0x7f0000000180)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\x91\x1b\x80\x93\x81v\xc5o\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x97z\xd9c\xecR\xd6\xe8\xf3Y\x12\"p^\xc1\x0f\x00\x00\x00\x00\x00\x00\x00t\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00Y\x8f\xc6S[\xceS\xa1b \x1d\x14\xfc\x89\xad\xa2\x83V\x93\xb8\vT\x02bS\xcdqE$O\xdbW\x9b<\xc8~\"\x1c\xf5\xa2~\xa4I&RB\xf5\xa5\xc8\x85R\x10\x15\x8d.\xb1_\xedMe!\x9bm\xdd\xd4\xc0E<\"\x8c\a6D6\x13\x10\x02IEWax\xf6C\xa4\xf4#\xa8\xb9\x86\xd2101p1\x0f\xd8e\xda\xbb3W\x8b\x9e\xa5Ed9\xdb\xdap\xe5\xf0\xb1\xe7\x14\xdd_#\xe1*D1\x92\xe5\xef\xa7?\x8fi\xe5\x18\xe2nc\f\xd3\xb6\xa4\xa0\xe7\a}>nL\xd24\xb3\xb3[\xd3\x7f]4\\\xda\f\x91\xfb\xcf\xd5\x92\x9bc10ZK\x82a\x1e\x85;[6\xe6\x98\x11\xd4\xb0\xe9\xddb5\xd8\x9e\x8eAO\xbe\xa7,\xa0RF\x96\xc9\x86x\xd1\x85\xee\xaa\xe3\xea\x02\xff\xa7\x16ix}\xc0%\x06r\xe2\xc7I\xff\xb1\x0e\x83\xd4\xc0#\xdeM\xb9+\n\xf2Si\xc1\xcc_\x90q#\x1b\xa6=\xe2-\xdaX\xb9\xac\xf6M\x1c1\xb0\x18\xadG\xf9\xe5\xe2\x87\xf3\x1e{\x8e\xe6\b\xbe!\xcdP\xe3\x85p\x04\xf7\xfcm\xe3\x05\xea\xce\xa6\xd5\xac\xf9z\x98\x18\x8a\x1c.\x02\xce\xc6\tI\x85\xe8\xb0\x84Pz\v\x18\x19\xea\x11\xf9C\x00\x00\x00\x00\x00', 0x5) fallocate(r0, 0x0, 0x2000028, 0x35e) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x0, @multicast1}, 0x10) 21:36:28 executing program 2: r0 = memfd_create(&(0x7f0000000180)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\x91\x1b\x80\x93\x81v\xc5o\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x97z\xd9c\xecR\xd6\xe8\xf3Y\x12\"p^\xc1\x0f\x00\x00\x00\x00\x00\x00\x00t\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00Y\x8f\xc6S[\xceS\xa1b \x1d\x14\xfc\x89\xad\xa2\x83V\x93\xb8\vT\x02bS\xcdqE$O\xdbW\x9b<\xc8~\"\x1c\xf5\xa2~\xa4I&RB\xf5\xa5\xc8\x85R\x10\x15\x8d.\xb1_\xedMe!\x9bm\xdd\xd4\xc0E<\"\x8c\a6D6\x13\x10\x02IEWax\xf6C\xa4\xf4#\xa8\xb9\x86\xd2101p1\x0f\xd8e\xda\xbb3W\x8b\x9e\xa5Ed9\xdb\xdap\xe5\xf0\xb1\xe7\x14\xdd_#\xe1*D1\x92\xe5\xef\xa7?\x8fi\xe5\x18\xe2nc\f\xd3\xb6\xa4\xa0\xe7\a}>nL\xd24\xb3\xb3[\xd3\x7f]4\\\xda\f\x91\xfb\xcf\xd5\x92\x9bc10ZK\x82a\x1e\x85;[6\xe6\x98\x11\xd4\xb0\xe9\xddb5\xd8\x9e\x8eAO\xbe\xa7,\xa0RF\x96\xc9\x86x\xd1\x85\xee\xaa\xe3\xea\x02\xff\xa7\x16ix}\xc0%\x06r\xe2\xc7I\xff\xb1\x0e\x83\xd4\xc0#\xdeM\xb9+\n\xf2Si\xc1\xcc_\x90q#\x1b\xa6=\xe2-\xdaX\xb9\xac\xf6M\x1c1\xb0\x18\xadG\xf9\xe5\xe2\x87\xf3\x1e{\x8e\xe6\b\xbe!\xcdP\xe3\x85p\x04\xf7\xfcm\xe3\x05\xea\xce\xa6\xd5\xac\xf9z\x98\x18\x8a\x1c.\x02\xce\xc6\tI\x85\xe8\xb0\x84Pz\v\x18\x19\xea\x11\xf9C\x00\x00\x00\x00\x00', 0x5) fallocate(r0, 0x0, 0x2000028, 0x35e) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x0, @multicast1}, 0x10) 21:36:28 executing program 4: r0 = memfd_create(&(0x7f0000000180)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\x91\x1b\x80\x93\x81v\xc5o\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x97z\xd9c\xecR\xd6\xe8\xf3Y\x12\"p^\xc1\x0f\x00\x00\x00\x00\x00\x00\x00t\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00Y\x8f\xc6S[\xceS\xa1b \x1d\x14\xfc\x89\xad\xa2\x83V\x93\xb8\vT\x02bS\xcdqE$O\xdbW\x9b<\xc8~\"\x1c\xf5\xa2~\xa4I&RB\xf5\xa5\xc8\x85R\x10\x15\x8d.\xb1_\xedMe!\x9bm\xdd\xd4\xc0E<\"\x8c\a6D6\x13\x10\x02IEWax\xf6C\xa4\xf4#\xa8\xb9\x86\xd2101p1\x0f\xd8e\xda\xbb3W\x8b\x9e\xa5Ed9\xdb\xdap\xe5\xf0\xb1\xe7\x14\xdd_#\xe1*D1\x92\xe5\xef\xa7?\x8fi\xe5\x18\xe2nc\f\xd3\xb6\xa4\xa0\xe7\a}>nL\xd24\xb3\xb3[\xd3\x7f]4\\\xda\f\x91\xfb\xcf\xd5\x92\x9bc10ZK\x82a\x1e\x85;[6\xe6\x98\x11\xd4\xb0\xe9\xddb5\xd8\x9e\x8eAO\xbe\xa7,\xa0RF\x96\xc9\x86x\xd1\x85\xee\xaa\xe3\xea\x02\xff\xa7\x16ix}\xc0%\x06r\xe2\xc7I\xff\xb1\x0e\x83\xd4\xc0#\xdeM\xb9+\n\xf2Si\xc1\xcc_\x90q#\x1b\xa6=\xe2-\xdaX\xb9\xac\xf6M\x1c1\xb0\x18\xadG\xf9\xe5\xe2\x87\xf3\x1e{\x8e\xe6\b\xbe!\xcdP\xe3\x85p\x04\xf7\xfcm\xe3\x05\xea\xce\xa6\xd5\xac\xf9z\x98\x18\x8a\x1c.\x02\xce\xc6\tI\x85\xe8\xb0\x84Pz\v\x18\x19\xea\x11\xf9C\x00\x00\x00\x00\x00', 0x5) fallocate(r0, 0x0, 0x2000028, 0x35e) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x0, @multicast1}, 0x10) [ 43.631352][ T24] audit: type=1400 audit(1652045788.551:114): avc: denied { node_bind } for pid=2290 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 43.666481][ T2303] ================================================================== [ 43.674660][ T2303] BUG: KCSAN: data-race in ext4_free_inodes_count / ext4_free_inodes_set [ 43.683074][ T2303] [ 43.685394][ T2303] write to 0xffff888103f8100e of 2 bytes by task 1845 on cpu 1: [ 43.693011][ T2303] ext4_free_inodes_set+0x1b/0x80 [ 43.698032][ T2303] __ext4_new_inode+0x1966/0x2700 [ 43.703050][ T2303] ext4_mkdir+0x287/0x760 [ 43.707372][ T2303] vfs_mkdir+0x216/0x320 [ 43.711606][ T2303] do_mkdirat+0x105/0x280 [ 43.716015][ T2303] __x64_sys_mkdirat+0x4c/0x60 [ 43.720773][ T2303] do_syscall_64+0x2b/0x70 [ 43.725271][ T2303] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 43.731255][ T2303] [ 43.733573][ T2303] read to 0xffff888103f8100e of 2 bytes by task 2303 on cpu 0: [ 43.741107][ T2303] ext4_free_inodes_count+0x18/0x80 21:36:28 executing program 2: r0 = memfd_create(&(0x7f0000000180)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\x91\x1b\x80\x93\x81v\xc5o\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x97z\xd9c\xecR\xd6\xe8\xf3Y\x12\"p^\xc1\x0f\x00\x00\x00\x00\x00\x00\x00t\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00Y\x8f\xc6S[\xceS\xa1b \x1d\x14\xfc\x89\xad\xa2\x83V\x93\xb8\vT\x02bS\xcdqE$O\xdbW\x9b<\xc8~\"\x1c\xf5\xa2~\xa4I&RB\xf5\xa5\xc8\x85R\x10\x15\x8d.\xb1_\xedMe!\x9bm\xdd\xd4\xc0E<\"\x8c\a6D6\x13\x10\x02IEWax\xf6C\xa4\xf4#\xa8\xb9\x86\xd2101p1\x0f\xd8e\xda\xbb3W\x8b\x9e\xa5Ed9\xdb\xdap\xe5\xf0\xb1\xe7\x14\xdd_#\xe1*D1\x92\xe5\xef\xa7?\x8fi\xe5\x18\xe2nc\f\xd3\xb6\xa4\xa0\xe7\a}>nL\xd24\xb3\xb3[\xd3\x7f]4\\\xda\f\x91\xfb\xcf\xd5\x92\x9bc10ZK\x82a\x1e\x85;[6\xe6\x98\x11\xd4\xb0\xe9\xddb5\xd8\x9e\x8eAO\xbe\xa7,\xa0RF\x96\xc9\x86x\xd1\x85\xee\xaa\xe3\xea\x02\xff\xa7\x16ix}\xc0%\x06r\xe2\xc7I\xff\xb1\x0e\x83\xd4\xc0#\xdeM\xb9+\n\xf2Si\xc1\xcc_\x90q#\x1b\xa6=\xe2-\xdaX\xb9\xac\xf6M\x1c1\xb0\x18\xadG\xf9\xe5\xe2\x87\xf3\x1e{\x8e\xe6\b\xbe!\xcdP\xe3\x85p\x04\xf7\xfcm\xe3\x05\xea\xce\xa6\xd5\xac\xf9z\x98\x18\x8a\x1c.\x02\xce\xc6\tI\x85\xe8\xb0\x84Pz\v\x18\x19\xea\x11\xf9C\x00\x00\x00\x00\x00', 0x5) fallocate(r0, 0x0, 0x2000028, 0x35e) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x0, @multicast1}, 0x10) 21:36:28 executing program 4: r0 = memfd_create(&(0x7f0000000180)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\x91\x1b\x80\x93\x81v\xc5o\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x97z\xd9c\xecR\xd6\xe8\xf3Y\x12\"p^\xc1\x0f\x00\x00\x00\x00\x00\x00\x00t\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00Y\x8f\xc6S[\xceS\xa1b \x1d\x14\xfc\x89\xad\xa2\x83V\x93\xb8\vT\x02bS\xcdqE$O\xdbW\x9b<\xc8~\"\x1c\xf5\xa2~\xa4I&RB\xf5\xa5\xc8\x85R\x10\x15\x8d.\xb1_\xedMe!\x9bm\xdd\xd4\xc0E<\"\x8c\a6D6\x13\x10\x02IEWax\xf6C\xa4\xf4#\xa8\xb9\x86\xd2101p1\x0f\xd8e\xda\xbb3W\x8b\x9e\xa5Ed9\xdb\xdap\xe5\xf0\xb1\xe7\x14\xdd_#\xe1*D1\x92\xe5\xef\xa7?\x8fi\xe5\x18\xe2nc\f\xd3\xb6\xa4\xa0\xe7\a}>nL\xd24\xb3\xb3[\xd3\x7f]4\\\xda\f\x91\xfb\xcf\xd5\x92\x9bc10ZK\x82a\x1e\x85;[6\xe6\x98\x11\xd4\xb0\xe9\xddb5\xd8\x9e\x8eAO\xbe\xa7,\xa0RF\x96\xc9\x86x\xd1\x85\xee\xaa\xe3\xea\x02\xff\xa7\x16ix}\xc0%\x06r\xe2\xc7I\xff\xb1\x0e\x83\xd4\xc0#\xdeM\xb9+\n\xf2Si\xc1\xcc_\x90q#\x1b\xa6=\xe2-\xdaX\xb9\xac\xf6M\x1c1\xb0\x18\xadG\xf9\xe5\xe2\x87\xf3\x1e{\x8e\xe6\b\xbe!\xcdP\xe3\x85p\x04\xf7\xfcm\xe3\x05\xea\xce\xa6\xd5\xac\xf9z\x98\x18\x8a\x1c.\x02\xce\xc6\tI\x85\xe8\xb0\x84Pz\v\x18\x19\xea\x11\xf9C\x00\x00\x00\x00\x00', 0x5) fallocate(r0, 0x0, 0x2000028, 0x35e) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x0, @multicast1}, 0x10) 21:36:28 executing program 2: r0 = memfd_create(&(0x7f0000000180)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\x91\x1b\x80\x93\x81v\xc5o\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x97z\xd9c\xecR\xd6\xe8\xf3Y\x12\"p^\xc1\x0f\x00\x00\x00\x00\x00\x00\x00t\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00Y\x8f\xc6S[\xceS\xa1b \x1d\x14\xfc\x89\xad\xa2\x83V\x93\xb8\vT\x02bS\xcdqE$O\xdbW\x9b<\xc8~\"\x1c\xf5\xa2~\xa4I&RB\xf5\xa5\xc8\x85R\x10\x15\x8d.\xb1_\xedMe!\x9bm\xdd\xd4\xc0E<\"\x8c\a6D6\x13\x10\x02IEWax\xf6C\xa4\xf4#\xa8\xb9\x86\xd2101p1\x0f\xd8e\xda\xbb3W\x8b\x9e\xa5Ed9\xdb\xdap\xe5\xf0\xb1\xe7\x14\xdd_#\xe1*D1\x92\xe5\xef\xa7?\x8fi\xe5\x18\xe2nc\f\xd3\xb6\xa4\xa0\xe7\a}>nL\xd24\xb3\xb3[\xd3\x7f]4\\\xda\f\x91\xfb\xcf\xd5\x92\x9bc10ZK\x82a\x1e\x85;[6\xe6\x98\x11\xd4\xb0\xe9\xddb5\xd8\x9e\x8eAO\xbe\xa7,\xa0RF\x96\xc9\x86x\xd1\x85\xee\xaa\xe3\xea\x02\xff\xa7\x16ix}\xc0%\x06r\xe2\xc7I\xff\xb1\x0e\x83\xd4\xc0#\xdeM\xb9+\n\xf2Si\xc1\xcc_\x90q#\x1b\xa6=\xe2-\xdaX\xb9\xac\xf6M\x1c1\xb0\x18\xadG\xf9\xe5\xe2\x87\xf3\x1e{\x8e\xe6\b\xbe!\xcdP\xe3\x85p\x04\xf7\xfcm\xe3\x05\xea\xce\xa6\xd5\xac\xf9z\x98\x18\x8a\x1c.\x02\xce\xc6\tI\x85\xe8\xb0\x84Pz\v\x18\x19\xea\x11\xf9C\x00\x00\x00\x00\x00', 0x5) fallocate(r0, 0x0, 0x2000028, 0x35e) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x0, @multicast1}, 0x10) [ 43.746312][ T2303] __ext4_new_inode+0xa56/0x2700 [ 43.751250][ T2303] ext4_symlink+0x2ba/0x6f0 [ 43.755752][ T2303] vfs_symlink+0x18a/0x280 [ 43.760166][ T2303] do_symlinkat+0xe2/0x330 [ 43.764581][ T2303] __x64_sys_symlinkat+0x5e/0x70 [ 43.769514][ T2303] do_syscall_64+0x2b/0x70 [ 43.773930][ T2303] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 43.779827][ T2303] [ 43.782138][ T2303] value changed: 0x1b6c -> 0x1b6b [ 43.787147][ T2303] [ 43.789469][ T2303] Reported by Kernel Concurrency Sanitizer on: 21:36:28 executing program 1: r0 = memfd_create(&(0x7f0000000180)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\x91\x1b\x80\x93\x81v\xc5o\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x97z\xd9c\xecR\xd6\xe8\xf3Y\x12\"p^\xc1\x0f\x00\x00\x00\x00\x00\x00\x00t\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00Y\x8f\xc6S[\xceS\xa1b \x1d\x14\xfc\x89\xad\xa2\x83V\x93\xb8\vT\x02bS\xcdqE$O\xdbW\x9b<\xc8~\"\x1c\xf5\xa2~\xa4I&RB\xf5\xa5\xc8\x85R\x10\x15\x8d.\xb1_\xedMe!\x9bm\xdd\xd4\xc0E<\"\x8c\a6D6\x13\x10\x02IEWax\xf6C\xa4\xf4#\xa8\xb9\x86\xd2101p1\x0f\xd8e\xda\xbb3W\x8b\x9e\xa5Ed9\xdb\xdap\xe5\xf0\xb1\xe7\x14\xdd_#\xe1*D1\x92\xe5\xef\xa7?\x8fi\xe5\x18\xe2nc\f\xd3\xb6\xa4\xa0\xe7\a}>nL\xd24\xb3\xb3[\xd3\x7f]4\\\xda\f\x91\xfb\xcf\xd5\x92\x9bc10ZK\x82a\x1e\x85;[6\xe6\x98\x11\xd4\xb0\xe9\xddb5\xd8\x9e\x8eAO\xbe\xa7,\xa0RF\x96\xc9\x86x\xd1\x85\xee\xaa\xe3\xea\x02\xff\xa7\x16ix}\xc0%\x06r\xe2\xc7I\xff\xb1\x0e\x83\xd4\xc0#\xdeM\xb9+\n\xf2Si\xc1\xcc_\x90q#\x1b\xa6=\xe2-\xdaX\xb9\xac\xf6M\x1c1\xb0\x18\xadG\xf9\xe5\xe2\x87\xf3\x1e{\x8e\xe6\b\xbe!\xcdP\xe3\x85p\x04\xf7\xfcm\xe3\x05\xea\xce\xa6\xd5\xac\xf9z\x98\x18\x8a\x1c.\x02\xce\xc6\tI\x85\xe8\xb0\x84Pz\v\x18\x19\xea\x11\xf9C\x00\x00\x00\x00\x00', 0x5) fallocate(r0, 0x0, 0x2000028, 0x35e) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x0, @multicast1}, 0x10) 21:36:28 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x80000001) r1 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f00000001c0)={0x8}, 0x4) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) [ 43.795606][ T2303] CPU: 0 PID: 2303 Comm: syz-executor.5 Not tainted 5.18.0-rc5-syzkaller-00207-g379c72654524 #0 [ 43.806020][ T2303] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 43.816165][ T2303] ================================================================== [ 43.847860][ T24] audit: type=1400 audit(1652045788.761:115): avc: denied { create } for pid=2319 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 43.875245][ T24] audit: type=1400 audit(1652045788.761:116): avc: denied { bind } for pid=2319 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 43.894854][ T24] audit: type=1400 audit(1652045788.761:117): avc: denied { name_bind } for pid=2319 comm="syz-executor.2" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=dccp_socket permissive=1 [ 43.915937][ T24] audit: type=1400 audit(1652045788.761:118): avc: denied { node_bind } for pid=2319 comm="syz-executor.2" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=dccp_socket permissive=1 21:36:28 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x80000001) r1 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f00000001c0)={0x8}, 0x4) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) 21:36:28 executing program 5: syz_emit_ethernet(0x46, &(0x7f0000000640)={@broadcast, @random="e0d35b1004bb", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x5, 0x24, 0x0, 0x3, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @local}, "00006371ae9b1c01"}}}}}, 0x0) 21:36:28 executing program 1: r0 = memfd_create(&(0x7f0000000180)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\x91\x1b\x80\x93\x81v\xc5o\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x97z\xd9c\xecR\xd6\xe8\xf3Y\x12\"p^\xc1\x0f\x00\x00\x00\x00\x00\x00\x00t\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00Y\x8f\xc6S[\xceS\xa1b \x1d\x14\xfc\x89\xad\xa2\x83V\x93\xb8\vT\x02bS\xcdqE$O\xdbW\x9b<\xc8~\"\x1c\xf5\xa2~\xa4I&RB\xf5\xa5\xc8\x85R\x10\x15\x8d.\xb1_\xedMe!\x9bm\xdd\xd4\xc0E<\"\x8c\a6D6\x13\x10\x02IEWax\xf6C\xa4\xf4#\xa8\xb9\x86\xd2101p1\x0f\xd8e\xda\xbb3W\x8b\x9e\xa5Ed9\xdb\xdap\xe5\xf0\xb1\xe7\x14\xdd_#\xe1*D1\x92\xe5\xef\xa7?\x8fi\xe5\x18\xe2nc\f\xd3\xb6\xa4\xa0\xe7\a}>nL\xd24\xb3\xb3[\xd3\x7f]4\\\xda\f\x91\xfb\xcf\xd5\x92\x9bc10ZK\x82a\x1e\x85;[6\xe6\x98\x11\xd4\xb0\xe9\xddb5\xd8\x9e\x8eAO\xbe\xa7,\xa0RF\x96\xc9\x86x\xd1\x85\xee\xaa\xe3\xea\x02\xff\xa7\x16ix}\xc0%\x06r\xe2\xc7I\xff\xb1\x0e\x83\xd4\xc0#\xdeM\xb9+\n\xf2Si\xc1\xcc_\x90q#\x1b\xa6=\xe2-\xdaX\xb9\xac\xf6M\x1c1\xb0\x18\xadG\xf9\xe5\xe2\x87\xf3\x1e{\x8e\xe6\b\xbe!\xcdP\xe3\x85p\x04\xf7\xfcm\xe3\x05\xea\xce\xa6\xd5\xac\xf9z\x98\x18\x8a\x1c.\x02\xce\xc6\tI\x85\xe8\xb0\x84Pz\v\x18\x19\xea\x11\xf9C\x00\x00\x00\x00\x00', 0x5) fallocate(r0, 0x0, 0x2000028, 0x35e) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x0, @multicast1}, 0x10) 21:36:28 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x80000001) r1 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f00000001c0)={0x8}, 0x4) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) 21:36:28 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000980)={0xffffffffffffffff}) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x1e, 0x0, 0x20001100) 21:36:28 executing program 3: r0 = fsopen(&(0x7f0000002c40)='sysfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) capset(&(0x7f0000000740)={0x19980330}, &(0x7f0000000780)) openat2(r1, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)={0x40}, 0x18) 21:36:28 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x80000001) r1 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f00000001c0)={0x8}, 0x4) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) 21:36:28 executing program 5: syz_emit_ethernet(0x46, &(0x7f0000000640)={@broadcast, @random="e0d35b1004bb", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x5, 0x24, 0x0, 0x3, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @local}, "00006371ae9b1c01"}}}}}, 0x0) 21:36:28 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x80000001) r1 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f00000001c0)={0x8}, 0x4) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) 21:36:28 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000980)={0xffffffffffffffff}) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x1e, 0x0, 0x20001100) 21:36:28 executing program 1: r0 = memfd_create(&(0x7f0000000180)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\x91\x1b\x80\x93\x81v\xc5o\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x97z\xd9c\xecR\xd6\xe8\xf3Y\x12\"p^\xc1\x0f\x00\x00\x00\x00\x00\x00\x00t\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00Y\x8f\xc6S[\xceS\xa1b \x1d\x14\xfc\x89\xad\xa2\x83V\x93\xb8\vT\x02bS\xcdqE$O\xdbW\x9b<\xc8~\"\x1c\xf5\xa2~\xa4I&RB\xf5\xa5\xc8\x85R\x10\x15\x8d.\xb1_\xedMe!\x9bm\xdd\xd4\xc0E<\"\x8c\a6D6\x13\x10\x02IEWax\xf6C\xa4\xf4#\xa8\xb9\x86\xd2101p1\x0f\xd8e\xda\xbb3W\x8b\x9e\xa5Ed9\xdb\xdap\xe5\xf0\xb1\xe7\x14\xdd_#\xe1*D1\x92\xe5\xef\xa7?\x8fi\xe5\x18\xe2nc\f\xd3\xb6\xa4\xa0\xe7\a}>nL\xd24\xb3\xb3[\xd3\x7f]4\\\xda\f\x91\xfb\xcf\xd5\x92\x9bc10ZK\x82a\x1e\x85;[6\xe6\x98\x11\xd4\xb0\xe9\xddb5\xd8\x9e\x8eAO\xbe\xa7,\xa0RF\x96\xc9\x86x\xd1\x85\xee\xaa\xe3\xea\x02\xff\xa7\x16ix}\xc0%\x06r\xe2\xc7I\xff\xb1\x0e\x83\xd4\xc0#\xdeM\xb9+\n\xf2Si\xc1\xcc_\x90q#\x1b\xa6=\xe2-\xdaX\xb9\xac\xf6M\x1c1\xb0\x18\xadG\xf9\xe5\xe2\x87\xf3\x1e{\x8e\xe6\b\xbe!\xcdP\xe3\x85p\x04\xf7\xfcm\xe3\x05\xea\xce\xa6\xd5\xac\xf9z\x98\x18\x8a\x1c.\x02\xce\xc6\tI\x85\xe8\xb0\x84Pz\v\x18\x19\xea\x11\xf9C\x00\x00\x00\x00\x00', 0x5) fallocate(r0, 0x0, 0x2000028, 0x35e) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x0, @multicast1}, 0x10) 21:36:28 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x80000001) r1 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f00000001c0)={0x8}, 0x4) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) 21:36:29 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000980)={0xffffffffffffffff}) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x1e, 0x0, 0x20001100) 21:36:29 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x2c, &(0x7f0000000580)=[@in6={0xa, 0x4e24, 0x0, @private1}, @in={0x2, 0x4e24, @remote}]}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x84, &(0x7f0000000000)={0x0, @in6={{0xa, 0x4e24, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}}}, 0x90) 21:36:29 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x80000001) r1 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f00000001c0)={0x8}, 0x4) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) 21:36:29 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f00000016c0)={0x0, 0x0, 0x20}, &(0x7f0000001700)=0x18) 21:36:29 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000980)={0xffffffffffffffff}) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x1e, 0x0, 0x20001100) [ 44.063289][ T2340] capability: warning: `syz-executor.3' uses 32-bit capabilities (legacy support in use) 21:36:29 executing program 3: r0 = fsopen(&(0x7f0000002c40)='sysfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) capset(&(0x7f0000000740)={0x19980330}, &(0x7f0000000780)) openat2(r1, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)={0x40}, 0x18) 21:36:29 executing program 4: mremap(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000008000/0x3000)=nil) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x80000000001, 0x4) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xfffffffffffffd18, 0x840, 0x0, 0x0) 21:36:29 executing program 3: r0 = fsopen(&(0x7f0000002c40)='sysfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) capset(&(0x7f0000000740)={0x19980330}, &(0x7f0000000780)) openat2(r1, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)={0x40}, 0x18) 21:36:29 executing program 1: syz_mount_image$ext4(&(0x7f00000002c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f", 0xf, 0x800}, {&(0x7f0000010400)="ffffff03000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x802, 0x1000}, {&(0x7f0000011500)="ed41000000080000d3f4655fd3f4655fd3f4655f000000000000040004", 0x1d, 0x2200}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000080)='./bus\x00', 0x14d842, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000005) 21:36:29 executing program 0: r0 = memfd_create(&(0x7f0000000180)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\x91\x1b\x80\x93\x81v\xc5o\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x97z\xd9c\xecR\xd6\xe8\xf3Y\x12\"p^\xc1\x0f\x00\x00\x00\x00\x00\x00\x00t\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00', 0x0) fallocate(r0, 0x0, 0x2000428, 0x1) write(r0, &(0x7f0000000140)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) write(r0, &(0x7f0000000080)="5921527b06da0760a260f636c6b301384e65832b428986dfb28351b3cea31d5d3755ddd32606cd41dcb6939ae2db0dee58d611", 0x33) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x100000c, 0x11, r0, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) 21:36:29 executing program 4: mremap(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000008000/0x3000)=nil) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x80000000001, 0x4) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xfffffffffffffd18, 0x840, 0x0, 0x0) 21:36:29 executing program 0: r0 = memfd_create(&(0x7f0000000180)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\x91\x1b\x80\x93\x81v\xc5o\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x97z\xd9c\xecR\xd6\xe8\xf3Y\x12\"p^\xc1\x0f\x00\x00\x00\x00\x00\x00\x00t\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00', 0x0) fallocate(r0, 0x0, 0x2000428, 0x1) write(r0, &(0x7f0000000140)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) write(r0, &(0x7f0000000080)="5921527b06da0760a260f636c6b301384e65832b428986dfb28351b3cea31d5d3755ddd32606cd41dcb6939ae2db0dee58d611", 0x33) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x100000c, 0x11, r0, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) 21:36:29 executing program 2: mremap(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000008000/0x3000)=nil) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x80000000001, 0x4) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xfffffffffffffd18, 0x840, 0x0, 0x0) [ 44.160910][ T2369] loop1: detected capacity change from 0 to 512 [ 44.197051][ T2369] EXT4-fs (loop1): mounted filesystem without journal. Quota mode: none. 21:36:29 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x2c, &(0x7f0000000580)=[@in6={0xa, 0x4e24, 0x0, @private1}, @in={0x2, 0x4e24, @remote}]}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x84, &(0x7f0000000000)={0x0, @in6={{0xa, 0x4e24, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}}}, 0x90) 21:36:29 executing program 4: mremap(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000008000/0x3000)=nil) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x80000000001, 0x4) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xfffffffffffffd18, 0x840, 0x0, 0x0) 21:36:29 executing program 3: r0 = fsopen(&(0x7f0000002c40)='sysfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) capset(&(0x7f0000000740)={0x19980330}, &(0x7f0000000780)) openat2(r1, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)={0x40}, 0x18) 21:36:29 executing program 0: r0 = memfd_create(&(0x7f0000000180)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\x91\x1b\x80\x93\x81v\xc5o\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x97z\xd9c\xecR\xd6\xe8\xf3Y\x12\"p^\xc1\x0f\x00\x00\x00\x00\x00\x00\x00t\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00', 0x0) fallocate(r0, 0x0, 0x2000428, 0x1) write(r0, &(0x7f0000000140)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) write(r0, &(0x7f0000000080)="5921527b06da0760a260f636c6b301384e65832b428986dfb28351b3cea31d5d3755ddd32606cd41dcb6939ae2db0dee58d611", 0x33) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x100000c, 0x11, r0, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) 21:36:29 executing program 2: mremap(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000008000/0x3000)=nil) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x80000000001, 0x4) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xfffffffffffffd18, 0x840, 0x0, 0x0) 21:36:29 executing program 1: syz_mount_image$ext4(&(0x7f00000002c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f", 0xf, 0x800}, {&(0x7f0000010400)="ffffff03000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x802, 0x1000}, {&(0x7f0000011500)="ed41000000080000d3f4655fd3f4655fd3f4655f000000000000040004", 0x1d, 0x2200}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000080)='./bus\x00', 0x14d842, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000005) 21:36:29 executing program 0: r0 = memfd_create(&(0x7f0000000180)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\x91\x1b\x80\x93\x81v\xc5o\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x97z\xd9c\xecR\xd6\xe8\xf3Y\x12\"p^\xc1\x0f\x00\x00\x00\x00\x00\x00\x00t\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00', 0x0) fallocate(r0, 0x0, 0x2000428, 0x1) write(r0, &(0x7f0000000140)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) write(r0, &(0x7f0000000080)="5921527b06da0760a260f636c6b301384e65832b428986dfb28351b3cea31d5d3755ddd32606cd41dcb6939ae2db0dee58d611", 0x33) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x100000c, 0x11, r0, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) 21:36:29 executing program 3: syz_mount_image$ext4(&(0x7f00000002c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f", 0xf, 0x800}, {&(0x7f0000010400)="ffffff03000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x802, 0x1000}, {&(0x7f0000011500)="ed41000000080000d3f4655fd3f4655fd3f4655f000000000000040004", 0x1d, 0x2200}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000080)='./bus\x00', 0x14d842, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000005) 21:36:29 executing program 4: mremap(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000008000/0x3000)=nil) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x80000000001, 0x4) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xfffffffffffffd18, 0x840, 0x0, 0x0) 21:36:29 executing program 2: mremap(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000008000/0x3000)=nil) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x80000000001, 0x4) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xfffffffffffffd18, 0x840, 0x0, 0x0) 21:36:29 executing program 2: syz_mount_image$ext4(&(0x7f00000002c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f", 0xf, 0x800}, {&(0x7f0000010400)="ffffff03000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x802, 0x1000}, {&(0x7f0000011500)="ed41000000080000d3f4655fd3f4655fd3f4655f000000000000040004", 0x1d, 0x2200}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000080)='./bus\x00', 0x14d842, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000005) [ 44.952830][ T2384] loop1: detected capacity change from 0 to 512 [ 44.974164][ T2384] EXT4-fs (loop1): mounted filesystem without journal. Quota mode: none. 21:36:29 executing program 1: syz_mount_image$ext4(&(0x7f00000002c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f", 0xf, 0x800}, {&(0x7f0000010400)="ffffff03000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x802, 0x1000}, {&(0x7f0000011500)="ed41000000080000d3f4655fd3f4655fd3f4655f000000000000040004", 0x1d, 0x2200}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000080)='./bus\x00', 0x14d842, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000005) [ 45.013635][ T2400] loop2: detected capacity change from 0 to 512 [ 45.021487][ T2399] loop3: detected capacity change from 0 to 512 [ 45.035518][ T2400] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 45.040094][ T2399] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: none. [ 45.105830][ T2407] loop1: detected capacity change from 0 to 512 [ 45.120878][ T2407] EXT4-fs (loop1): mounted filesystem without journal. Quota mode: none. 21:36:30 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x2c, &(0x7f0000000580)=[@in6={0xa, 0x4e24, 0x0, @private1}, @in={0x2, 0x4e24, @remote}]}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x84, &(0x7f0000000000)={0x0, @in6={{0xa, 0x4e24, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}}}, 0x90) 21:36:30 executing program 0: syz_mount_image$ext4(&(0x7f00000002c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f", 0xf, 0x800}, {&(0x7f0000010400)="ffffff03000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x802, 0x1000}, {&(0x7f0000011500)="ed41000000080000d3f4655fd3f4655fd3f4655f000000000000040004", 0x1d, 0x2200}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000080)='./bus\x00', 0x14d842, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000005) 21:36:30 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETSF2(r0, 0x402c542d, &(0x7f0000000040)={0x0, 0x0, 0xffff, 0x0, 0x0, "3e61e5ad3229301d8ff6ceff0016b6102d1158"}) 21:36:30 executing program 2: syz_mount_image$ext4(&(0x7f00000002c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f", 0xf, 0x800}, {&(0x7f0000010400)="ffffff03000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x802, 0x1000}, {&(0x7f0000011500)="ed41000000080000d3f4655fd3f4655fd3f4655f000000000000040004", 0x1d, 0x2200}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000080)='./bus\x00', 0x14d842, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000005) 21:36:30 executing program 3: syz_mount_image$ext4(&(0x7f00000002c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f", 0xf, 0x800}, {&(0x7f0000010400)="ffffff03000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x802, 0x1000}, {&(0x7f0000011500)="ed41000000080000d3f4655fd3f4655fd3f4655f000000000000040004", 0x1d, 0x2200}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000080)='./bus\x00', 0x14d842, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000005) 21:36:30 executing program 1: syz_mount_image$ext4(&(0x7f00000002c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f", 0xf, 0x800}, {&(0x7f0000010400)="ffffff03000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x802, 0x1000}, {&(0x7f0000011500)="ed41000000080000d3f4655fd3f4655fd3f4655f000000000000040004", 0x1d, 0x2200}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000080)='./bus\x00', 0x14d842, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000005) 21:36:30 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETSF2(r0, 0x402c542d, &(0x7f0000000040)={0x0, 0x0, 0xffff, 0x0, 0x0, "3e61e5ad3229301d8ff6ceff0016b6102d1158"}) [ 45.815653][ T2415] loop3: detected capacity change from 0 to 512 [ 45.816510][ T2416] loop1: detected capacity change from 0 to 512 [ 45.823078][ T2417] loop0: detected capacity change from 0 to 512 [ 45.829424][ T2418] loop2: detected capacity change from 0 to 512 [ 45.845787][ T2415] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: none. [ 45.850727][ T2416] EXT4-fs (loop1): mounted filesystem without journal. Quota mode: none. 21:36:30 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETSF2(r0, 0x402c542d, &(0x7f0000000040)={0x0, 0x0, 0xffff, 0x0, 0x0, "3e61e5ad3229301d8ff6ceff0016b6102d1158"}) 21:36:30 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETSF2(r0, 0x402c542d, &(0x7f0000000040)={0x0, 0x0, 0xffff, 0x0, 0x0, "3e61e5ad3229301d8ff6ceff0016b6102d1158"}) 21:36:30 executing program 3: syz_mount_image$ext4(&(0x7f00000002c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f", 0xf, 0x800}, {&(0x7f0000010400)="ffffff03000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x802, 0x1000}, {&(0x7f0000011500)="ed41000000080000d3f4655fd3f4655fd3f4655f000000000000040004", 0x1d, 0x2200}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000080)='./bus\x00', 0x14d842, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000005) 21:36:30 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000400)={0x28, 0x3, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x28}}, 0x0) [ 45.871483][ T2417] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: none. [ 45.893162][ T2418] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. 21:36:30 executing program 0: syz_mount_image$ext4(&(0x7f00000002c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f", 0xf, 0x800}, {&(0x7f0000010400)="ffffff03000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x802, 0x1000}, {&(0x7f0000011500)="ed41000000080000d3f4655fd3f4655fd3f4655f000000000000040004", 0x1d, 0x2200}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000080)='./bus\x00', 0x14d842, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000005) [ 45.965855][ T2436] loop3: detected capacity change from 0 to 512 [ 45.992440][ T2436] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: none. [ 45.994475][ T2440] loop0: detected capacity change from 0 to 512 [ 46.012926][ T2440] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: none. 21:36:31 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x2c, &(0x7f0000000580)=[@in6={0xa, 0x4e24, 0x0, @private1}, @in={0x2, 0x4e24, @remote}]}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x84, &(0x7f0000000000)={0x0, @in6={{0xa, 0x4e24, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}}}, 0x90) 21:36:31 executing program 1: r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c1142, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000200), 0x175d900f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x9) 21:36:31 executing program 2: syz_mount_image$ext4(&(0x7f00000002c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f", 0xf, 0x800}, {&(0x7f0000010400)="ffffff03000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x802, 0x1000}, {&(0x7f0000011500)="ed41000000080000d3f4655fd3f4655fd3f4655f000000000000040004", 0x1d, 0x2200}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000080)='./bus\x00', 0x14d842, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000005) 21:36:31 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000400)={0x28, 0x3, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x28}}, 0x0) 21:36:31 executing program 3: r0 = perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000180)='\xf3-\x00') 21:36:31 executing program 0: syz_mount_image$ext4(&(0x7f00000002c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f", 0xf, 0x800}, {&(0x7f0000010400)="ffffff03000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x802, 0x1000}, {&(0x7f0000011500)="ed41000000080000d3f4655fd3f4655fd3f4655f000000000000040004", 0x1d, 0x2200}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000080)='./bus\x00', 0x14d842, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000005) 21:36:31 executing program 3: r0 = perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000180)='\xf3-\x00') [ 46.685755][ T2446] loop2: detected capacity change from 0 to 512 [ 46.692641][ T2449] loop0: detected capacity change from 0 to 512 21:36:31 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000400)={0x28, 0x3, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x28}}, 0x0) 21:36:31 executing program 3: r0 = perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000180)='\xf3-\x00') 21:36:31 executing program 3: r0 = perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000180)='\xf3-\x00') [ 46.737075][ T2446] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 46.746472][ T2449] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: none. 21:36:31 executing program 3: syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000680), 0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB='shortname=win95,shortname=lower,nonumtail=0,utf8=0,quiet']) 21:36:31 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000400)={0x28, 0x3, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x28}}, 0x0) [ 46.855446][ T2468] FAT-fs (loop3): bogus number of reserved sectors [ 46.862023][ T2468] FAT-fs (loop3): Can't find a valid FAT filesystem 21:36:32 executing program 3: syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000680), 0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB='shortname=win95,shortname=lower,nonumtail=0,utf8=0,quiet']) 21:36:32 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$tmpfs(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000400), 0x0, &(0x7f00000000c0)={[{@mpol={'mpol', 0x3d, {'prefer', '', @val={0x3a, [0x30, 0x2d, 0x34, 0x3a, 0x32, 0x2f, 0x33]}}}}]}) 21:36:32 executing program 2: r0 = socket$tipc(0x1e, 0x5, 0x0) sendmsg$tipc(r0, &(0x7f0000002540)={&(0x7f0000000000)=@id, 0x10, &(0x7f00000014c0)=[{&(0x7f0000000140)=')', 0x1}], 0x1}, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x42}, 0x10) recvmmsg(r0, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000000c0)=""/99, 0x63}], 0x1, &(0x7f00000002c0)=""/65, 0x41}}], 0x1, 0x0, 0x0) 21:36:32 executing program 1: r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c1142, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000200), 0x175d900f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x9) 21:36:32 executing program 4: r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c1142, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000200), 0x175d900f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x9) 21:36:32 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x65, 0x6) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETOBJ(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000380)={0x20, 0x13, 0xa, 0x201, 0x0, 0x0, {}, [@NFTA_OBJ_TABLE={0x9, 0x1, 'syz0\x00'}]}, 0x20}}, 0x0) 21:36:32 executing program 2: r0 = socket$tipc(0x1e, 0x5, 0x0) sendmsg$tipc(r0, &(0x7f0000002540)={&(0x7f0000000000)=@id, 0x10, &(0x7f00000014c0)=[{&(0x7f0000000140)=')', 0x1}], 0x1}, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x42}, 0x10) recvmmsg(r0, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000000c0)=""/99, 0x63}], 0x1, &(0x7f00000002c0)=""/65, 0x41}}], 0x1, 0x0, 0x0) 21:36:32 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$tmpfs(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000400), 0x0, &(0x7f00000000c0)={[{@mpol={'mpol', 0x3d, {'prefer', '', @val={0x3a, [0x30, 0x2d, 0x34, 0x3a, 0x32, 0x2f, 0x33]}}}}]}) [ 47.564141][ T2479] tmpfs: Bad value for 'mpol' 21:36:32 executing program 2: r0 = socket$tipc(0x1e, 0x5, 0x0) sendmsg$tipc(r0, &(0x7f0000002540)={&(0x7f0000000000)=@id, 0x10, &(0x7f00000014c0)=[{&(0x7f0000000140)=')', 0x1}], 0x1}, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x42}, 0x10) recvmmsg(r0, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000000c0)=""/99, 0x63}], 0x1, &(0x7f00000002c0)=""/65, 0x41}}], 0x1, 0x0, 0x0) 21:36:32 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x65, 0x6) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETOBJ(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000380)={0x20, 0x13, 0xa, 0x201, 0x0, 0x0, {}, [@NFTA_OBJ_TABLE={0x9, 0x1, 'syz0\x00'}]}, 0x20}}, 0x0) 21:36:32 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$tmpfs(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000400), 0x0, &(0x7f00000000c0)={[{@mpol={'mpol', 0x3d, {'prefer', '', @val={0x3a, [0x30, 0x2d, 0x34, 0x3a, 0x32, 0x2f, 0x33]}}}}]}) 21:36:32 executing program 2: r0 = socket$tipc(0x1e, 0x5, 0x0) sendmsg$tipc(r0, &(0x7f0000002540)={&(0x7f0000000000)=@id, 0x10, &(0x7f00000014c0)=[{&(0x7f0000000140)=')', 0x1}], 0x1}, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x42}, 0x10) recvmmsg(r0, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000000c0)=""/99, 0x63}], 0x1, &(0x7f00000002c0)=""/65, 0x41}}], 0x1, 0x0, 0x0) [ 47.591449][ T2484] tmpfs: Bad value for 'mpol' [ 47.594698][ T2480] FAT-fs (loop3): bogus number of reserved sectors [ 47.602689][ T2480] FAT-fs (loop3): Can't find a valid FAT filesystem 21:36:32 executing program 3: syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000680), 0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB='shortname=win95,shortname=lower,nonumtail=0,utf8=0,quiet']) 21:36:32 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x65, 0x6) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETOBJ(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000380)={0x20, 0x13, 0xa, 0x201, 0x0, 0x0, {}, [@NFTA_OBJ_TABLE={0x9, 0x1, 'syz0\x00'}]}, 0x20}}, 0x0) [ 47.649704][ T2494] tmpfs: Bad value for 'mpol' 21:36:32 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$tmpfs(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000400), 0x0, &(0x7f00000000c0)={[{@mpol={'mpol', 0x3d, {'prefer', '', @val={0x3a, [0x30, 0x2d, 0x34, 0x3a, 0x32, 0x2f, 0x33]}}}}]}) [ 47.703059][ T2500] FAT-fs (loop3): bogus number of reserved sectors [ 47.709632][ T2500] FAT-fs (loop3): Can't find a valid FAT filesystem [ 47.730816][ T2502] tmpfs: Bad value for 'mpol' 21:36:32 executing program 1: r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c1142, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000200), 0x175d900f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x9) 21:36:32 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0x65, 0x6) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETOBJ(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000380)={0x20, 0x13, 0xa, 0x201, 0x0, 0x0, {}, [@NFTA_OBJ_TABLE={0x9, 0x1, 'syz0\x00'}]}, 0x20}}, 0x0) 21:36:32 executing program 2: r0 = socket$tipc(0x1e, 0x5, 0x0) sendmsg$tipc(r0, &(0x7f0000002540)={&(0x7f0000000000)=@id, 0x10, &(0x7f00000014c0)=[{&(0x7f0000000140)=')', 0x1}], 0x1}, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x42}, 0x10) recvmmsg(r0, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000000c0)=""/99, 0x63}], 0x1, &(0x7f00000002c0)=""/65, 0x41}}], 0x1, 0x0, 0x0) 21:36:32 executing program 0: syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000280)='./file0\x00', 0x300, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000000380)) 21:36:32 executing program 3: syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000680), 0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB='shortname=win95,shortname=lower,nonumtail=0,utf8=0,quiet']) 21:36:32 executing program 4: r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c1142, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000200), 0x175d900f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x9) 21:36:32 executing program 5: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'tunl0\x00', &(0x7f0000000000)={'gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x8, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @local}}}}) 21:36:32 executing program 2: r0 = socket$tipc(0x1e, 0x5, 0x0) sendmsg$tipc(r0, &(0x7f0000002540)={&(0x7f0000000000)=@id, 0x10, &(0x7f00000014c0)=[{&(0x7f0000000140)=')', 0x1}], 0x1}, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x42}, 0x10) recvmmsg(r0, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000000c0)=""/99, 0x63}], 0x1, &(0x7f00000002c0)=""/65, 0x41}}], 0x1, 0x0, 0x0) 21:36:32 executing program 2: r0 = socket$tipc(0x1e, 0x5, 0x0) sendmsg$tipc(r0, &(0x7f0000002540)={&(0x7f0000000000)=@id, 0x10, &(0x7f00000014c0)=[{&(0x7f0000000140)=')', 0x1}], 0x1}, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x42}, 0x10) recvmmsg(r0, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000000c0)=""/99, 0x63}], 0x1, &(0x7f00000002c0)=""/65, 0x41}}], 0x1, 0x0, 0x0) [ 47.932533][ T2510] loop0: detected capacity change from 0 to 1 [ 47.942092][ T2507] FAT-fs (loop3): bogus number of reserved sectors [ 47.948648][ T2507] FAT-fs (loop3): Can't find a valid FAT filesystem [ 47.959774][ T2510] FAT-fs (loop0): bogus number of reserved sectors [ 47.966381][ T2510] FAT-fs (loop0): Can't find a valid FAT filesystem [ 47.967977][ T2513] syz-executor.5 uses obsolete (PF_INET,SOCK_PACKET) 21:36:32 executing program 3: r0 = syz_io_uring_setup(0x7c7c, &(0x7f00000000c0), &(0x7f0000148000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000340)=0x0, &(0x7f0000000140)=0x0) r3 = socket$inet_smc(0x2b, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000000)=@in={0x2, 0x0, @dev}}, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x0, 0x0, 0x4) setsockopt$IP_VS_SO_SET_TIMEOUT(r3, 0x0, 0x60, &(0x7f0000000080), 0xc) 21:36:32 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f00000000c0)=0x6) r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000780)=@deltaction={0x18, 0x30, 0x1, 0x0, 0x0, {}, [@TCA_ACT_TAB={0x4}]}, 0x18}}, 0x0) 21:36:32 executing program 0: syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000280)='./file0\x00', 0x300, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000000380)) [ 48.046298][ T2526] loop0: detected capacity change from 0 to 1 [ 48.083525][ T2526] FAT-fs (loop0): bogus number of reserved sectors [ 48.090524][ T2526] FAT-fs (loop0): Can't find a valid FAT filesystem 21:36:33 executing program 1: r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c1142, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000200), 0x175d900f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x9) 21:36:33 executing program 5: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'tunl0\x00', &(0x7f0000000000)={'gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x8, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @local}}}}) 21:36:33 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f00000000c0)=0x6) r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000780)=@deltaction={0x18, 0x30, 0x1, 0x0, 0x0, {}, [@TCA_ACT_TAB={0x4}]}, 0x18}}, 0x0) 21:36:33 executing program 3: r0 = syz_io_uring_setup(0x7c7c, &(0x7f00000000c0), &(0x7f0000148000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000340)=0x0, &(0x7f0000000140)=0x0) r3 = socket$inet_smc(0x2b, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000000)=@in={0x2, 0x0, @dev}}, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x0, 0x0, 0x4) setsockopt$IP_VS_SO_SET_TIMEOUT(r3, 0x0, 0x60, &(0x7f0000000080), 0xc) 21:36:33 executing program 0: syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000280)='./file0\x00', 0x300, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000000380)) 21:36:33 executing program 4: r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c1142, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000200), 0x175d900f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x9) 21:36:33 executing program 5: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'tunl0\x00', &(0x7f0000000000)={'gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x8, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @local}}}}) 21:36:33 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f00000000c0)=0x6) r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000780)=@deltaction={0x18, 0x30, 0x1, 0x0, 0x0, {}, [@TCA_ACT_TAB={0x4}]}, 0x18}}, 0x0) 21:36:33 executing program 5: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'tunl0\x00', &(0x7f0000000000)={'gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x8, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @local}}}}) 21:36:33 executing program 3: r0 = syz_io_uring_setup(0x7c7c, &(0x7f00000000c0), &(0x7f0000148000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000340)=0x0, &(0x7f0000000140)=0x0) r3 = socket$inet_smc(0x2b, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000000)=@in={0x2, 0x0, @dev}}, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x0, 0x0, 0x4) setsockopt$IP_VS_SO_SET_TIMEOUT(r3, 0x0, 0x60, &(0x7f0000000080), 0xc) 21:36:33 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f00000000c0)=0x6) r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000780)=@deltaction={0x18, 0x30, 0x1, 0x0, 0x0, {}, [@TCA_ACT_TAB={0x4}]}, 0x18}}, 0x0) [ 48.317071][ T2536] loop0: detected capacity change from 0 to 1 [ 48.332387][ T2536] FAT-fs (loop0): bogus number of reserved sectors [ 48.338952][ T2536] FAT-fs (loop0): Can't find a valid FAT filesystem 21:36:33 executing program 0: syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000280)='./file0\x00', 0x300, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000000380)) [ 48.427524][ T2555] loop0: detected capacity change from 0 to 1 [ 48.446179][ T2555] FAT-fs (loop0): bogus number of reserved sectors [ 48.452779][ T2555] FAT-fs (loop0): Can't find a valid FAT filesystem 21:36:33 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000d80), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000040)={0x38, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0xc, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0x4}]}, @ETHTOOL_A_DEBUG_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0x38}}, 0x0) 21:36:33 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0x7, 0x407f, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000680), 0x20000000}, 0x20) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000200)={r0, &(0x7f0000000100)='0', 0x0}, 0x20) 21:36:33 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r0, 0x80045301, &(0x7f00000000c0)) 21:36:33 executing program 3: r0 = syz_io_uring_setup(0x7c7c, &(0x7f00000000c0), &(0x7f0000148000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000340)=0x0, &(0x7f0000000140)=0x0) r3 = socket$inet_smc(0x2b, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000000)=@in={0x2, 0x0, @dev}}, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x0, 0x0, 0x4) setsockopt$IP_VS_SO_SET_TIMEOUT(r3, 0x0, 0x60, &(0x7f0000000080), 0xc) 21:36:33 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000140)=@newlink={0x48, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth0_vlan\x00'}, @IFLA_VFINFO_LIST={0x14, 0x16, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0xffffffe1}}]}]}]}, 0x48}}, 0x0) 21:36:33 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000140)='./file0\x00', 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) move_mount(r1, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00', 0x130) 21:36:33 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000140)=@newlink={0x48, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth0_vlan\x00'}, @IFLA_VFINFO_LIST={0x14, 0x16, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0xffffffe1}}]}]}]}, 0x48}}, 0x0) 21:36:33 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000140)=@newlink={0x48, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth0_vlan\x00'}, @IFLA_VFINFO_LIST={0x14, 0x16, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0xffffffe1}}]}]}]}, 0x48}}, 0x0) 21:36:33 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0x7, 0x407f, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000680), 0x20000000}, 0x20) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000200)={r0, &(0x7f0000000100)='0', 0x0}, 0x20) 21:36:33 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000d80), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000040)={0x38, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0xc, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0x4}]}, @ETHTOOL_A_DEBUG_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0x38}}, 0x0) 21:36:33 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000140)=@newlink={0x48, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth0_vlan\x00'}, @IFLA_VFINFO_LIST={0x14, 0x16, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0xffffffe1}}]}]}]}, 0x48}}, 0x0) 21:36:33 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@base={0xa, 0x77, 0x5, 0x6}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000080), 0x20000000}, 0x20) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000800), &(0x7f0000000200)=""/230, 0x2}, 0x20) 21:36:33 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0x7, 0x407f, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000680), 0x20000000}, 0x20) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000200)={r0, &(0x7f0000000100)='0', 0x0}, 0x20) 21:36:33 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r0, 0x80045301, &(0x7f00000000c0)) 21:36:33 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000d80), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000040)={0x38, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0xc, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0x4}]}, @ETHTOOL_A_DEBUG_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0x38}}, 0x0) 21:36:33 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000140)='./file0\x00', 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) move_mount(r1, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00', 0x130) 21:36:33 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@base={0xa, 0x77, 0x5, 0x6}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000080), 0x20000000}, 0x20) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000800), &(0x7f0000000200)=""/230, 0x2}, 0x20) 21:36:33 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@base={0xa, 0x77, 0x5, 0x6}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000080), 0x20000000}, 0x20) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000800), &(0x7f0000000200)=""/230, 0x2}, 0x20) 21:36:33 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r0, 0x80045301, &(0x7f00000000c0)) 21:36:33 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0x7, 0x407f, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000680), 0x20000000}, 0x20) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000200)={r0, &(0x7f0000000100)='0', 0x0}, 0x20) 21:36:33 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@base={0xa, 0x77, 0x5, 0x6}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000080), 0x20000000}, 0x20) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000800), &(0x7f0000000200)=""/230, 0x2}, 0x20) 21:36:33 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000d80), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000040)={0x38, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0xc, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0x4}]}, @ETHTOOL_A_DEBUG_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0x38}}, 0x0) 21:36:33 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000140)='./file0\x00', 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) move_mount(r1, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00', 0x130) 21:36:33 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@base={0xa, 0x77, 0x5, 0x6}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000080), 0x20000000}, 0x20) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000800), &(0x7f0000000200)=""/230, 0x2}, 0x20) 21:36:33 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@base={0xa, 0x77, 0x5, 0x6}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000080), 0x20000000}, 0x20) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000800), &(0x7f0000000200)=""/230, 0x2}, 0x20) [ 48.772990][ T24] kauditd_printk_skb: 31 callbacks suppressed [ 48.773003][ T24] audit: type=1400 audit(1652045793.691:150): avc: denied { bpf } for pid=2579 comm="syz-executor.3" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 21:36:33 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000140)='./file0\x00', 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) move_mount(r1, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00', 0x130) 21:36:33 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r0, 0x80045301, &(0x7f00000000c0)) 21:36:33 executing program 5: r0 = epoll_create(0x7ff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000140)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000000)={0x7}) 21:36:33 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001240)={0x7, 0x4, &(0x7f0000001100)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x38}]}, &(0x7f0000000000)='syzkaller\x00', 0x4, 0x1000, &(0x7f0000000100)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 21:36:33 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_timeval(r0, 0x1, 0xf, 0x0, &(0x7f0000000080)) 21:36:33 executing program 5: r0 = epoll_create(0x7ff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000140)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000000)={0x7}) 21:36:33 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@base={0xa, 0x77, 0x5, 0x6}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000080), 0x20000000}, 0x20) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000800), &(0x7f0000000200)=""/230, 0x2}, 0x20) 21:36:33 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r0, 0x10e, 0xb, 0x0, &(0x7f0000000000)) 21:36:33 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x7}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x64, 0x9, 0xa, 0x401, 0x0, 0x0, {0x7}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x21}, @NFTA_SET_EXPR={0x28, 0x11, 0x0, 0x1, @ct={{0x7}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_CT_DREG={0x8}, @NFTA_CT_DIRECTION={0x5}, @NFTA_CT_KEY={0x8, 0x2, 0x1, 0x0, 0xd}]}}}]}], {0x14, 0x10}}, 0xac}}, 0x0) 21:36:33 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001240)={0x7, 0x4, &(0x7f0000001100)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x38}]}, &(0x7f0000000000)='syzkaller\x00', 0x4, 0x1000, &(0x7f0000000100)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 21:36:33 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_timeval(r0, 0x1, 0xf, 0x0, &(0x7f0000000080)) 21:36:33 executing program 5: r0 = epoll_create(0x7ff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000140)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000000)={0x7}) 21:36:33 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000080)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x15}, [@ldst={0x5}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0), 0x366, 0x10, &(0x7f0000000000), 0x2b2}, 0x48) 21:36:33 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_timeval(r0, 0x1, 0xf, 0x0, &(0x7f0000000080)) [ 48.908368][ T24] audit: type=1400 audit(1652045793.821:151): avc: denied { prog_load } for pid=2619 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 21:36:33 executing program 5: r0 = epoll_create(0x7ff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000140)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000000)={0x7}) 21:36:33 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001240)={0x7, 0x4, &(0x7f0000001100)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x38}]}, &(0x7f0000000000)='syzkaller\x00', 0x4, 0x1000, &(0x7f0000000100)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 21:36:33 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r0, 0x10e, 0xb, 0x0, &(0x7f0000000000)) 21:36:33 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000080)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x15}, [@ldst={0x5}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0), 0x366, 0x10, &(0x7f0000000000), 0x2b2}, 0x48) 21:36:33 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000000), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_ADD(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x38, r1, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x2}, {0x5, 0x3, 0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x1}]}, 0x38}}, 0x0) 21:36:33 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x7}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x64, 0x9, 0xa, 0x401, 0x0, 0x0, {0x7}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x21}, @NFTA_SET_EXPR={0x28, 0x11, 0x0, 0x1, @ct={{0x7}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_CT_DREG={0x8}, @NFTA_CT_DIRECTION={0x5}, @NFTA_CT_KEY={0x8, 0x2, 0x1, 0x0, 0xd}]}}}]}], {0x14, 0x10}}, 0xac}}, 0x0) 21:36:33 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r0, 0x10e, 0xb, 0x0, &(0x7f0000000000)) 21:36:33 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_timeval(r0, 0x1, 0xf, 0x0, &(0x7f0000000080)) 21:36:33 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000080)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x15}, [@ldst={0x5}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0), 0x366, 0x10, &(0x7f0000000000), 0x2b2}, 0x48) 21:36:33 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001240)={0x7, 0x4, &(0x7f0000001100)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x38}]}, &(0x7f0000000000)='syzkaller\x00', 0x4, 0x1000, &(0x7f0000000100)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 21:36:33 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r0, 0x10e, 0xb, 0x0, &(0x7f0000000000)) 21:36:33 executing program 2: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socket$packet(0x11, 0x3, 0x300) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0x0, &(0x7f0000000040)=""/18, 0x12}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x800) io_uring_enter(r0, 0x6900, 0x0, 0x0, 0x0, 0x0) 21:36:33 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000000), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_ADD(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x38, r1, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x2}, {0x5, 0x3, 0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x1}]}, 0x38}}, 0x0) [ 49.022188][ T24] audit: type=1400 audit(1652045793.941:152): avc: denied { recv } for pid=1835 comm="syz-executor.3" saddr=10.128.0.163 src=60818 daddr=10.128.0.39 dest=22 netif=eth0 scontext=system_u:system_r:initrc_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 21:36:33 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000080)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x15}, [@ldst={0x5}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0), 0x366, 0x10, &(0x7f0000000000), 0x2b2}, 0x48) 21:36:34 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x1, 0xe8) r0 = socket$kcm(0x10, 0x2, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'team_slave_1\x00', &(0x7f0000000080)=@ethtool_sset_info={0x37, 0x0, 0x100000000}}) 21:36:34 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x7}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x64, 0x9, 0xa, 0x401, 0x0, 0x0, {0x7}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x21}, @NFTA_SET_EXPR={0x28, 0x11, 0x0, 0x1, @ct={{0x7}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_CT_DREG={0x8}, @NFTA_CT_DIRECTION={0x5}, @NFTA_CT_KEY={0x8, 0x2, 0x1, 0x0, 0xd}]}}}]}], {0x14, 0x10}}, 0xac}}, 0x0) 21:36:34 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000140), 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1,