lstat(&(0x7f0000003ec0)='./file0\x00', &(0x7f0000003f00)) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16, @ANYBLOB="1fe800000000000000003b00000008000300", @ANYRES32, @ANYBLOB="4c003300d0800000ffffffffffff0802110000015050505050500000000000003b"], 0x68}}, 0x0) sendmsg$NL80211_CMD_DEL_NAN_FUNCTION(r0, &(0x7f0000003140)={&(0x7f0000003040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000003100)={&(0x7f00000030c0)={0x34, 0x0, 0x200, 0x70bd2a, 0x25dfdbfe, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x77}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x6}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x400000a) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)={0x14, 0x0, 0x8, 0x801}, 0x14}, 0x1, 0x0, 0x0, 0x10}, 0x24000080) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003340)=[{{&(0x7f0000000000)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000080)="55ce0af06d745acd090810d1b68f6961aae0588742aa985771a3ac05d1e369a64db6e7c07e", 0x25}, {&(0x7f0000000280)="3dfc6066cc7e9c6d6b2bbc8045024dbb283f222f0f24e31d94e36498778513416ae710ddfc30d54212290d78b491c8376540040b2cdb6d811503601112c84dfeea30d92789ec9a5108ba808ea60ea58794995c96fc71e7e8b65ed2e1642b1967a47362b062f6bfcf8f496fc6922cd1766c5461bebb04e8e60baae64668c65bc11cab1976d8e091a93fa161d79e8ff0e7214176218e7d3ffcd6f439194c2a543c4039dcebc5fc4337aa84765d03471bb1f38d49d0138a96348ecf0be8d5996f0e522a982fcf6b7b", 0xc7}, {&(0x7f0000000380)="c2dc3721fa7ab16da8933fd5736ff6b5b68998269c60c8c2e2683fe04b8ef3f21c321a7cdc334328372ce298211dbf13ec3389166aaa939869fae8e481c9b57a9b7422b33f7d841ca669ee778c666c2c5a9661fe83ee3af5993b22d4348139944ecdf4c15e726db36d5e4874576b80f5e9337eb7847f7a9b5dbc51516cd4c74a0dae5ea5687679a3597e146873fcdf6dd5cf", 0x92}, {&(0x7f0000000440)="a4c60124c4d015b57ad68859bf64c55f76c5bd33d9c09fbaa8704d0c0c77832fd6c2bb2921eca210729b6708f892ca75e732bd96f67e8b53acc567f931bfdea2262197829482a7b4858c85c3e4ff8df51bf9fe8686ddd7d0ce996112b4834b4cbb63acfc", 0x64}, {&(0x7f0000000200)="57c5bcf7b246c239105d0051c7b245f078d994369f5671beb52c01f071015d2bd3a9630b234b75a4c525372c220d9f3eb353248f42623ca8f91e0b289a57", 0x3e}], 0x5, &(0x7f0000000680)=[@cred={{0x1c, 0x1, 0x2, {r2, 0xee00}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x40, 0x4}}, {{0x0, 0x0, &(0x7f0000001840)=[{&(0x7f00000006c0)="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", 0x1000}, {&(0x7f00000016c0)="51756494d3677518ddd0c879c5b2f99c0b7f623e9d9556ad999a0f2f0af91a75802ed2c922893dc7b211be312c26163e2b8cb91e48548a6dd4ad54ea52612776cb66aa3918315169927a5e5a705bb284bd394539d2a519d8e9f2509987f7e1e6826ae55570fd997767b68084e77ff2e94f3c0b81c15bf3e2c4f3a3a3e0f20f754ebbe8f78ff8e6e7e831ed", 0x8b}, {&(0x7f0000001780)="63b68192a2ddb6e8c4a096e5a557e1f617c14342719608ae9ab9965963411a5aefbd37e43c513b1c641323a1a6951e0b23aca1d84874cda3ddd3f29bbbb3124b4c817381c5ffddc545f0923c3d5c38517bcc4357f738bb01d7400e20932257756f5846e723645da9af68ffcd303e76b0559c518e3e2a3392a1ff82e231ec1e52c175a13c8c60d531f02b7a10fa408c0feb41a6cd8b9a9dec5e1c2548095401981eb6eee078ea051c7026c6361001c250e0d563508569075d969ccf406a3df6", 0xbf}], 0x3, 0x0, 0x0, 0x4000004}}, {{&(0x7f0000001880)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000002b80)=[{&(0x7f0000001900)="00975dda19272673dcf67cb9bfcde5dab82a441ef888e11de1d207262c1f5ca36bae47b0eb0f06f575151d773d05b153ccd2d973691da37325f9dccee3873ac689e4dc597b60cd681a9341d904229fcf7a15a607661b16c3668a50367724a0a0e09b26e9b8c35f8a3c3c6a2944d554e1a0ebb687c133ff11cd00a386dd89e0ebfb2f57de564b1ab24e1fdaf7771ee33f7bcb413b8953ade91f2093754a9604ee97caecc6fd70d6a286b9926ccdcf", 0xae}, {&(0x7f00000019c0)="db2e3a99fc7749dce7d7b86cf04d6ba06110d44463f8691c612c537c5e6f39409413897849e8d77c0b237c85de6f7837a584650b26b3509c7d90cf042509cf2c4ee506e1282ce0f99464086a974257256c724a07dda228813b22b673d0e8185b99316d0a242040e95c254e83e25622a26a3b025025aef75c0d5fc1457473e6113f5b9c9a3d712e6c407bc8b056", 0x8d}, {&(0x7f0000001a80)="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", 0x1000}, {&(0x7f0000002a80)="b07e4f3a28508b7c0e32dabbe0246587bb3c88d130b70db0fcd4e6db9f5e949c55057c06376a7c6ce3eb4653505527922bbd72cb92fd37e3776366f162e1010b832a98970c7f39951d370667a53c38cbb8a09aac2bb16549f7f852b6d532292fc5a4398e14337f55f6611eb8952b1832da31eab096ea3f39b84bdd9c067ba47f804070efa90f1dfbd1e4510e5df619b3e546552d70569dcc3e64924954afe7d7fc61fbb4bd149255749692ca658112dfd49ca79b6013a697044a13466ed1fe8973571a762e3edaa5279dc7a85e29dde80c1538cd3c8a9a39d0648dddbee641704897cec1c8a24d75464abeb49358fc73be2e23c8", 0xf4}], 0x4, 0x0, 0x0, 0x8004}}, {{&(0x7f0000002bc0)=@abs={0x982bf56c7ffe169e, 0x0, 0x4e22}, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000002c40)="bd731ecce9f5ef50daf23f495efe4799474cc5ebf649bd059c1a48b8c7ecc8f8d8d8de5acc9b3abef3c8af7f06908b3f0dc638cba3740b9596300cdb6b4a906ced03ff4986bd90a66b7a5f43d7357a8641783f119b42b5bee8bd28fdf7aefb147ec55ebbf09d3bcdc80f8faaacebdc7e17b5f7084fcf0e1e47b3533e93dafb429f8a740872efcb5230156412e601aaae0548c7ef47e148025fa47b979a1839e0c45867ad942f2650a72682203abb8763d0c64d132519125512358599462a34de9fe8904701dec154a4e1bdd93ab3c9796f2c2ed660bbce819832c12661", 0xdd}, {&(0x7f0000002d40)="0d64dea4ec8f916638db00392d437229b1274eae3d7ea2aaa7b76df84329bb08edb89ba4181373f7fba480975066153a9186a0caf7e82efbde36b5e877ce72fcaabbfdf3522f57ac85c8d45abdc50ae7397314d6f45b6c3204a73c277800886a65719c6e5238e2d07b18309272599a841c6c5239", 0x74}, {&(0x7f0000002dc0)="0db49d541b24fb9b02427e001041525065bbbda3049d56439769834164f35a19a8b1b356e2fa02126faad528c29b4c06f195ab1945a174dc07c6c9220c14f1296070681ccbb7223a75", 0x49}, {&(0x7f0000002e40)="731bf94791f958f6326dcd4268a66892f5c1c8ae7b4608443bb666d3ba3d02b0fea90f594b0e5e13229fc1ceb45edf587ff011fcbc268832cb3631cd7d5eb6825b47b7599abffcc40b7a10dfc3716e6093610021e7dbcf6dca9fae5552fd4eceea0e512439aff2cab4661528457b45d311d357ed191e996b29f67943fe47a7be6d07828368cc42c393a65d10e2444189bebbf47ccdf2d08689ee16c27ea66897dd5a2ec57043ea06628383694b43cddd8dc72fc1b49bf4ed7a5c0c3757f73a383c2f602823fff3e6b21a6c94e24e0769f75aff58ec8003766bf1654e1b7048dd0e002d", 0xe3}, {&(0x7f0000002f40)="61335c7286412035e3a1cb36a7e29c22a287849031e0ca0ac513a9c9a59794dbd0acf30132a97beda6b77fb5d0b72f4f2256eee069e1c12e04248393fd96768bd5b2f12693e4eb70340bffcdb72da1ff629da6fd9b046d3ed3e8ca6ebc632dd28a9b18cde0e0d3c625a5c93c8fb9b93e3a", 0x71}], 0x5, &(0x7f0000000540)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB="005e1c002000000000120100000001000f00"/31, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB="0000000024000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0x88}}, {{&(0x7f0000003240)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000003300)=[{&(0x7f00000032c0)="fab15c54e2a58dae", 0x8}], 0x1, 0x0, 0x0, 0x4000}}], 0x5, 0x10) ptrace$setregs(0xd, r2, 0x0, &(0x7f00000000c0)="45b46fbe7fdca862f4484ad916fa919c93ce789aa142d489c5c618a242a6a6562e8410232a1a30da2dcca2d0023792d730311c7f6f52fe2c476b50a2cf43dfbf1bd69c74423ec5d003355b58735f7d1e195da755909b013846d77d0ce825bda2a5ba9952e169374b01829b61e5df3494b127b514df0f65cab0aef36090977d88130c5944645a291fc7") ptrace$setregs(0xf, r2, 0x0, &(0x7f00000001c0)="7a9f39e1ae") ptrace$getregset(0x4204, r2, 0x2, &(0x7f0000000180)={0x0}) 13:42:21 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000040)) 13:42:21 executing program 2: syz_emit_ethernet(0x86, &(0x7f0000000340)={@local, @broadcast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "1370f2", 0x50, 0x2f, 0x0, @dev={0xfe, 0x80, '\x00', 0x3c}, @private1, {[@fragment={0x73, 0x0, 0x0, 0x1, 0x0, 0x0, 0x67}], {{}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [0x0]}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86dd, [0x0]}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x0, 0x2}}}, {0x8, 0x22eb, 0x0, {{0x6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}, 0x2, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}}}}}}}}}, 0x0) 13:42:21 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f00000000c0)=ANY=[], 0x8) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) sendmmsg$inet6(r0, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)="8202", 0x2}], 0x1}}], 0x1, 0x4404c840) sendto$inet6(r0, &(0x7f0000000300), 0x5aa, 0x0, 0x0, 0xfffffffffffffdfd) 13:42:21 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f00000000c0)=ANY=[], 0x8) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) sendmmsg$inet6(r0, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)="8202", 0x2}], 0x1}}], 0x1, 0x4404c840) sendto$inet6(r0, &(0x7f0000000300), 0x5aa, 0x0, 0x0, 0xfffffffffffffdfd) 13:42:21 executing program 2: syz_emit_ethernet(0x86, &(0x7f0000000340)={@local, @broadcast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "1370f2", 0x50, 0x2f, 0x0, @dev={0xfe, 0x80, '\x00', 0x3c}, @private1, {[@fragment={0x73, 0x0, 0x0, 0x1, 0x0, 0x0, 0x67}], {{}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [0x0]}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86dd, [0x0]}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x0, 0x2}}}, {0x8, 0x22eb, 0x0, {{0x6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}, 0x2, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}}}}}}}}}, 0x0) 13:42:21 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000040)) 13:42:21 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000f40), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_INTERFACE(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000fc0)={&(0x7f0000000380)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="05ffffffffffffffff921f"], 0x1c}}, 0x0) 13:42:21 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x31, &(0x7f00000000c0)=0x5, 0x4) 13:42:21 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f0000000140)=ANY=[], 0xff, 0x23f, &(0x7f0000000540)="$eJzs3T1oLFUYBuB3Zne95t5FrtoI4g+IiAbCtRNsYqMQkBBEBBUiIjZKIsQEu8TKxkJrlVQ2QeyMlpIm2CiCVdQUsRE0WBgstFiZnURisuLPxh1xngdmZ2b3nPnOMPOe3WbYAK11Nclskk6S6SS9JMXpBnfWy9Xj3c2p3cVkMHjsh2LYrt6vnfS7kmQjyQNJdsoiL3STte2nDn7ae+Se11d7d7+7/eTURE/y2OHB/qNH78y/9sHc/WufffHdfJHZ9H93XhevGPFet0hu+jeK/UcU3aZHwF+x8Mr7X1a5vznJXcP891KmvnhvrFy308t9b/9R3ze///zWSY4VuHiDQa/6DtwYAK1TJumnKGeS1NtlOTNT/4b/qnO5fHF55eXp55dXl55reqYCLko/2X/4o0sfXjmT/287df6B/68q/48vbH1dbR91mh4NMBG31asq/9PPrN8b+YfWkX9oL/mH9pJ/aC/5h/aSf2gv+Yf2kn9oL/mH9pJ/aK/T+QcA2mVwqeknkIGmND3/AAAAAAAAAAAAAAAAAAAA521O7S6eLJOq+clbyeFDSbqj6neG/0ecXD98vfxjUTX7TVF3G8vTd4x5gDG91/DT1zd802z9T29vtv76UrLxapJr3e75+684vv/+uRv/5PPes2MW+JuKM/sPPjHZ+mf9stVs/bm95ONq/rk2av4pc8twPXr+6VfXb8z6L/085gEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACYmF8DAAD//xFQbUc=") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='blkio.bfq.io_wait_time_recursive\x00', 0x275a, 0x0) write$cgroup_int(r0, &(0x7f0000000380), 0xb14c) 13:42:21 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f00000000c0)=ANY=[], 0x8) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) sendmmsg$inet6(r0, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)="8202", 0x2}], 0x1}}], 0x1, 0x4404c840) sendto$inet6(r0, &(0x7f0000000300), 0x5aa, 0x0, 0x0, 0xfffffffffffffdfd) 13:42:21 executing program 2: syz_emit_ethernet(0x86, &(0x7f0000000340)={@local, @broadcast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "1370f2", 0x50, 0x2f, 0x0, @dev={0xfe, 0x80, '\x00', 0x3c}, @private1, {[@fragment={0x73, 0x0, 0x0, 0x1, 0x0, 0x0, 0x67}], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x0, [0x0]}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86dd, [0x0]}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x0, 0x2}}}, {0x8, 0x22eb, 0x0, {{0x6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}, 0x2, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}}}}}}}}}, 0x0) 13:42:21 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f0000000080)) 13:42:21 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000017c0), r0) 13:42:21 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000040)="f443c4c89207012b6680d283b43ea11bac74d3dc603c77c3f3984e8d990cd6a1068e0168abe6cf6c4a", 0x29) 13:42:21 executing program 2: syz_emit_ethernet(0x86, &(0x7f0000000340)={@local, @broadcast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "1370f2", 0x50, 0x2f, 0x0, @dev={0xfe, 0x80, '\x00', 0x3c}, @private1, {[@fragment={0x73, 0x0, 0x0, 0x1, 0x0, 0x0, 0x67}], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x0, [0x0]}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86dd, [0x0]}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x0, 0x2}}}, {0x8, 0x22eb, 0x0, {{0x6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}, 0x2, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}}}}}}}}}, 0x0) 13:42:21 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) sendmmsg$inet6(r0, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)="8202", 0x2}], 0x1}}], 0x1, 0x4404c840) sendto$inet6(r0, &(0x7f0000000300), 0x5aa, 0x0, 0x0, 0xfffffffffffffdfd) 13:42:21 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x16, 0x0, 0x9, 0x3}, 0x48) 13:42:21 executing program 5: msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000080)=""/70) 13:42:21 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) sendmmsg$inet6(r0, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)="8202", 0x2}], 0x1}}], 0x1, 0x4404c840) sendto$inet6(r0, &(0x7f0000000300), 0x5aa, 0x0, 0x0, 0xfffffffffffffdfd) [ 89.197309][ T4186] loop3: detected capacity change from 0 to 128 13:42:21 executing program 2: syz_emit_ethernet(0x86, &(0x7f0000000340)={@local, @broadcast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "1370f2", 0x50, 0x2f, 0x0, @dev={0xfe, 0x80, '\x00', 0x3c}, @private1, {[@fragment={0x73, 0x0, 0x0, 0x1, 0x0, 0x0, 0x67}], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x0, [0x0]}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86dd, [0x0]}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x0, 0x2}}}, {0x8, 0x22eb, 0x0, {{0x6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}, 0x2, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}}}}}}}}}, 0x0) [ 89.264020][ T4186] EXT4-fs (loop3): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 without journal. Quota mode: none. [ 89.301053][ T4186] ext4 filesystem being mounted at /root/syzkaller-testdir4284073079/syzkaller.tf3qNy/70/mnt supports timestamps until 2038 (0x7fffffff) 13:42:21 executing program 3: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) write(r0, &(0x7f0000000000)="05", 0x35a63c) 13:42:21 executing program 5: msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000080)=""/70) 13:42:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) io_setup(0x32, &(0x7f0000000040)=0x0) r2 = eventfd2(0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000140)=[&(0x7f0000000000)={0x1802, 0x0, 0x0, 0x5, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x3, r2}]) dup2(r0, r2) shutdown(r0, 0x0) 13:42:21 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000000c0)={'IDLETIMER\x00'}, &(0x7f0000000100)=0x1e) 13:42:21 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) sendmmsg$inet6(r0, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)="8202", 0x2}], 0x1}}], 0x1, 0x4404c840) sendto$inet6(r0, &(0x7f0000000300), 0x5aa, 0x0, 0x0, 0xfffffffffffffdfd) 13:42:21 executing program 2: syz_emit_ethernet(0x86, &(0x7f0000000340)={@local, @broadcast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "1370f2", 0x50, 0x2f, 0x0, @dev={0xfe, 0x80, '\x00', 0x3c}, @private1, {[@fragment={0x73, 0x0, 0x0, 0x1, 0x0, 0x0, 0x67}], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x0, [0x0]}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [0x0]}, {}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x0, 0x2}}}, {0x8, 0x22eb, 0x0, {{0x6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}, 0x2, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}}}}}}}}}, 0x0) 13:42:21 executing program 0: setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, &(0x7f00000000c0)=ANY=[], 0x8) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)="8202", 0x2}], 0x1}}], 0x1, 0x4404c840) sendto$inet6(0xffffffffffffffff, &(0x7f0000000300), 0x5aa, 0x0, 0x0, 0xfffffffffffffdfd) 13:42:21 executing program 5: msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000080)=""/70) 13:42:21 executing program 2: syz_emit_ethernet(0x86, &(0x7f0000000340)={@local, @broadcast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "1370f2", 0x50, 0x2f, 0x0, @dev={0xfe, 0x80, '\x00', 0x3c}, @private1, {[@fragment={0x73, 0x0, 0x0, 0x1, 0x0, 0x0, 0x67}], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x0, [0x0]}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [0x0]}, {}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x0, 0x2}}}, {0x8, 0x22eb, 0x0, {{0x6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}, 0x2, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}}}}}}}}}, 0x0) 13:42:21 executing program 2: syz_emit_ethernet(0x86, &(0x7f0000000340)={@local, @broadcast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "1370f2", 0x50, 0x2f, 0x0, @dev={0xfe, 0x80, '\x00', 0x3c}, @private1, {[@fragment={0x73, 0x0, 0x0, 0x1, 0x0, 0x0, 0x67}], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x0, [0x0]}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [0x0]}, {}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x0, 0x2}}}, {0x8, 0x22eb, 0x0, {{0x6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}, 0x2, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}}}}}}}}}, 0x0) 13:42:21 executing program 0: setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, &(0x7f00000000c0)=ANY=[], 0x8) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)="8202", 0x2}], 0x1}}], 0x1, 0x4404c840) sendto$inet6(0xffffffffffffffff, &(0x7f0000000300), 0x5aa, 0x0, 0x0, 0xfffffffffffffdfd) 13:42:21 executing program 4: syz_open_dev$evdev(&(0x7f0000000200), 0x0, 0x533c00) [ 89.403822][ T3139] EXT4-fs (loop3): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. 13:42:21 executing program 3: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) write(r0, &(0x7f0000000000)="05", 0x35a63c) 13:42:21 executing program 5: msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000080)=""/70) 13:42:21 executing program 1: r0 = syz_io_uring_setup(0x51bb, &(0x7f0000000240), &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f00000002c0), &(0x7f0000000300)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) 13:42:21 executing program 2: syz_emit_ethernet(0x86, &(0x7f0000000340)={@local, @broadcast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "1370f2", 0x50, 0x2f, 0x0, @dev={0xfe, 0x80, '\x00', 0x3c}, @private1, {[@fragment={0x73, 0x0, 0x0, 0x1, 0x0, 0x0, 0x67}], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x0, [0x0]}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [0x0]}, {}, {}, {0x8, 0x22eb, 0x0, {{0x6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}, 0x2, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}}}}}}}}}, 0x0) 13:42:21 executing program 0: setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, &(0x7f00000000c0)=ANY=[], 0x8) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)="8202", 0x2}], 0x1}}], 0x1, 0x4404c840) sendto$inet6(0xffffffffffffffff, &(0x7f0000000300), 0x5aa, 0x0, 0x0, 0xfffffffffffffdfd) 13:42:21 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000380)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = dup2(r0, r0) sendmmsg$inet6(r1, &(0x7f0000009500)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000000c0)="e2", 0x1}], 0x1}}, {{&(0x7f0000000300)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c, &(0x7f0000000340)=[{&(0x7f0000001580)=':', 0x7ffff000}], 0x1}}], 0x2, 0x0) [ 89.819741][ T4088] syz-executor.4 (4088) used greatest stack depth: 10664 bytes left 13:42:21 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000840), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={&(0x7f0000000d00)={0x14, r1, 0x1, 0x0, 0x0, {0x1c}}, 0x14}}, 0x0) 13:42:21 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, &(0x7f00000000c0)=ANY=[], 0x8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) sendmmsg$inet6(r0, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)="8202", 0x2}], 0x1}}], 0x1, 0x4404c840) sendto$inet6(r0, &(0x7f0000000300), 0x5aa, 0x0, 0x0, 0xfffffffffffffdfd) 13:42:21 executing program 2: syz_emit_ethernet(0x86, &(0x7f0000000340)={@local, @broadcast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "1370f2", 0x50, 0x2f, 0x0, @dev={0xfe, 0x80, '\x00', 0x3c}, @private1, {[@fragment={0x73, 0x0, 0x0, 0x1, 0x0, 0x0, 0x67}], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x0, [0x0]}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [0x0]}, {}, {}, {0x8, 0x22eb, 0x0, {{0x6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}, 0x2, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}}}}}}}}}, 0x0) 13:42:21 executing program 1: r0 = syz_io_uring_setup(0x51bb, &(0x7f0000000240), &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f00000002c0), &(0x7f0000000300)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) 13:42:21 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) io_setup(0x32, &(0x7f0000000040)=0x0) r2 = eventfd2(0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000140)=[&(0x7f0000000000)={0x1802, 0x0, 0x0, 0x5, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x3, r2}]) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, r2, &(0x7f00000001c0)="2e931759b563bf60", 0x8}]) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) shutdown(r0, 0x0) 13:42:21 executing program 2: syz_emit_ethernet(0x86, &(0x7f0000000340)={@local, @broadcast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "1370f2", 0x50, 0x2f, 0x0, @dev={0xfe, 0x80, '\x00', 0x3c}, @private1, {[@fragment={0x73, 0x0, 0x0, 0x1, 0x0, 0x0, 0x67}], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x0, [0x0]}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [0x0]}, {}, {}, {0x8, 0x22eb, 0x0, {{0x6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}, 0x2, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}}}}}}}}}, 0x0) [ 89.860279][ T23] kauditd_printk_skb: 13 callbacks suppressed [ 89.860291][ T23] audit: type=1400 audit(1675777341.914:157): avc: denied { create } for pid=4235 comm="syz-executor.1" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 89.947725][ T23] audit: type=1400 audit(1675777341.954:158): avc: denied { map } for pid=4235 comm="syz-executor.1" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=19422 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 89.972211][ T23] audit: type=1400 audit(1675777341.954:159): avc: denied { read write } for pid=4235 comm="syz-executor.1" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=19422 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 89.997314][ T23] audit: type=1400 audit(1675777341.964:160): avc: denied { setopt } for pid=4242 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 90.017153][ T23] audit: type=1400 audit(1675777341.964:161): avc: denied { name_bind } for pid=4242 comm="syz-executor.4" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 90.039160][ T23] audit: type=1400 audit(1675777341.964:162): avc: denied { write } for pid=4242 comm="syz-executor.4" laddr=::1 lport=20003 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 90.060836][ T23] audit: type=1400 audit(1675777341.964:163): avc: denied { connect } for pid=4242 comm="syz-executor.4" laddr=::1 lport=20003 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 90.082568][ T23] audit: type=1400 audit(1675777341.964:164): avc: denied { name_connect } for pid=4242 comm="syz-executor.4" dest=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 13:42:22 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000380)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = dup2(r0, r0) sendmmsg$inet6(r1, &(0x7f0000009500)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000000c0)="e2", 0x1}], 0x1}}, {{&(0x7f0000000300)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0xf, &(0x7f0000000340)=[{&(0x7f0000001580)=':', 0x1}], 0x1}}], 0x2, 0x0) 13:42:22 executing program 1: r0 = getpgid(0x0) syz_open_procfs$namespace(r0, &(0x7f0000000000)='ns/time_for_children\x00') 13:42:22 executing program 5: pselect6(0x40, &(0x7f0000000000)={0x6}, 0x0, &(0x7f0000000080), &(0x7f00000000c0)={0x0, 0x989680}, 0x0) 13:42:22 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, &(0x7f00000000c0)=ANY=[], 0x8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) sendmmsg$inet6(r0, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)="8202", 0x2}], 0x1}}], 0x1, 0x4404c840) sendto$inet6(r0, &(0x7f0000000300), 0x5aa, 0x0, 0x0, 0xfffffffffffffdfd) 13:42:22 executing program 2: syz_emit_ethernet(0x86, &(0x7f0000000340)={@local, @broadcast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "1370f2", 0x50, 0x2f, 0x0, @dev={0xfe, 0x80, '\x00', 0x3c}, @private1, {[@fragment={0x73, 0x0, 0x0, 0x1, 0x0, 0x0, 0x67}], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x0, [0x0]}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [0x0]}, {}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x0, 0x2}}}, {0x8, 0x22eb, 0x0, {{0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}, 0x2, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}}}}}}}}}, 0x0) 13:42:22 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) io_setup(0x32, &(0x7f0000000040)=0x0) r2 = eventfd2(0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000140)=[&(0x7f0000000000)={0x1802, 0x0, 0x0, 0x5, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x3, r2}]) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, r2, &(0x7f00000001c0)="2e931759b563bf60", 0x8}]) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) shutdown(r0, 0x0) 13:42:22 executing program 2: syz_emit_ethernet(0x86, &(0x7f0000000340)={@local, @broadcast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "1370f2", 0x50, 0x2f, 0x0, @dev={0xfe, 0x80, '\x00', 0x3c}, @private1, {[@fragment={0x73, 0x0, 0x0, 0x1, 0x0, 0x0, 0x67}], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x0, [0x0]}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [0x0]}, {}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x0, 0x2}}}, {0x8, 0x22eb, 0x0, {{0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}, 0x2, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}}}}}}}}}, 0x0) 13:42:22 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, &(0x7f00000000c0)=ANY=[], 0x8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) sendmmsg$inet6(r0, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)="8202", 0x2}], 0x1}}], 0x1, 0x4404c840) sendto$inet6(r0, &(0x7f0000000300), 0x5aa, 0x0, 0x0, 0xfffffffffffffdfd) 13:42:22 executing program 5: pselect6(0x40, &(0x7f0000000000)={0x6}, 0x0, &(0x7f0000000080), &(0x7f00000000c0)={0x0, 0x989680}, 0x0) 13:42:22 executing program 1: io_uring_setup(0x4651, &(0x7f0000000080)={0x0, 0x0, 0x2}) 13:42:22 executing program 3: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0x4) 13:42:22 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, 0x0, 0x8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) sendmmsg$inet6(r0, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)="8202", 0x2}], 0x1}}], 0x1, 0x4404c840) sendto$inet6(r0, &(0x7f0000000300), 0x5aa, 0x0, 0x0, 0xfffffffffffffdfd) 13:42:22 executing program 2: syz_emit_ethernet(0x86, &(0x7f0000000340)={@local, @broadcast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "1370f2", 0x50, 0x2f, 0x0, @dev={0xfe, 0x80, '\x00', 0x3c}, @private1, {[@fragment={0x73, 0x0, 0x0, 0x1, 0x0, 0x0, 0x67}], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x0, [0x0]}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [0x0]}, {}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x0, 0x2}}}, {0x8, 0x22eb, 0x0, {{0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}, 0x2, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}}}}}}}}}, 0x0) 13:42:22 executing program 3: pselect6(0x40, &(0x7f0000000000)={0x6}, 0x0, &(0x7f0000000080), &(0x7f00000000c0)={0x0, 0x989680}, &(0x7f0000000140)={&(0x7f0000000100)={[0x9d]}, 0x8}) 13:42:22 executing program 1: syz_clone(0xa98e0900, 0x0, 0x0, 0x0, 0x0, 0x0) 13:42:22 executing program 5: shmget(0x1, 0x800000, 0x0, &(0x7f00007fd000/0x800000)=nil) 13:42:22 executing program 1: io_uring_setup(0x3a71, &(0x7f0000000000)={0x0, 0x0, 0x101}) [ 90.321823][ T23] audit: type=1400 audit(1675777342.374:165): avc: denied { sqpoll } for pid=4273 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 13:42:22 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) io_setup(0x32, &(0x7f0000000040)=0x0) r2 = eventfd2(0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000140)=[&(0x7f0000000000)={0x1802, 0x0, 0x0, 0x5, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x3, r2}]) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, r2, &(0x7f00000001c0)="2e931759b563bf60", 0x8}]) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) shutdown(r0, 0x0) 13:42:22 executing program 2: syz_emit_ethernet(0x86, &(0x7f0000000340)={@local, @broadcast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "1370f2", 0x50, 0x2f, 0x0, @dev={0xfe, 0x80, '\x00', 0x3c}, @private1, {[@fragment={0x73, 0x0, 0x0, 0x1, 0x0, 0x0, 0x67}], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x0, [0x0]}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [0x0]}, {}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x0, 0x2}}}, {0x8, 0x22eb, 0x0, {{0x6}, 0x2, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}}}}}}}}}, 0x0) 13:42:22 executing program 3: r0 = socket$igmp6(0xa, 0x3, 0x2) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000040)={@private2}, 0x14) 13:42:22 executing program 1: pselect6(0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f00000000c0)={0x0, 0x989680}, &(0x7f0000000140)={&(0x7f0000000100)={[0x9d]}, 0x8}) 13:42:22 executing program 5: memfd_create(&(0x7f00000000c0)='\'\x00', 0x0) 13:42:22 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, 0x0, 0x8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) sendmmsg$inet6(r0, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)="8202", 0x2}], 0x1}}], 0x1, 0x4404c840) sendto$inet6(r0, &(0x7f0000000300), 0x5aa, 0x0, 0x0, 0xfffffffffffffdfd) 13:42:22 executing program 3: pselect6(0x40, &(0x7f0000000000)={0x6}, &(0x7f0000000040)={0x2}, 0x0, &(0x7f00000000c0)={0x0, 0x989680}, 0x0) 13:42:22 executing program 1: syz_clone(0x30080, 0x0, 0x0, 0x0, 0x0, 0x0) 13:42:22 executing program 2: syz_emit_ethernet(0x86, &(0x7f0000000340)={@local, @broadcast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "1370f2", 0x50, 0x2f, 0x0, @dev={0xfe, 0x80, '\x00', 0x3c}, @private1, {[@fragment={0x73, 0x0, 0x0, 0x1, 0x0, 0x0, 0x67}], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x0, [0x0]}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [0x0]}, {}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x0, 0x2}}}, {0x8, 0x22eb, 0x0, {{0x6}, 0x2, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}}}}}}}}}, 0x0) 13:42:22 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, 0x0, 0x8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) sendmmsg$inet6(r0, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)="8202", 0x2}], 0x1}}], 0x1, 0x4404c840) sendto$inet6(r0, &(0x7f0000000300), 0x5aa, 0x0, 0x0, 0xfffffffffffffdfd) 13:42:22 executing program 5: r0 = socket$can_j1939(0x1d, 0x2, 0x7) sendmsg$can_j1939(r0, 0x0, 0x0) 13:42:22 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000180)) [ 90.509853][ T23] audit: type=1400 audit(1675777342.564:166): avc: denied { create } for pid=4312 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 13:42:22 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) io_setup(0x32, &(0x7f0000000040)=0x0) r2 = eventfd2(0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000140)=[&(0x7f0000000000)={0x1802, 0x0, 0x0, 0x5, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x3, r2}]) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, r2, &(0x7f00000001c0)="2e931759b563bf60", 0x8}]) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) shutdown(r0, 0x0) 13:42:22 executing program 3: clock_gettime(0x0, &(0x7f0000001500)={0x0}) pselect6(0x40, &(0x7f0000001440), &(0x7f0000001480)={0x6}, 0x0, &(0x7f0000001540)={r0}, 0x0) 13:42:22 executing program 5: r0 = socket$can_j1939(0x1d, 0x2, 0x7) sendmsg$can_j1939(r0, &(0x7f0000000240)={&(0x7f0000000000), 0x18, &(0x7f0000000040)={0x0}}, 0x0) 13:42:22 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f00000000c0)=ANY=[], 0x8) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) sendmmsg$inet6(r0, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)="8202", 0x2}], 0x1}}], 0x1, 0x4404c840) sendto$inet6(r0, &(0x7f0000000300), 0x5aa, 0x0, 0x0, 0xfffffffffffffdfd) 13:42:22 executing program 2: syz_emit_ethernet(0x86, &(0x7f0000000340)={@local, @broadcast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "1370f2", 0x50, 0x2f, 0x0, @dev={0xfe, 0x80, '\x00', 0x3c}, @private1, {[@fragment={0x73, 0x0, 0x0, 0x1, 0x0, 0x0, 0x67}], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x0, [0x0]}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [0x0]}, {}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x0, 0x2}}}, {0x8, 0x22eb, 0x0, {{0x6}, 0x2, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}}}}}}}}, 0x0) 13:42:22 executing program 1: syz_emit_ethernet(0x36, &(0x7f00000008c0)={@local, @link_local={0x1, 0x80, 0xc2, 0x2}, @val={@void}, {@ipv4={0x800, @dccp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x21, 0x0, @rand_addr=0x2, @local}, {{0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, "692d0f", 0x0, "7255e5"}}}}}}, 0x0) 13:42:22 executing program 2: syz_emit_ethernet(0x86, &(0x7f0000000340)={@local, @broadcast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "1370f2", 0x50, 0x2f, 0x0, @dev={0xfe, 0x80, '\x00', 0x3c}, @private1, {[@fragment={0x73, 0x0, 0x0, 0x1, 0x0, 0x0, 0x67}], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x0, [0x0]}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [0x0]}, {}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x0, 0x2}}}, {0x8, 0x22eb, 0x0, {{0x6}, 0x2, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}}}}}}}}, 0x0) 13:42:22 executing program 5: syz_clone(0x48020080, 0x0, 0x0, 0x0, 0x0, 0x0) 13:42:22 executing program 3: pselect6(0x40, &(0x7f0000000000)={0x6}, &(0x7f0000000040)={0x2}, &(0x7f0000000080), &(0x7f00000000c0)={0x0, 0x989680}, &(0x7f0000000140)={&(0x7f0000000100)={[0x9d]}, 0x8}) 13:42:22 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f00000000c0)=ANY=[], 0x8) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) sendmmsg$inet6(r0, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)="8202", 0x2}], 0x1}}], 0x1, 0x4404c840) sendto$inet6(r0, &(0x7f0000000300), 0x5aa, 0x0, 0x0, 0xfffffffffffffdfd) 13:42:22 executing program 1: syz_clone(0x11100000, 0x0, 0x0, 0x0, 0x0, 0x0) [ 90.609599][ T4329] dccp_v4_rcv: dropped packet with invalid checksum 13:42:22 executing program 3: syz_io_uring_setup(0x69cb, &(0x7f00000000c0)={0x0, 0x0, 0x400}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000180), &(0x7f00000001c0)) 13:42:22 executing program 5: pselect6(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)={0x0, 0x989680}, &(0x7f0000000140)={&(0x7f0000000100)={[0x9d]}, 0x8}) 13:42:22 executing program 2: syz_emit_ethernet(0x86, &(0x7f0000000340)={@local, @broadcast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "1370f2", 0x50, 0x2f, 0x0, @dev={0xfe, 0x80, '\x00', 0x3c}, @private1, {[@fragment={0x73, 0x0, 0x0, 0x1, 0x0, 0x0, 0x67}], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x0, [0x0]}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [0x0]}, {}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x0, 0x2}}}, {0x8, 0x22eb, 0x0, {{0x6}, 0x2, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}}}}}}}}, 0x0) 13:42:22 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f00000000c0)=ANY=[], 0x8) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) sendmmsg$inet6(r0, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)="8202", 0x2}], 0x1}}], 0x1, 0x4404c840) sendto$inet6(r0, &(0x7f0000000300), 0x5aa, 0x0, 0x0, 0xfffffffffffffdfd) 13:42:22 executing program 1: io_uring_setup(0x4651, &(0x7f0000000080)={0x0, 0x0, 0x2, 0x0, 0xdd}) 13:42:22 executing program 3: pselect6(0x40, &(0x7f0000000000)={0x6}, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x989680}, 0x0) 13:42:22 executing program 4: syz_open_dev$evdev(&(0x7f00000000c0), 0xffffffff, 0x2c0940) 13:42:22 executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) sendmsg$can_j1939(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) 13:42:22 executing program 2: syz_emit_ethernet(0x86, &(0x7f0000000340)={@local, @broadcast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "1370f2", 0x50, 0x2f, 0x0, @dev={0xfe, 0x80, '\x00', 0x3c}, @private1, {[@fragment={0x73, 0x0, 0x0, 0x1, 0x0, 0x0, 0x67}], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x0, [0x0]}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [0x0]}, {}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x0, 0x2}}}, {0x8, 0x22eb, 0x0, {{0x6}, 0x2, {0x0, 0x0, 0x0, 0x0, 0x1}}}}}}}}}, 0x0) 13:42:22 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000025c0)={0x0, 0x0, &(0x7f00000020c0)={&(0x7f00000023c0)=@newlink={0x28, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 13:42:22 executing program 4: r0 = socket$can_j1939(0x1d, 0x2, 0x7) sendmsg$can_j1939(r0, &(0x7f0000000240)={&(0x7f0000000000), 0x18, 0x0}, 0x0) 13:42:22 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f00000000c0)=ANY=[], 0x8) connect$inet6(r0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) sendmmsg$inet6(r0, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)="8202", 0x2}], 0x1}}], 0x1, 0x4404c840) sendto$inet6(r0, &(0x7f0000000300), 0x5aa, 0x0, 0x0, 0xfffffffffffffdfd) 13:42:22 executing program 5: setuid(0xee00) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) 13:42:22 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0xf}, 0x48) 13:42:22 executing program 2: syz_emit_ethernet(0x86, &(0x7f0000000340)={@local, @broadcast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "1370f2", 0x50, 0x2f, 0x0, @dev={0xfe, 0x80, '\x00', 0x3c}, @private1, {[@fragment={0x73, 0x0, 0x0, 0x1, 0x0, 0x0, 0x67}], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x0, [0x0]}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [0x0]}, {}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x0, 0x2}}}, {0x8, 0x22eb, 0x0, {{0x6}, 0x2, {0x0, 0x0, 0x0, 0x0, 0x1}}}}}}}}}, 0x0) 13:42:22 executing program 4: socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg$can_j1939(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x20000022) 13:42:22 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f00000000c0)=ANY=[], 0x8) connect$inet6(r0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) sendmmsg$inet6(r0, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)="8202", 0x2}], 0x1}}], 0x1, 0x4404c840) sendto$inet6(r0, &(0x7f0000000300), 0x5aa, 0x0, 0x0, 0xfffffffffffffdfd) 13:42:22 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x8919, &(0x7f0000000080)={'ip_vti0\x00', 0x0}) 13:42:22 executing program 5: setuid(0xee00) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) 13:42:22 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f00000000c0)=ANY=[], 0x8) connect$inet6(r0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) sendmmsg$inet6(r0, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)="8202", 0x2}], 0x1}}], 0x1, 0x4404c840) sendto$inet6(r0, &(0x7f0000000300), 0x5aa, 0x0, 0x0, 0xfffffffffffffdfd) 13:42:22 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0x2fd8199f7b1466f9}, 0x48) [ 90.870606][ T4366] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 90.891023][ T4366] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 90.912688][ T4366] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 13:42:23 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000025c0)={0x0, 0x0, &(0x7f00000020c0)={&(0x7f00000023c0)=@newlink={0x28, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 13:42:23 executing program 2: syz_emit_ethernet(0x86, &(0x7f0000000340)={@local, @broadcast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "1370f2", 0x50, 0x2f, 0x0, @dev={0xfe, 0x80, '\x00', 0x3c}, @private1, {[@fragment={0x73, 0x0, 0x0, 0x1, 0x0, 0x0, 0x67}], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x0, [0x0]}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [0x0]}, {}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x0, 0x2}}}, {0x8, 0x22eb, 0x0, {{0x6}, 0x2, {0x0, 0x0, 0x0, 0x0, 0x1}}}}}}}}}, 0x0) 13:42:23 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f00000000c0)=ANY=[], 0x8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) sendmmsg$inet6(r0, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)="8202", 0x2}], 0x1}}], 0x1, 0x4404c840) sendto$inet6(r0, &(0x7f0000000300), 0x5aa, 0x0, 0x0, 0xfffffffffffffdfd) 13:42:23 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000005c0), 0xffffffffffffffff) sendmsg$TIPC_NL_MON_SET(r0, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000980)={&(0x7f0000000600)={0x14, r1, 0x1}, 0x14}}, 0x0) 13:42:23 executing program 1: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) bind$unix(r0, &(0x7f0000000280)=@abs={0x1}, 0x6e) 13:42:23 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0xe}, 0x48) [ 91.043901][ T4397] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 91.056523][ T4397] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 91.067135][ T4397] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 13:42:23 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000840), 0xffffffffffffffff) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000b00)) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000180)={0x18, r1, 0x301, 0x0, 0x0, {0xf}, [@HEADER={0x4}]}, 0x18}}, 0x0) 13:42:23 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, 0x48) 13:42:23 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f00000000c0)=ANY=[], 0x8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) sendmmsg$inet6(r0, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)="8202", 0x2}], 0x1}}], 0x1, 0x4404c840) sendto$inet6(r0, &(0x7f0000000300), 0x5aa, 0x0, 0x0, 0xfffffffffffffdfd) 13:42:23 executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r0, &(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}, 0x4, 0x0, 0x0, 0x3}}, 0x2e) 13:42:23 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x14, r1, 0x8a78333a461d9bd9, 0x0, 0x0, {0x13}}, 0x14}}, 0x0) 13:42:23 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000025c0)={0x0, 0x0, &(0x7f00000020c0)={&(0x7f00000023c0)=@newlink={0x28, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 13:42:23 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x9}, 0x48) 13:42:23 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x8934, &(0x7f0000000080)={'ip_vti0\x00', 0x0}) 13:42:23 executing program 5: syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) syz_genetlink_get_family_id$batadv(&(0x7f0000000100), 0xffffffffffffffff) syz_open_dev$loop(&(0x7f0000000140), 0x0, 0x0) add_key(&(0x7f0000000400)='rxrpc\x00', 0x0, &(0x7f0000000480)=')', 0x1, 0x0) keyctl$link(0x8, 0x0, 0x0) gettid() syz_open_procfs$namespace(0x0, &(0x7f0000000980)='ns/user\x00') r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f00000009c0)) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000b40), 0xffffffffffffffff) 13:42:23 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f00000000c0)=ANY=[], 0x8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) sendmmsg$inet6(r0, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)="8202", 0x2}], 0x1}}], 0x1, 0x4404c840) sendto$inet6(r0, &(0x7f0000000300), 0x5aa, 0x0, 0x0, 0xfffffffffffffdfd) 13:42:23 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x14, r1, 0x8a78333a461d9bd9, 0x0, 0x0, {0x13, 0x0, 0x2}}, 0x14}}, 0x0) 13:42:23 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000e40)={0x0, 0x0, &(0x7f0000000e00)={&(0x7f0000000cc0)=@allocspi={0xf8, 0x16, 0x1, 0x0, 0x0, {{{@in6=@rand_addr=' \x01\x00', @in=@broadcast}, {@in6=@ipv4={'\x00', '\xff\xff', @broadcast}, 0x0, 0x33}, @in=@loopback}}}, 0xf8}}, 0x0) [ 91.767277][ T4408] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 91.779909][ T4408] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 91.787683][ T4408] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 13:42:23 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0x2}, 0x48) 13:42:23 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f00000000c0)=ANY=[], 0x8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) sendmmsg$inet6(r0, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)="8202", 0x2}], 0x1}}], 0x1, 0x4404c840) sendto$inet6(r0, &(0x7f0000000300), 0x5aa, 0x0, 0x0, 0xfffffffffffffdfd) 13:42:23 executing program 1: syz_clone(0x44200, 0x0, 0x0, 0x0, 0x0, 0x0) 13:42:23 executing program 5: socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 13:42:23 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) io_setup(0x5, &(0x7f0000001640)=0x0) io_submit(r1, 0x1, &(0x7f0000000a80)=[&(0x7f0000000140)={0x0, 0x0, 0x8, 0x0, 0x0, r0, 0x0}]) 13:42:23 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000025c0)={0x0, 0x0, &(0x7f00000020c0)={&(0x7f00000023c0)=@newlink={0x28, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 13:42:23 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f00000000c0)=ANY=[], 0x8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) sendmmsg$inet6(r0, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)="8202", 0x2}], 0x1}}], 0x1, 0x4404c840) sendto$inet6(r0, &(0x7f0000000300), 0x5aa, 0x0, 0x0, 0xfffffffffffffdfd) 13:42:23 executing program 4: r0 = socket$pppl2tp(0x18, 0x1, 0x1) getsockopt$SO_TIMESTAMP(r0, 0x1, 0x0, 0x0, 0x0) 13:42:23 executing program 5: pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, 0x0) 13:42:24 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f00000000c0)=ANY=[], 0x8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) sendmmsg$inet6(r0, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)="8202", 0x2}], 0x1}}], 0x1, 0x4404c840) sendto$inet6(r0, &(0x7f0000000300), 0x5aa, 0x0, 0x0, 0xfffffffffffffdfd) 13:42:24 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89b0, &(0x7f0000000080)={'ip_vti0\x00', &(0x7f0000000000)={'gretap0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @multicast2}}}}) 13:42:24 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000840), 0xffffffffffffffff) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000b00)) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000180)={0x18, r1, 0x301, 0x0, 0x0, {0x4}, [@HEADER={0x4}]}, 0x18}}, 0x0) 13:42:24 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) io_setup(0x5, &(0x7f0000001640)=0x0) io_getevents(r1, 0x4, 0x4, &(0x7f0000000300)=[{}, {}, {}, {}], 0x0) io_submit(r1, 0x1, &(0x7f0000000a80)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) 13:42:24 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f00000000c0)=ANY=[], 0x8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) sendmmsg$inet6(r0, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)="8202", 0x2}], 0x1}}], 0x1, 0x4404c840) sendto$inet6(r0, &(0x7f0000000300), 0x5aa, 0x0, 0x0, 0xfffffffffffffdfd) [ 91.959309][ T4441] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 91.980724][ T4441] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 92.001909][ T4441] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 13:42:24 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) io_setup(0x5, &(0x7f0000001640)=0x0) io_submit(r1, 0x1, &(0x7f0000000a80)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0xa03b47200080ffff}]) 13:42:24 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f00000000c0)=ANY=[], 0x8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) sendmmsg$inet6(r0, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)="8202", 0x2}], 0x1}}], 0x1, 0x4404c840) sendto$inet6(r0, &(0x7f0000000300), 0x5aa, 0x0, 0x0, 0xfffffffffffffdfd) 13:42:24 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) io_setup(0x5, &(0x7f0000001640)=0x0) io_submit(r1, 0x2, &(0x7f0000000a80)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xa03b47200080ffff}]) 13:42:24 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f00000000c0)=ANY=[], 0x8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) sendmmsg$inet6(r0, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)="8202", 0x2}], 0x1}}], 0x1, 0x4404c840) sendto$inet6(r0, &(0x7f0000000300), 0x5aa, 0x0, 0x0, 0xfffffffffffffdfd) 13:42:24 executing program 4: r0 = socket(0x2b, 0x1, 0x0) setsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f0000000000), 0x4) 13:42:24 executing program 3: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vxcan0\x00'}) 13:42:24 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000840), 0xffffffffffffffff) syz_genetlink_get_family_id$smc(&(0x7f0000000040), r0) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000240)={0x20, r1, 0x301, 0x0, 0x0, {0x4}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x20}}, 0x0) 13:42:24 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x15}, 0x48) 13:42:24 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f00000000c0)=ANY=[], 0x8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) sendmmsg$inet6(r0, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)="8202", 0x2}], 0x1}}], 0x1, 0x4404c840) sendto$inet6(r0, &(0x7f0000000300), 0x5aa, 0x0, 0x0, 0xfffffffffffffdfd) 13:42:24 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) io_setup(0x5, &(0x7f0000001640)=0x0) io_getevents(r1, 0x4, 0x4, &(0x7f0000000300)=[{}, {}, {}, {}], &(0x7f00000000c0)={0x0, 0x3938700}) io_submit(r1, 0x1, &(0x7f0000000a80)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) 13:42:25 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) io_setup(0x5, &(0x7f0000001640)=0x0) io_getevents(r1, 0x4, 0x4, &(0x7f0000000300)=[{}, {}, {}, {}], 0x0) io_submit(r1, 0x1, &(0x7f0000000a80)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) 13:42:25 executing program 3: socketpair(0x2a, 0x2, 0x0, &(0x7f0000000540)) 13:42:25 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f00000000c0)=ANY=[], 0x8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) sendmmsg$inet6(r0, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)="8202", 0x2}], 0x1}}], 0x1, 0x4404c840) sendto$inet6(r0, &(0x7f0000000300), 0x5aa, 0x0, 0x0, 0xfffffffffffffdfd) 13:42:25 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000d00)={0x20, r1, 0x421, 0x0, 0x0, {0x2}, [{{0x8}, {0x4, 0x4}}]}, 0x20}}, 0x0) 13:42:25 executing program 1: socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x33fe0}}, 0x0) 13:42:25 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) io_setup(0x5, &(0x7f0000001640)=0x0) io_getevents(r1, 0x4, 0x4, &(0x7f0000000300)=[{}, {}, {}, {}], &(0x7f00000000c0)={0x0, 0x3938700}) io_submit(r1, 0x1, &(0x7f0000000a80)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) 13:42:25 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) io_setup(0x5, &(0x7f0000001640)=0x0) io_getevents(r1, 0x4, 0x4, &(0x7f0000000300)=[{}, {}, {}, {}], &(0x7f00000000c0)={0x0, 0x3938700}) io_submit(r1, 0x1, &(0x7f0000000a80)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) 13:42:25 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0xf, 0x0, 0x0, 0x80000000}, 0x48) 13:42:25 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f00000000c0)=ANY=[], 0x8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) sendmmsg$inet6(r0, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)="8202", 0x2}], 0x1}}], 0x1, 0x4404c840) sendto$inet6(r0, &(0x7f0000000300), 0x5aa, 0x0, 0x0, 0xfffffffffffffdfd) 13:42:25 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000400), 0x0, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f00000010c0)={0x1f, 0x0, 0x0}) 13:42:25 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f00000000c0)=ANY=[], 0x8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) sendmmsg$inet6(r0, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)="8202", 0x2}], 0x1}}], 0x1, 0x4404c840) sendto$inet6(r0, &(0x7f0000000300), 0x5aa, 0x0, 0x0, 0xfffffffffffffdfd) 13:42:25 executing program 3: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$sock_netdev_private(r0, 0x89ff, &(0x7f0000000080)="ea") 13:42:25 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) io_setup(0x5, &(0x7f0000001640)=0x0) io_getevents(r1, 0x4, 0x4, &(0x7f0000000300)=[{}, {}, {}, {}], 0x0) io_submit(r1, 0x1, &(0x7f0000000a80)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) 13:42:25 executing program 5: setuid(0xee00) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 13:42:25 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f00000000c0)=ANY=[], 0x8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) sendmmsg$inet6(r0, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)="8202", 0x2}], 0x1}}], 0x1, 0x4404c840) sendto$inet6(r0, &(0x7f0000000300), 0x5aa, 0x0, 0x0, 0xfffffffffffffdfd) 13:42:25 executing program 3: syz_clone(0x0, &(0x7f0000000340), 0x0, &(0x7f0000000440), &(0x7f0000000480), &(0x7f00000004c0)="b05c95bfc4587d21ffcb3af277c24c6237e7e0015d172f750b267859") pipe2$watch_queue(&(0x7f0000000540), 0x80) 13:42:25 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) io_setup(0x5, &(0x7f0000001640)=0x0) io_getevents(r1, 0x4, 0x4, &(0x7f0000000300)=[{}, {}, {}, {}], &(0x7f00000000c0)={0x0, 0x3938700}) io_submit(r1, 0x1, &(0x7f0000000a80)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) 13:42:25 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) io_setup(0x5, &(0x7f0000001640)=0x0) io_getevents(r1, 0x4, 0x4, &(0x7f0000000300)=[{}, {}, {}, {}], &(0x7f00000000c0)={0x0, 0x3938700}) io_submit(r1, 0x1, &(0x7f0000000a80)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) 13:42:26 executing program 3: r0 = socket(0x11, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000002c0)={'ip6tnl0\x00', 0x0}) 13:42:26 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000840), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {0x4}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}]}]}, 0x2c}}, 0x0) 13:42:26 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f00000000c0)=ANY=[], 0x8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) sendmmsg$inet6(r0, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)="8202", 0x2}], 0x1}}], 0x1, 0x4404c840) sendto$inet6(r0, &(0x7f0000000300), 0x5aa, 0x0, 0x0, 0xfffffffffffffdfd) 13:42:26 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f00000000c0)=ANY=[], 0x8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)="8202", 0x2}], 0x1}}], 0x1, 0x4404c840) sendto$inet6(r0, &(0x7f0000000300), 0x5aa, 0x0, 0x0, 0xfffffffffffffdfd) 13:42:26 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) io_setup(0x5, &(0x7f0000001640)=0x0) io_submit(r1, 0x1, &(0x7f0000000a80)=[&(0x7f0000000140)={0x0, 0x0, 0xfe, 0x5, 0x0, r0, 0x0}]) 13:42:26 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000000)=[{0x45}]}) 13:42:26 executing program 5: syz_io_uring_setup(0x666d, &(0x7f0000000200)={0x0, 0x0, 0x800}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff6000/0x1000)=nil, 0x0, 0x0) syz_io_uring_setup(0x6432, &(0x7f0000000300)={0x0, 0x0, 0x900}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff8000/0x2000)=nil, &(0x7f0000000380), &(0x7f00000003c0)) 13:42:26 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f00000000c0)=ANY=[], 0x8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)="8202", 0x2}], 0x1}}], 0x1, 0x4404c840) sendto$inet6(r0, &(0x7f0000000300), 0x5aa, 0x0, 0x0, 0xfffffffffffffdfd) 13:42:26 executing program 2: r0 = socket$igmp6(0xa, 0x3, 0x2) sendmmsg$inet(r0, &(0x7f0000001c80)=[{{&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0) 13:42:26 executing program 3: r0 = socket(0x22, 0x3, 0x0) recvmsg$unix(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x40000}, 0x0) 13:42:26 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) io_setup(0x5, &(0x7f0000001640)=0x0) io_getevents(r1, 0x4, 0x4, &(0x7f0000000300)=[{}, {}, {}, {}], &(0x7f00000000c0)={0x0, 0x3938700}) io_submit(r1, 0x1, &(0x7f0000000a80)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) 13:42:26 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) io_setup(0x5, &(0x7f0000001640)=0x0) io_getevents(r1, 0x4, 0x4, &(0x7f0000000300)=[{}, {}, {}, {}], &(0x7f00000000c0)={0x0, 0x3938700}) io_submit(r1, 0x1, &(0x7f0000000a80)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) 13:42:26 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x9, 0x2, &(0x7f0000000140)=@raw=[@kfunc, @alu], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:42:26 executing program 2: syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 13:42:26 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f00000000c0)=ANY=[], 0x8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)="8202", 0x2}], 0x1}}], 0x1, 0x4404c840) sendto$inet6(r0, &(0x7f0000000300), 0x5aa, 0x0, 0x0, 0xfffffffffffffdfd) 13:42:26 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000000)=[{0x1d}]}) 13:42:26 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x8917, &(0x7f0000000080)={'ip_vti0\x00', 0x0}) 13:42:27 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x1a, 0x0, 0x0, 0x0, 0x18}, 0x48) 13:42:27 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f00000000c0)=ANY=[], 0x8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) sendmmsg$inet6(r0, 0x0, 0x0, 0x4404c840) sendto$inet6(r0, &(0x7f0000000300), 0x5aa, 0x0, 0x0, 0xfffffffffffffdfd) 13:42:27 executing program 2: syz_io_uring_setup(0x666d, &(0x7f0000000200)={0x0, 0x0, 0x800}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff6000/0x1000)=nil, &(0x7f0000000000), 0x0) syz_io_uring_setup(0x6432, &(0x7f0000000300)={0x0, 0x90a6}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff8000/0x2000)=nil, &(0x7f0000000380), &(0x7f00000003c0)) 13:42:27 executing program 5: socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14}, 0x14}}, 0x0) 13:42:27 executing program 3: syz_clone3(&(0x7f0000000580)={0xc80, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 13:42:27 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f00000000c0)=ANY=[], 0x8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) sendmmsg$inet6(r0, 0x0, 0x0, 0x4404c840) sendto$inet6(r0, &(0x7f0000000300), 0x5aa, 0x0, 0x0, 0xfffffffffffffdfd) 13:42:27 executing program 1: socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x41) 13:42:27 executing program 5: r0 = socket$igmp6(0xa, 0x3, 0x2) setsockopt$inet6_mreq(r0, 0x29, 0x5, 0x0, 0x0) 13:42:27 executing program 4: set_mempolicy(0x0, &(0x7f0000000080)=0xc0000000, 0x200) 13:42:27 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f00000000c0)=ANY=[], 0x8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) sendmmsg$inet6(r0, 0x0, 0x0, 0x4404c840) sendto$inet6(r0, &(0x7f0000000300), 0x5aa, 0x0, 0x0, 0xfffffffffffffdfd) 13:42:27 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', &(0x7f0000000000)={'gretap0\x00', 0x0, 0x7800, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @multicast2}}}}) 13:42:27 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x5411, &(0x7f0000000080)={'ip_vti0\x00', 0x0}) 13:42:27 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) io_setup(0x5, &(0x7f0000001640)=0x0) io_submit(r1, 0x1, &(0x7f0000000a80)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 13:42:27 executing program 1: socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg$can_j1939(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) 13:42:27 executing program 5: r0 = socket(0x11, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000002c0)={'ip6tnl0\x00', &(0x7f0000000240)={'ip6_vti0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @dev, @ipv4={'\x00', '\xff\xff', @private}}}) 13:42:27 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f00000000c0)=ANY=[], 0x8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) sendmmsg$inet6(r0, &(0x7f0000001980), 0x0, 0x4404c840) sendto$inet6(r0, &(0x7f0000000300), 0x5aa, 0x0, 0x0, 0xfffffffffffffdfd) 13:42:27 executing program 2: r0 = socket(0x22, 0x3, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000c00)={0x0, 0xb03d6b150080ffff}}, 0x0) 13:42:27 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000240)) 13:42:27 executing program 5: r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) pidfd_send_signal(r0, 0x0, &(0x7f0000000040)={0xd, 0x0, 0x1001}, 0x0) 13:42:27 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f00000000c0)=ANY=[], 0x8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) sendmmsg$inet6(r0, &(0x7f0000001980), 0x0, 0x4404c840) sendto$inet6(r0, &(0x7f0000000300), 0x5aa, 0x0, 0x0, 0xfffffffffffffdfd) 13:42:27 executing program 2: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x48c, 0x4) 13:42:27 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x8935, &(0x7f0000000080)={'ip_vti0\x00', 0x0}) 13:42:27 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x0, 0x2, &(0x7f0000000700)=@raw=[@map_idx], &(0x7f0000000740)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:42:27 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x8946, &(0x7f0000000080)={'ip_vti0\x00', &(0x7f0000000000)={'gretap0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @multicast2}}}}) 13:42:27 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x9, 0x1, &(0x7f0000000140)=@raw=[@kfunc], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:42:28 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0x8, 0x2, &(0x7f0000000780)=@raw=[@cb_func], &(0x7f0000001880)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) 13:42:28 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f00000000c0)=ANY=[], 0x8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) sendmmsg$inet6(r0, &(0x7f0000001980), 0x0, 0x4404c840) sendto$inet6(r0, &(0x7f0000000300), 0x5aa, 0x0, 0x0, 0xfffffffffffffdfd) 13:42:28 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) io_setup(0x5, &(0x7f0000001640)=0x0) io_submit(r1, 0x1, &(0x7f0000000a80)=[&(0x7f0000000140)={0x0, 0x0, 0xfe, 0x0, 0x0, r0, 0x0}]) 13:42:28 executing program 5: request_key(&(0x7f00000001c0)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='dns_resolver\x00', 0xffffffffffffffff) 13:42:28 executing program 4: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040), 0x20801, 0x0) write$vga_arbiter(r0, 0x0, 0x0) 13:42:28 executing program 3: r0 = socket$pppl2tp(0x18, 0x1, 0x1) getsockopt$SO_TIMESTAMP(r0, 0x1, 0x3f, 0x0, &(0x7f0000000100)) 13:42:28 executing program 3: rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f00000000c0)={0x0, 0x989680}, 0x8) 13:42:28 executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, 0x0) 13:42:28 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x68, 0x2, 0x6, 0x5, 0x0, 0x1000000, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty=0x2}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @rand_addr=0x900}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x68}}, 0x0) [ 95.942614][ T23] kauditd_printk_skb: 16 callbacks suppressed [ 95.942625][ T23] audit: type=1400 audit(1675777347.994:183): avc: denied { write } for pid=4611 comm="syz-executor.4" name="vga_arbiter" dev="devtmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 13:42:28 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f00000000c0)=ANY=[], 0x8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) sendmmsg$inet6(r0, &(0x7f0000001980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4404c840) sendto$inet6(r0, &(0x7f0000000300), 0x5aa, 0x0, 0x0, 0xfffffffffffffdfd) 13:42:28 executing program 1: socketpair(0x22, 0x2, 0x25, &(0x7f00000000c0)) [ 95.979301][ T23] audit: type=1400 audit(1675777348.034:184): avc: denied { append } for pid=2719 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 96.001542][ T23] audit: type=1400 audit(1675777348.034:185): avc: denied { open } for pid=2719 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 13:42:28 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000840), 0xffffffffffffffff) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000b00)) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000180)={0x18, r1, 0x301, 0x0, 0x0, {0x11}, [@HEADER={0x4}]}, 0x18}}, 0x0) 13:42:28 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f00000000c0)=ANY=[], 0x8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) sendmmsg$inet6(r0, &(0x7f0000001980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4404c840) sendto$inet6(r0, &(0x7f0000000300), 0x5aa, 0x0, 0x0, 0xfffffffffffffdfd) [ 96.024044][ T23] audit: type=1400 audit(1675777348.034:186): avc: denied { getattr } for pid=2719 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 96.046812][ T23] audit: type=1400 audit(1675777348.034:187): avc: denied { open } for pid=4611 comm="syz-executor.4" path="/dev/vga_arbiter" dev="devtmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 96.058308][ T4628] delete_channel: no stack 13:42:28 executing program 5: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, 0x0) 13:42:28 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) io_setup(0x5, &(0x7f0000001640)=0x0) io_submit(r1, 0x1, &(0x7f0000000a80)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0x0, r0, 0x0}]) 13:42:28 executing program 5: r0 = socket$igmp6(0xa, 0x3, 0x2) setsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000300)={@private0}, 0x14) 13:42:28 executing program 3: r0 = socket(0x18, 0x0, 0x2) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r0, 0x3309) 13:42:28 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f00000000c0)=ANY=[], 0x8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) sendmmsg$inet6(r0, &(0x7f0000001980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4404c840) sendto$inet6(r0, &(0x7f0000000300), 0x5aa, 0x0, 0x0, 0xfffffffffffffdfd) 13:42:28 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip_vti0\x00', &(0x7f0000000000)={'gretap0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @multicast2}}}}) 13:42:28 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000180)=@abs, 0x6e) 13:42:28 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) io_setup(0x5, &(0x7f0000001640)=0x0) io_submit(r1, 0x1, &(0x7f0000000a80)=[&(0x7f0000000140)={0x0, 0x0, 0xfe, 0x8, 0x0, r0, 0x0}]) 13:42:28 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f00000000c0)=ANY=[], 0x8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) sendmmsg$inet6(r0, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000200)}}], 0x1, 0x4404c840) sendto$inet6(r0, &(0x7f0000000300), 0x5aa, 0x0, 0x0, 0xfffffffffffffdfd) [ 96.077211][ T23] audit: type=1400 audit(1675777348.064:188): avc: denied { ioctl } for pid=4621 comm="syz-executor.1" path="socket:[21073]" dev="sockfs" ino=21073 ioctlcmd=0x9418 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 96.114286][ T4628] delete_channel: no stack 13:42:28 executing program 3: r0 = socket(0x22, 0x3, 0x0) recvmsg$unix(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x2}, 0x0) 13:42:28 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f00000000c0)=ANY=[], 0x8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) sendmmsg$inet6(r0, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000200)}}], 0x1, 0x4404c840) sendto$inet6(r0, &(0x7f0000000300), 0x5aa, 0x0, 0x0, 0xfffffffffffffdfd) 13:42:28 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x12, 0x8, 0x0, 0x101}, 0x48) 13:42:28 executing program 4: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000200)=0xfffffffc) 13:42:28 executing program 5: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$sock_SIOCSIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8983, &(0x7f0000000300)) 13:42:28 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0), 0x40001, 0x0) ioctl$SNAPSHOT_ATOMIC_RESTORE(r0, 0x3304) 13:42:28 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$unix(0x1, 0x1, 0x0) io_setup(0x5, &(0x7f0000001640)=0x0) io_submit(r2, 0x2, &(0x7f0000000480)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x3, 0x0, r0, 0x0}]) 13:42:28 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f00000000c0)=ANY=[], 0x8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) sendmmsg$inet6(r0, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000200)}}], 0x1, 0x4404c840) sendto$inet6(r0, &(0x7f0000000300), 0x5aa, 0x0, 0x0, 0xfffffffffffffdfd) 13:42:28 executing program 4: syz_emit_ethernet(0x3a, &(0x7f0000000080)={@local, @random="2445feb42a08", @val={@void}, {@ipv4={0x800, @dccp={{0x6, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x21, 0x0, @rand_addr=0x2, @local, {[@ssrr={0x89, 0x3}]}}, {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "692d0f", 0x0, "7255e5"}}}}}}, 0x0) 13:42:28 executing program 1: r0 = memfd_create(&(0x7f0000000100)='M!&}*\x00Q\x00\xa6\xe58\xcb^\xd7<\xd3\xdd\xa3g\v{~\xd4VG\x00^\x83\bX\xe1\xb3\xf0p\x98Y+Q6o\x8c\x9e\xbaD\xe9\x88\xbb\x04\xf0V\x8c\xc7\x80~\xb4\x1c:\xe4B\xa9\x05Aj\xaf\xe0Y\xd0xm~\xfe\x17\x83$\x00\xac\xa3B\xff\xee\x86_\v\x8a\xb6\xbd!E\xd2\xbe\x89\xe6\xb32\xc2d\x92\xfaq\xb0m\x9c\xff}\xe8\xf5L\xfc\xd5\\R\xbds\x837d\x80\x86}\"\xcd\v\x983(\x87\r9\xac\n34\xf2J\xd0\x1f\"sV\a\x1cO\x8c\xde\xd2k0V\v\x13s.\x9bB\\\xe6\x9d\x0f\xfc\x00\xa1\x0f\x02u\x89a$q\f\xb4\xc0\x95\xe4D\xaa\x19r\x7f', 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, 0x0, r0}, 0x68) 13:42:28 executing program 5: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$sock_netdev_private(r0, 0x0, 0x0) 13:42:28 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f00000000c0)=ANY=[], 0x8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) sendmmsg$inet6(r0, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000200)=[{0x0}], 0x1}}], 0x1, 0x4404c840) sendto$inet6(r0, &(0x7f0000000300), 0x5aa, 0x0, 0x0, 0xfffffffffffffdfd) 13:42:28 executing program 4: syz_emit_ethernet(0x3a, &(0x7f0000000080)={@local, @random="2445feb42a08", @val={@void}, {@ipv4={0x800, @dccp={{0x6, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x21, 0x0, @rand_addr=0x2, @local, {[@ssrr={0x89, 0x3}]}}, {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "692d0f", 0x0, "7255e5"}}}}}}, 0x0) 13:42:28 executing program 1: socketpair$unix(0x1, 0x813f523a57abdf60, 0x0, 0x0) 13:42:28 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x2f, 0x0, &(0x7f0000000080)) [ 96.273224][ T4670] random: crng reseeded on system resumption 13:42:28 executing program 1: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)="b0") pipe2$watch_queue(&(0x7f0000000540), 0x80) 13:42:28 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) io_setup(0x5, &(0x7f0000001640)=0x0) io_submit(r1, 0x2, &(0x7f0000000a80)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x2}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 13:42:28 executing program 2: bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000340)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00'}, 0x10) 13:42:28 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f00000000c0)=ANY=[], 0x8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) sendmmsg$inet6(r0, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000200)=[{0x0}], 0x1}}], 0x1, 0x4404c840) sendto$inet6(r0, &(0x7f0000000300), 0x5aa, 0x0, 0x0, 0xfffffffffffffdfd) 13:42:28 executing program 4: syz_emit_ethernet(0x3a, &(0x7f0000000080)={@local, @random="2445feb42a08", @val={@void}, {@ipv4={0x800, @dccp={{0x6, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x21, 0x0, @rand_addr=0x2, @local, {[@ssrr={0x89, 0x3}]}}, {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "692d0f", 0x0, "7255e5"}}}}}}, 0x0) 13:42:28 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) io_setup(0x5, &(0x7f0000001640)=0x0) io_submit(r1, 0x2, &(0x7f0000000a80)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]) [ 96.340068][ T23] audit: type=1400 audit(1675777348.394:189): avc: denied { getopt } for pid=4679 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 13:42:28 executing program 4: syz_emit_ethernet(0x3a, &(0x7f0000000080)={@local, @random="2445feb42a08", @val={@void}, {@ipv4={0x800, @dccp={{0x6, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x21, 0x0, @rand_addr=0x2, @local, {[@ssrr={0x89, 0x3}]}}, {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "692d0f", 0x0, "7255e5"}}}}}}, 0x0) 13:42:28 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f00000000c0)=ANY=[], 0x8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) sendmmsg$inet6(r0, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000200)=[{0x0}], 0x1}}], 0x1, 0x4404c840) sendto$inet6(r0, &(0x7f0000000300), 0x5aa, 0x0, 0x0, 0xfffffffffffffdfd) 13:42:28 executing program 2: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$sock_netdev_private(r0, 0x89ff, 0x0) 13:42:28 executing program 1: pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f00000000c0)) 13:42:28 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f00000000c0)=ANY=[], 0x8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) sendmmsg$inet6(r0, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)}], 0x1}}], 0x1, 0x4404c840) sendto$inet6(r0, &(0x7f0000000300), 0x5aa, 0x0, 0x0, 0xfffffffffffffdfd) 13:42:28 executing program 4: syz_emit_ethernet(0x0, 0x0, 0x0) 13:42:28 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$unix(0x1, 0x1, 0x0) io_setup(0x5, &(0x7f0000001640)=0x0) io_submit(r2, 0x2, &(0x7f0000000480)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x3, 0x0, r0, 0x0, 0x0, 0x100000001}]) 13:42:29 executing program 2: r0 = socket$pppl2tp(0x18, 0x1, 0x1) setsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) 13:42:29 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1a, 0x0, 0x0, 0x0, 0xa06, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x2}, 0x48) 13:42:29 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000840), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000240)={0x20, r1, 0x301, 0x0, 0x0, {0x4}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x20}}, 0x0) 13:42:29 executing program 4: syz_emit_ethernet(0x0, 0x0, 0x0) 13:42:29 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f00000000c0)=ANY=[], 0x8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) sendmmsg$inet6(r0, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)}], 0x1}}], 0x1, 0x4404c840) sendto$inet6(r0, &(0x7f0000000300), 0x5aa, 0x0, 0x0, 0xfffffffffffffdfd) 13:42:29 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(r0, 0x8983, &(0x7f0000000140)={0x1, 'wg0\x00'}) 13:42:29 executing program 3: clock_gettime(0x7, &(0x7f00000012c0)) 13:42:29 executing program 4: syz_emit_ethernet(0x0, 0x0, 0x0) 13:42:29 executing program 5: socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x803e}}, 0x0) 13:42:29 executing program 4: syz_emit_ethernet(0x3a, &(0x7f0000000080)={@local, @random="2445feb42a08", @val={@void}, {@ipv4={0x800, @dccp={{0x6, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x21, 0x0, @rand_addr, @local, {[@ssrr={0x89, 0x3}]}}, {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "692d0f", 0x0, "7255e5"}}}}}}, 0x0) 13:42:29 executing program 1: syz_clone3(&(0x7f0000000580)={0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0), {}, 0x0, 0x0, 0x0, &(0x7f0000000500)=[0x0, 0xffffffffffffffff, 0x0], 0x3}, 0x58) 13:42:29 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002340)={&(0x7f0000000100)=@newlink={0x24, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_PHYS_PORT_ID={0x4}]}, 0x24}}, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCGFLAGS1(r1, 0x4004743a, &(0x7f0000000100)) [ 97.339930][ T23] audit: type=1400 audit(1675777349.394:190): avc: denied { setopt } for pid=4710 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 13:42:29 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_GET_ADDR(r0, 0x0, 0x0) 13:42:29 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f00000000c0)=ANY=[], 0x8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) sendmmsg$inet6(r0, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)}], 0x1}}], 0x1, 0x4404c840) sendto$inet6(r0, &(0x7f0000000300), 0x5aa, 0x0, 0x0, 0xfffffffffffffdfd) 13:42:29 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_GET_ADDR(r0, &(0x7f0000001680)={0x0, 0x0, 0x0}, 0x0) 13:42:29 executing program 2: utimensat(0xffffffffffffffff, 0x0, &(0x7f0000001ac0)={{0x0, 0xea60}}, 0x100) 13:42:29 executing program 4: syz_emit_ethernet(0x3a, &(0x7f0000000080)={@local, @random="2445feb42a08", @val={@void}, {@ipv4={0x800, @dccp={{0x6, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x21, 0x0, @rand_addr, @local, {[@ssrr={0x89, 0x3}]}}, {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "692d0f", 0x0, "7255e5"}}}}}}, 0x0) 13:42:29 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f00000000c0)=ANY=[], 0x8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) sendmmsg$inet6(r0, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)="82", 0x1}], 0x1}}], 0x1, 0x4404c840) sendto$inet6(r0, &(0x7f0000000300), 0x5aa, 0x0, 0x0, 0xfffffffffffffdfd) 13:42:29 executing program 5: openat$incfs(0xffffffffffffff9c, 0x0, 0x301000, 0x0) 13:42:29 executing program 1: mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 13:42:29 executing program 2: r0 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r0, &(0x7f0000001880)=[{{&(0x7f00000003c0)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x80, 0x0}}, {{&(0x7f0000000b40)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0xc00}}, 0x80, 0x0}}], 0x2, 0x0) 13:42:29 executing program 4: syz_emit_ethernet(0x3a, &(0x7f0000000080)={@local, @random="2445feb42a08", @val={@void}, {@ipv4={0x800, @dccp={{0x6, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x21, 0x0, @rand_addr, @local, {[@ssrr={0x89, 0x3}]}}, {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "692d0f", 0x0, "7255e5"}}}}}}, 0x0) 13:42:29 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f00000000c0)=ANY=[], 0x8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) sendmmsg$inet6(r0, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)="82", 0x1}], 0x1}}], 0x1, 0x4404c840) sendto$inet6(r0, &(0x7f0000000300), 0x5aa, 0x0, 0x0, 0xfffffffffffffdfd) 13:42:29 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002340)={&(0x7f0000000100)=@newlink={0x24, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_PHYS_PORT_ID={0x4}]}, 0x24}}, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCGFLAGS1(r1, 0x4004743a, &(0x7f0000000100)) 13:42:29 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000001d00)=@mangle={'mangle\x00', 0x1f, 0x6, 0x438, 0x268, 0xa0, 0xa0, 0x268, 0x180, 0x3f0, 0x3f0, 0x3f0, 0x3f0, 0x3f0, 0x6, 0x0, {[{{@ip={@empty, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'pimreg0\x00', 'ip6erspan0\x00'}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @private}}}, {{@ip={@rand_addr, @private, 0x0, 0x0, 'tunl0\x00', 'erspan0\x00'}, 0x0, 0xb8, 0xe0, 0x0, {}, [@common=@socket0={{0x20}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xc0, 0xe8, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @TTL={0x28}}, {{@ip={@multicast1, @loopback, 0x0, 0x0, 'pim6reg0\x00', 'pim6reg0\x00'}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @dev}}}, {{@uncond, 0x0, 0x70, 0x98}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x498) 13:42:29 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @rand_addr=0x64010102}, {0x0, @remote}, 0x8, {0x2, 0x0, @loopback}, 'ipvlan1\x00'}) 13:42:29 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @random="2445feb42a08", @val={@void}, {@ipv4={0x800, @dccp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x21, 0x0, @rand_addr=0x2, @local}, {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "692d0f", 0x0, "7255e5"}}}}}}, 0x0) 13:42:29 executing program 1: statx(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x1500, 0x0, 0x0) 13:42:29 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f00000000c0)=ANY=[], 0x8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) sendmmsg$inet6(r0, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)="82", 0x1}], 0x1}}], 0x1, 0x4404c840) sendto$inet6(r0, &(0x7f0000000300), 0x5aa, 0x0, 0x0, 0xfffffffffffffdfd) [ 97.520868][ T23] audit: type=1400 audit(1675777349.574:191): avc: denied { write } for pid=4748 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 13:42:29 executing program 5: bpf$OBJ_GET_PROG(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00'}, 0x10) 13:42:29 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000100)="8e0e9b50081b28559b334a", 0xb}], 0x1) 13:42:29 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f00000000c0)=ANY=[], 0x8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) sendmmsg$inet6(r0, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)="8202", 0x2}], 0x1}}], 0x1, 0x0) sendto$inet6(r0, &(0x7f0000000300), 0x5aa, 0x0, 0x0, 0xfffffffffffffdfd) 13:42:29 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_GET_ADDR(r0, &(0x7f0000001680)={&(0x7f0000001580), 0xc, &(0x7f0000001640)={&(0x7f00000015c0)={0x14, 0x0, 0x4437a491cd3d574c}, 0x14}}, 0x0) 13:42:29 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @random="2445feb42a08", @val={@void}, {@ipv4={0x800, @dccp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x21, 0x0, @rand_addr=0x2, @local}, {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "692d0f", 0x0, "7255e5"}}}}}}, 0x0) 13:42:29 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000100)="8e0e9b50081b28559b334a", 0xb}], 0x1) [ 97.586384][ T4762] dccp_invalid_packet: P.type (REQUEST) not Data || [Data]Ack, while P.X == 0 [ 97.669690][ T4779] dccp_invalid_packet: P.type (REQUEST) not Data || [Data]Ack, while P.X == 0 13:42:29 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000001c00)={0x0, 0x3, &(0x7f00000017c0)=@framed, &(0x7f0000001800)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:42:29 executing program 5: r0 = syz_io_uring_setup(0x2de7, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000080)=0x0) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_POLL_REMOVE={0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r3}}, 0x0) io_uring_enter(r0, 0x2ff, 0x0, 0x0, 0x0, 0x0) 13:42:29 executing program 2: getsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) 13:42:29 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f00000000c0)=ANY=[], 0x8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) sendmmsg$inet6(r0, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)="8202", 0x2}], 0x1}}], 0x1, 0x0) sendto$inet6(r0, &(0x7f0000000300), 0x5aa, 0x0, 0x0, 0xfffffffffffffdfd) 13:42:29 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @random="2445feb42a08", @val={@void}, {@ipv4={0x800, @dccp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x21, 0x0, @rand_addr=0x2, @local}, {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "692d0f", 0x0, "7255e5"}}}}}}, 0x0) 13:42:29 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000100)="8e0e9b50081b28559b334a", 0xb}], 0x1) 13:42:29 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000e00), &(0x7f0000000e40)=0x4) 13:42:29 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000100)="8e0e9b50081b28559b334a", 0xb}], 0x1) 13:42:29 executing program 4: socketpair(0x21, 0x0, 0x5, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x48, r2, 0x20, 0x70bd2a, 0x25dfdbff, {}, [@L2TP_ATTR_PW_TYPE={0x6}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x80}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x9}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x2}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x5}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp}]}, 0x48}}, 0x8000) r3 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000200), r1) sendmsg$MPTCP_PM_CMD_GET_LIMITS(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x28, r3, 0x0, 0x0, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_ADDR={0x14, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @broadcast}]}]}, 0x28}}, 0x4001) sendmsg$TIPC_NL_MON_SET(r1, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc}, 0x14}}, 0x94) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000001, 0x10010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, 0x0, &(0x7f0000000440)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000400), 0x0, 0x0, 0x80800, 0x1}, 0x7ff) getuid() ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000500)={0xfffffffffffeffff}) clock_gettime(0x0, &(0x7f0000000580)) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000600)) sendmsg$L2TP_CMD_TUNNEL_DELETE(r1, 0x0, 0x20008000) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000740), 0x0) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000840)={0x2, 0x0, 0x98, &(0x7f0000000780)={0x8000000000000001, 0xfffffffffffffffd}}) fchmodat(0xffffffffffffffff, 0x0, 0x0) getresuid(&(0x7f0000000a00), 0x0, &(0x7f0000000a80)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={0xffffffffffffffff, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x7, &(0x7f0000000bc0)=[0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000c40)=[{}], 0x8, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10) syz_io_uring_setup(0x67e1, &(0x7f0000001000)={0x0, 0x0, 0x1, 0x0, 0x3e1}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000001080), &(0x7f00000010c0)) openat$sysfs(0xffffffffffffff9c, &(0x7f0000001100)='/sys/block/loop0', 0x0, 0xa0) 13:42:29 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000080)={{0x2, 0x0, @local}, {0x0, @random="04e9eefab44f"}, 0x8, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) 13:42:29 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f00000000c0)=ANY=[], 0x8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) sendmmsg$inet6(r0, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)="8202", 0x2}], 0x1}}], 0x1, 0x0) sendto$inet6(r0, &(0x7f0000000300), 0x5aa, 0x0, 0x0, 0xfffffffffffffdfd) 13:42:29 executing program 1: writev(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000100)="8e0e9b50081b28559b334a", 0xb}], 0x1) [ 97.745474][ T4790] dccp_invalid_packet: P.type (REQUEST) not Data || [Data]Ack, while P.X == 0 [ 97.745913][ T23] audit: type=1400 audit(1675777349.804:192): avc: denied { override_creds } for pid=4782 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 13:42:29 executing program 3: sendmsg$MPTCP_PM_CMD_GET_LIMITS(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) getuid() clock_gettime(0x0, 0x0) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getresuid(0x0, 0x0, 0x0) syz_io_uring_setup(0x67e1, &(0x7f0000001000), &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000001080), &(0x7f00000010c0)) 13:42:29 executing program 2: openat$sysfs(0xffffffffffffff9c, 0x0, 0x410580, 0x0) 13:42:29 executing program 5: setsockopt$pppl2tp_PPPOL2TP_SO_SENDSEQ(0xffffffffffffffff, 0x111, 0x3, 0x0, 0x4) ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_GET_LIMITS(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_RECVSEQ(0xffffffffffffffff, 0x111, 0x2, 0x0, 0x4) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={0x0}}, 0x0) syz_clone3(&(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000ac0)=""/125, 0x7d, 0x0, 0x0}, 0x58) 13:42:29 executing program 1: writev(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000100)="8e0e9b50081b28559b334a", 0xb}], 0x1) 13:42:29 executing program 4: setsockopt$pppl2tp_PPPOL2TP_SO_SENDSEQ(0xffffffffffffffff, 0x111, 0x3, 0x0, 0x4) ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_RECVSEQ(0xffffffffffffffff, 0x111, 0x2, 0x0, 0x4) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) syz_clone3(&(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 13:42:29 executing program 3: syz_clone3(&(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000c40)}, 0x58) 13:42:29 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f00000000c0)=ANY=[], 0x8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) sendmmsg$inet6(r0, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)="8202", 0x2}], 0x1}}], 0x1, 0x4404c840) sendto$inet6(0xffffffffffffffff, &(0x7f0000000300), 0x5aa, 0x0, 0x0, 0xfffffffffffffdfd) 13:42:29 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_GET_ADDR(r0, &(0x7f0000001680)={0x0, 0x0, &(0x7f0000001640)={&(0x7f00000015c0)={0x14}, 0x14}}, 0x0) 13:42:29 executing program 5: openat2$dir(0xffffffffffffff9c, 0x0, &(0x7f0000001540)={0x0, 0x80}, 0x18) 13:42:29 executing program 1: writev(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000100)="8e0e9b50081b28559b334a", 0xb}], 0x1) 13:42:29 executing program 3: unshare(0x6c060000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCGFLAGS1(r1, 0x80047458, 0x0) 13:42:29 executing program 4: setsockopt$pppl2tp_PPPOL2TP_SO_SENDSEQ(0xffffffffffffffff, 0x111, 0x3, 0x0, 0x4) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f0000000040)="95141c1a771c6a22eec38ab180fea6d3a2f1cd1189a40044bf5de271c51003") setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(0xffffffffffffffff, 0x111, 0x5, 0x0, 0x4) utimensat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r0 = syz_genetlink_get_family_id$mptcp(0x0, 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_GET_LIMITS(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x801}, 0x0) r1 = openat$incfs(0xffffffffffffffff, &(0x7f0000000340)='.log\x00', 0x20042, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_SENDSEQ(0xffffffffffffffff, 0x111, 0x3, 0x0, 0x4) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0xac, 0x0, 0x20, 0x70bd27, 0x25dfdbfd, {}, [@TIPC_NLA_SOCK={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8}]}, @TIPC_NLA_SOCK_CON={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0xfffffffa}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x8}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3}]}, @TIPC_NLA_BEARER={0xc, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8}]}, @TIPC_NLA_SOCK={0x4}, @TIPC_NLA_NET={0x4c, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xa82}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x10001}, @TIPC_NLA_NET_ADDR={0x8}, @TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}]}]}, 0xac}, 0x1, 0x0, 0x0, 0x801}, 0x5) setsockopt$pppl2tp_PPPOL2TP_SO_RECVSEQ(0xffffffffffffffff, 0x111, 0x2, 0x1, 0x4) sendmsg$MPTCP_PM_CMD_GET_LIMITS(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x68088c43dca55a20}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)={0x50, r0, 0x4, 0x70bd27, 0x200, {}, [@MPTCP_PM_ATTR_ADDR={0x2c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_ID={0x5}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0xff}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x80}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x5}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}]}, 0x50}, 0x1, 0x0, 0x0, 0x24004891}, 0x40) getsockname$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000780)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000700), 0xc, 0x0}, 0x20048040) accept4$inet(0xffffffffffffffff, &(0x7f0000000880)={0x2, 0x0, @remote}, &(0x7f00000008c0)=0x10, 0x0) syz_clone3(&(0x7f0000000c80)={0x40000, &(0x7f0000000a00), &(0x7f0000000a40), &(0x7f0000000a80), {0x10}, &(0x7f0000000ac0)=""/125, 0x7d, &(0x7f0000000b40)=""/206, &(0x7f0000000c40)=[0xffffffffffffffff], 0x1, {r1}}, 0x58) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000e00), &(0x7f0000000e40)=0x4) 13:42:29 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f00000000c0)=ANY=[], 0x8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) sendmmsg$inet6(r0, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)="8202", 0x2}], 0x1}}], 0x1, 0x4404c840) sendto$inet6(0xffffffffffffffff, &(0x7f0000000300), 0x5aa, 0x0, 0x0, 0xfffffffffffffdfd) 13:42:29 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000100)="8e0e9b50081b28559b334a", 0xb}], 0x1) 13:42:30 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_GET_ADDR(r0, &(0x7f0000001680)={0x0, 0x0, &(0x7f0000001640)={0x0}}, 0x0) 13:42:30 executing program 5: name_to_handle_at(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) 13:42:30 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f00000000c0)=ANY=[], 0x8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) sendmmsg$inet6(r0, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)="8202", 0x2}], 0x1}}], 0x1, 0x4404c840) sendto$inet6(0xffffffffffffffff, &(0x7f0000000300), 0x5aa, 0x0, 0x0, 0xfffffffffffffdfd) 13:42:30 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_GET_ADDR(r0, &(0x7f0000001680)={0x0, 0x0, &(0x7f0000001640)={&(0x7f00000015c0)={0x14}, 0x14}}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000001700), 0xffffffffffffffff) 13:42:30 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000100)="8e0e9b50081b28559b334a", 0xb}], 0x1) 13:42:30 executing program 4: setsockopt$pppl2tp_PPPOL2TP_SO_SENDSEQ(0xffffffffffffffff, 0x111, 0x3, 0x0, 0x4) ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_GET_LIMITS(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_RECVSEQ(0xffffffffffffffff, 0x111, 0x2, 0x0, 0x4) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={0x0}}, 0x0) syz_clone3(&(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000ac0)=""/125, 0x7d, 0x0, &(0x7f0000000c40)=[0xffffffffffffffff], 0x1}, 0x58) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) 13:42:30 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f00000000c0)=ANY=[], 0x8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) sendmmsg$inet6(r0, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)="8202", 0x2}], 0x1}}], 0x1, 0x4404c840) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 13:42:30 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000001c00)={0x0, 0x0, 0x0, &(0x7f0000001800)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:42:30 executing program 3: openat$sysfs(0xffffffffffffff9c, &(0x7f0000001240)='/sys/class/wmi_bus', 0x90002, 0x0) 13:42:30 executing program 5: set_mempolicy(0x4005, &(0x7f0000000100)=0x5, 0x81) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x60, &(0x7f0000000000)={{0x0, @dev, 0x0, 0x0, 'ovf\x00', 0x0, 0x0, 0x3}, {@multicast1}}, 0x44) 13:42:30 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f00000000c0)=ANY=[], 0x8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) sendmmsg$inet6(r0, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)="8202", 0x2}], 0x1}}], 0x1, 0x4404c840) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 13:42:30 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000100)="8e0e9b50081b28559b334a", 0xb}], 0x1) 13:42:30 executing program 2: setsockopt$pppl2tp_PPPOL2TP_SO_SENDSEQ(0xffffffffffffffff, 0x111, 0x3, 0x0, 0x4) ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_RECVSEQ(0xffffffffffffffff, 0x111, 0x2, 0x0, 0x4) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) syz_clone3(&(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000ac0)=""/125, 0x7d, 0x0, 0x0}, 0x58) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, &(0x7f0000000e40)) 13:42:30 executing program 4: fchmodat(0xffffffffffffffff, &(0x7f0000001200)='./file0\x00', 0x0) 13:42:30 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f00000000c0)=ANY=[], 0x8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) sendmmsg$inet6(r0, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)="8202", 0x2}], 0x1}}], 0x1, 0x4404c840) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 13:42:30 executing program 1: syz_open_dev$tty1(0xc, 0x4, 0x2) writev(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000100)="8e0e9b50081b28559b334a", 0xb}], 0x1) 13:42:30 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000001d00)=@mangle={'mangle\x00', 0x1f, 0x6, 0x488, 0x268, 0xa0, 0xa0, 0x268, 0x180, 0x3f0, 0x3f0, 0x3f0, 0x3f0, 0x3f0, 0x6, 0x0, {[{{@ip={@empty, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'pimreg0\x00', 'ip6erspan0\x00'}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @private}}}, {{@ip={@rand_addr, @private, 0x0, 0x0, 'tunl0\x00', 'erspan0\x00'}, 0x0, 0xb8, 0xe0, 0x0, {}, [@common=@socket0={{0x20}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xc0, 0xe8, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}}]}, @TTL={0x28}}, {{@ip={@multicast1, @loopback, 0x0, 0x0, 'pim6reg0\x00', 'pim6reg0\x00'}, 0x0, 0x98, 0xc8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @dev}}}, {{@uncond, 0x0, 0x98, 0xc0, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:42:30 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r0, &(0x7f0000001880)=[{{&(0x7f00000003c0)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x80, 0x0}}, {{&(0x7f0000000b40)=@tipc=@nameseq={0x1e, 0x2}, 0x80, 0x0}}], 0x2, 0x0) 13:42:30 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, 0x0, 0x0) 13:42:30 executing program 0: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000018000)=0x1, 0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in={0x2, 0x2, @remote}], 0x10) 13:42:30 executing program 1: syz_open_dev$tty1(0xc, 0x4, 0x2) writev(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000100)="8e0e9b50081b28559b334a", 0xb}], 0x1) [ 98.161098][ T4875] x_tables: duplicate underflow at hook 1 13:42:30 executing program 5: set_mempolicy(0x4005, &(0x7f0000000100)=0x5, 0x81) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x60, &(0x7f0000000000)={{0x0, @dev, 0x0, 0x0, 'ovf\x00', 0x0, 0x0, 0x3}, {@multicast1}}, 0x44) 13:42:30 executing program 3: openat$uhid(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) 13:42:30 executing program 4: io_uring_setup(0x6ac, &(0x7f0000001700)={0x0, 0xd4c, 0x8}) 13:42:30 executing program 2: setsockopt$pppl2tp_PPPOL2TP_SO_SENDSEQ(0xffffffffffffffff, 0x111, 0x3, 0x0, 0x4) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) ioctl$PPPIOCGL2TPSTATS(r0, 0x80487436, &(0x7f0000000040)="95141c1a771c6a22eec38ab180fea6d3a2f1cd1189a40044bf5de271c510") socketpair(0x6, 0x5, 0x9, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(0xffffffffffffffff, 0x111, 0x5, 0x50, 0x4) utimensat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={{}, {0x77359400}}, 0x0) openat$incfs(0xffffffffffffffff, &(0x7f0000000340)='.log\x00', 0x0, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_SENDSEQ(0xffffffffffffffff, 0x111, 0x3, 0x0, 0x4) setsockopt$pppl2tp_PPPOL2TP_SO_RECVSEQ(r0, 0x111, 0x2, 0x1, 0x4) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, &(0x7f0000000540), 0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'syzkaller0\x00'}) getsockname$packet(r0, 0x0, &(0x7f0000000780)) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000700), 0xc, &(0x7f0000000800)={&(0x7f00000007c0)=@newchain={0x34, 0x64, 0x8, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0xffe8}, {}, {0x0, 0xe}}, [@TCA_RATE={0x6, 0x5, {0x84, 0x92}}, @TCA_CHAIN={0x8, 0xb, 0x7}]}, 0x34}, 0x1, 0x0, 0x0, 0x20004800}, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000880)={0x2, 0x0, @remote}, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, 0x0) syz_clone3(&(0x7f0000000c80)={0x40000, &(0x7f0000000a00), &(0x7f0000000a40), &(0x7f0000000a80), {}, &(0x7f0000000ac0)=""/125, 0x7d, &(0x7f0000000b40)=""/206, &(0x7f0000000c40)=[0xffffffffffffffff], 0x1}, 0x58) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000e00), &(0x7f0000000e40)=0x4) 13:42:30 executing program 1: syz_open_dev$tty1(0xc, 0x4, 0x2) writev(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000100)="8e0e9b50081b28559b334a", 0xb}], 0x1) 13:42:30 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000001d00)=@mangle={'mangle\x00', 0x1f, 0x6, 0x488, 0x268, 0xa0, 0xa0, 0x268, 0x180, 0x3f0, 0x3f0, 0x3f0, 0x3f0, 0x3f0, 0x6, 0x0, {[{{@ip={@empty, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'pimreg0\x00', 'ip6erspan0\x00', {}, {0xff}, 0x88}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @private}}}, {{@ip={@rand_addr, @private, 0x0, 0x0, 'tunl0\x00', 'erspan0\x00', {}, {}, 0x0, 0x0, 0x48}, 0x0, 0xb8, 0xe0, 0x0, {}, [@common=@socket0={{0x20}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xc0, 0xe8, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}, {0xa}}]}, @TTL={0x28}}, {{@ip={@multicast1, @loopback, 0x0, 0x0, 'pim6reg0\x00', 'pim6reg0\x00'}, 0x0, 0x98, 0xc8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @dev}}}, {{@uncond, 0x0, 0x98, 0xc0, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) 13:42:30 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @remote}, 0x8, {0x2, 0x0, @multicast1}}) 13:42:30 executing program 3: syz_clone3(&(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[0xffffffffffffffff], 0x1}, 0x58) 13:42:30 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) writev(r0, 0x0, 0x0) 13:42:30 executing program 3: statx(0xffffffffffffffff, 0x0, 0x1500, 0x0, 0x0) [ 98.371135][ T4890] x_tables: duplicate underflow at hook 1 13:42:30 executing program 0: setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f0000000040)) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(0xffffffffffffffff, 0x111, 0x5, 0x0, 0x4) utimensat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$mptcp(0x0, 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_GET_LIMITS(0xffffffffffffffff, 0x0, 0x44) r0 = openat$incfs(0xffffffffffffffff, &(0x7f0000000340)='.log\x00', 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_RECVSEQ(0xffffffffffffffff, 0x111, 0x2, 0x0, 0x4) getsockname$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000780)=0x14) accept4$inet(0xffffffffffffffff, &(0x7f0000000880)={0x2, 0x0, @remote}, &(0x7f00000008c0)=0x10, 0x0) syz_clone3(&(0x7f0000000c80)={0x40000, 0x0, &(0x7f0000000a40), &(0x7f0000000a80), {0x10}, &(0x7f0000000ac0)=""/125, 0x7d, &(0x7f0000000b40)=""/206, &(0x7f0000000c40)=[0xffffffffffffffff], 0x1}, 0x58) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000e00), &(0x7f0000000e40)=0x4) 13:42:30 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @remote}, 0x8, {0x2, 0x0, @multicast1}}) 13:42:30 executing program 5: set_mempolicy(0x4005, &(0x7f0000000100)=0x5, 0x81) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x60, &(0x7f0000000000)={{0x0, @dev, 0x0, 0x0, 'ovf\x00', 0x0, 0x0, 0x3}, {@multicast1}}, 0x44) 13:42:30 executing program 4: utimensat(0xffffffffffffffff, 0x0, &(0x7f0000001ac0)={{0x0, 0xea60}}, 0x0) 13:42:30 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) writev(r0, 0x0, 0x0) 13:42:30 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000100)="8e0e9b50081b2830", 0x8}], 0x1) 13:42:30 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @remote}, 0x8, {0x2, 0x0, @multicast1}}) 13:42:30 executing program 3: setsockopt$pppl2tp_PPPOL2TP_SO_SENDSEQ(0xffffffffffffffff, 0x111, 0x3, 0x0, 0x4) 13:42:30 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000004c0), 0x10) 13:42:30 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) writev(r0, 0x0, 0x0) 13:42:30 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @remote}, 0x8, {0x2, 0x0, @multicast1}}) 13:42:30 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) writev(r0, &(0x7f0000000140), 0x0) 13:42:30 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/block/loop4', 0x0, 0x0) ioctl$IOC_PR_PREEMPT(r0, 0x401870cb, 0x0) 13:42:30 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000600)={{0x2, 0x0, @local}, {0x0, @link_local}, 0x8}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r1, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @remote}, 0x8, {0x2, 0x0, @loopback}}) ioctl$sock_inet_SIOCSARP(r0, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @remote}, 0x8, {0x2, 0x4, @multicast1}}) 13:42:30 executing program 5: set_mempolicy(0x4005, &(0x7f0000000100)=0x5, 0x81) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x60, &(0x7f0000000000)={{0x0, @dev, 0x0, 0x0, 'ovf\x00', 0x0, 0x0, 0x3}, {@multicast1}}, 0x44) 13:42:30 executing program 3: syz_io_uring_setup(0x400, &(0x7f0000000000)={0x0, 0x0, 0x200}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) 13:42:30 executing program 2: ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @remote}, 0x8, {0x2, 0x0, @multicast1}}) 13:42:30 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) writev(r0, &(0x7f0000000140), 0x0) 13:42:30 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000600)={{0x2, 0x0, @local}, {0x0, @link_local}, 0x8}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r1, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @remote}, 0x8, {0x2, 0x0, @loopback}}) ioctl$sock_inet_SIOCSARP(r0, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @remote}, 0x8, {0x2, 0x4, @multicast1}}) 13:42:30 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/block/loop4', 0x0, 0x0) ioctl$IOC_PR_PREEMPT(r0, 0x401870cb, 0x0) 13:42:30 executing program 3: syz_io_uring_setup(0x400, &(0x7f0000000000), &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) 13:42:30 executing program 0: syz_clone3(&(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000ac0)=""/125, 0x7d, 0x0, 0x0}, 0x58) 13:42:30 executing program 2: ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @remote}, 0x8, {0x2, 0x0, @multicast1}}) 13:42:30 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) writev(r0, &(0x7f0000000140), 0x0) 13:42:30 executing program 4: recvfrom$l2tp(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 13:42:30 executing program 4: io_uring_setup(0x0, &(0x7f0000000780)) 13:42:30 executing program 5: set_mempolicy(0x4005, &(0x7f0000000100)=0x5, 0x81) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x60, &(0x7f0000000000)={{0x0, @dev, 0x0, 0x0, 'ovf\x00', 0x0, 0x0, 0x3}, {@multicast1}}, 0x44) 13:42:30 executing program 3: setsockopt$pppl2tp_PPPOL2TP_SO_SENDSEQ(0xffffffffffffffff, 0x111, 0x3, 0x0, 0x4) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f0000000040)="95141c1a771c6a22eec38ab180fea6d3a2f1cd1189a40044bf5de271c51003") setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(0xffffffffffffffff, 0x111, 0x5, 0x0, 0x4) utimensat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_GET_LIMITS(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x801}, 0x44) r0 = openat$incfs(0xffffffffffffffff, &(0x7f0000000340)='.log\x00', 0x20042, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_SENDSEQ(r0, 0x111, 0x3, 0x0, 0x4) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0xac, 0x0, 0x20, 0x0, 0x25dfdbfd, {}, [@TIPC_NLA_SOCK={0x44, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8}]}, @TIPC_NLA_SOCK_CON={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0xfffffffa}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x8}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_SOCK_ADDR={0x8}]}, @TIPC_NLA_BEARER={0xc, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x9}]}, @TIPC_NLA_SOCK={0x4}, @TIPC_NLA_NET={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xa82}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3}, @TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x5}, @TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_NODEID={0xc}]}]}, 0xac}, 0x1, 0x0, 0x0, 0x801}, 0x5) setsockopt$pppl2tp_PPPOL2TP_SO_RECVSEQ(0xffffffffffffffff, 0x111, 0x2, 0x1, 0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'syzkaller0\x00'}) sendmsg$MPTCP_PM_CMD_GET_LIMITS(0xffffffffffffffff, 0x0, 0x40) getsockname$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000780)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000700), 0xc, &(0x7f0000000800)={&(0x7f00000007c0)=@newchain={0x2c, 0x64, 0x8, 0x70bd27, 0x25dfdbfe, {0x0, 0x0, 0x0, r1, {0xffe8, 0x6}, {0xfff2}, {0xa, 0xe}}, [@TCA_CHAIN={0x8, 0xb, 0x7}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20004800}, 0x20048040) r2 = accept4$inet(0xffffffffffffffff, &(0x7f0000000880)={0x2, 0x0, @remote}, &(0x7f00000008c0)=0x10, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000009c0)={'gretap0\x00', &(0x7f0000000900)={'gretap0\x00', 0x0, 0x7, 0x10, 0xfffffffb, 0x5, {{0x17, 0x4, 0x1, 0x8, 0x5c, 0x64, 0x0, 0x0, 0x4, 0x0, @multicast2, @private, {[@lsrr={0x83, 0xf, 0xa4, [@loopback, @loopback, @multicast2]}, @cipso={0x86, 0x36, 0x0, [{0x7, 0x2}, {0x6, 0x3, '}'}, {0x0, 0x2}, {0x1, 0x10, "03a574912aecf36116a0b2920d18"}, {0x0, 0xf, "f76210ba98f875f501dd131810"}, {0x0, 0xa, "b7e7aa818e3c6951"}]}]}}}}}) syz_clone3(&(0x7f0000000c80)={0x40000, &(0x7f0000000a00), &(0x7f0000000a40), &(0x7f0000000a80), {0x10}, &(0x7f0000000ac0)=""/125, 0x7d, &(0x7f0000000b40)=""/206, &(0x7f0000000c40)=[0xffffffffffffffff], 0x1, {r0}}, 0x58) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000e00), &(0x7f0000000e40)=0x4) 13:42:30 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) writev(r0, &(0x7f0000000140)=[{0x0}], 0x1) 13:42:30 executing program 2: ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @remote}, 0x8, {0x2, 0x0, @multicast1}}) 13:42:30 executing program 0: socketpair(0x21, 0x0, 0x5, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) syz_genetlink_get_family_id$mptcp(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_ACCEPT={0xd, 0x0, 0x0, r1, 0x0}, 0x7ff) clock_gettime(0x0, &(0x7f0000000580)={0x0, 0x0}) utimensat(0xffffffffffffffff, &(0x7f0000000540)='./file0/../file0\x00', &(0x7f00000005c0)={{0x77359400}, {r2, r3/1000+10000}}, 0x100) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000740)="00a69c4d1ba54ff83a127fbfad9967c6218f7cd821ace1d89453772e9f07", 0x1e) sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, &(0x7f00000009c0)='./file0\x00', 0x10b) syz_genetlink_get_family_id$mptcp(&(0x7f0000000b00), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, &(0x7f0000000fc0)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000f80)={0x0}}, 0x80) syz_io_uring_setup(0x67e1, &(0x7f0000001000)={0x0, 0xdb21, 0x1, 0x1, 0x3e1}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000001080), &(0x7f00000010c0)) openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0xa0) syz_genetlink_get_family_id$tipc2(&(0x7f0000001180), r0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 13:42:30 executing program 4: setsockopt$pppl2tp_PPPOL2TP_SO_SENDSEQ(0xffffffffffffffff, 0x111, 0x3, 0x0, 0x4) syz_genetlink_get_family_id$mptcp(0x0, 0xffffffffffffffff) syz_clone3(&(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 13:42:30 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @remote}, 0x8, {0x2, 0x0, @multicast1}}) 13:42:30 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) writev(r0, &(0x7f0000000140)=[{0x0}], 0x1) 13:42:31 executing program 3: openat$incfs(0xffffffffffffffff, &(0x7f00000011c0)='.log\x00', 0xafc3, 0x0) 13:42:31 executing program 4: syz_clone3(&(0x7f0000000c80)={0x40000, 0x0, &(0x7f0000000a40), 0x0, {}, &(0x7f0000000ac0)=""/125, 0x7d, 0x0, &(0x7f0000000c40)=[0xffffffffffffffff], 0x1}, 0x58) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) 13:42:31 executing program 0: syz_clone3(&(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 13:42:31 executing program 5: set_mempolicy(0x4005, &(0x7f0000000100)=0x5, 0x81) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x60, &(0x7f0000000000)={{0x0, @dev, 0x0, 0x0, 'ovf\x00', 0x0, 0x0, 0x3}, {@multicast1}}, 0x44) 13:42:31 executing program 3: mkdir(0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e0c0000fffff0000e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 13:42:31 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @remote}, 0x8, {0x2, 0x0, @multicast1}}) 13:42:31 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) writev(r0, &(0x7f0000000140)=[{0x0}], 0x1) 13:42:31 executing program 0: openat$incfs(0xffffffffffffff9c, &(0x7f0000000480)='.log\x00', 0x301000, 0x0) 13:42:31 executing program 5: set_mempolicy(0x4005, &(0x7f0000000100)=0x5, 0x81) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x60, &(0x7f0000000000)={{0x0, @dev, 0x0, 0x0, 'ovf\x00', 0x0, 0x0, 0x3}, {@multicast1}}, 0x44) 13:42:31 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @remote}, 0x8, {0x2, 0x0, @loopback}}) 13:42:31 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000100)}], 0x1) 13:42:31 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @remote}, 0x8, {0x2, 0x0, @multicast1}}) 13:42:31 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000001d00)=@mangle={'mangle\x00', 0x1f, 0x6, 0x410, 0x268, 0xa0, 0xa0, 0x268, 0x180, 0x3f0, 0x3f0, 0x3f0, 0x3f0, 0x3f0, 0x6, 0x0, {[{{@ip={@empty, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'pimreg0\x00', 'ip6erspan0\x00'}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @private}}}, {{@ip={@rand_addr, @private, 0x0, 0x0, 'tunl0\x00', 'erspan0\x00'}, 0x0, 0xb8, 0xe0, 0x0, {}, [@common=@socket0={{0x20}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0x98, 0xc0, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @TTL={0x28}}, {{@ip={@multicast1, @loopback, 0x0, 0x0, 'pim6reg0\x00', 'pim6reg0\x00'}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @dev}}}, {{@uncond, 0x0, 0x70, 0x98}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x470) 13:42:31 executing program 5: set_mempolicy(0x4005, &(0x7f0000000100)=0x5, 0x81) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x60, &(0x7f0000000000)={{0x0, @dev, 0x0, 0x0, 'ovf\x00', 0x0, 0x0, 0x3}, {@multicast1}}, 0x44) [ 99.028653][ T4985] netlink: 'syz-executor.3': attribute type 10 has an invalid length. 13:42:31 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000100)}], 0x1) 13:42:31 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000600)={{0x2, 0x0, @local}, {0x0, @link_local}, 0x8}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r1, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @remote}, 0x8, {0x2, 0x0, @loopback}}) ioctl$sock_inet_SIOCSARP(r0, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @remote}, 0x8, {0x2, 0x0, @multicast1}}) [ 99.075972][ T4985] batman_adv: batadv0: Adding interface: team0 [ 99.082173][ T4985] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 99.113477][ T4985] batman_adv: batadv0: Interface activated: team0 [ 99.124095][ T4985] batman_adv: batadv0: Interface deactivated: team0 13:42:31 executing program 3: mkdir(0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e0c0000fffff0000e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 13:42:31 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000100)}], 0x1) 13:42:31 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8953, 0x0) 13:42:31 executing program 5: set_mempolicy(0x4005, &(0x7f0000000100)=0x5, 0x81) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x60, &(0x7f0000000000)={{0x0, @dev, 0x0, 0x0, 'ovf\x00', 0x0, 0x0, 0x3}, {@multicast1}}, 0x44) 13:42:31 executing program 4: syz_io_uring_setup(0x0, &(0x7f0000000880), &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000000900), &(0x7f0000000940)) 13:42:31 executing program 0: openat$uhid(0xffffffffffffff9c, &(0x7f0000000440), 0x802, 0x0) 13:42:31 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8953, 0x0) 13:42:31 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000100)="8e0e9b50081b", 0x6}], 0x1) 13:42:31 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="240000000408030000000000000000000a0000070600024088fb0000050003"], 0x24}}, 0x0) 13:42:31 executing program 5: set_mempolicy(0x4005, &(0x7f0000000100)=0x5, 0x81) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x60, &(0x7f0000000000)={{0x0, @dev, 0x0, 0x0, 'ovf\x00', 0x0, 0x0, 0x3}, {@multicast1}}, 0x44) 13:42:31 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x801c581f, 0x0) 13:42:31 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8953, 0x0) 13:42:31 executing program 3: socketpair(0x21, 0x0, 0x5, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, 0x0, 0x8000) r2 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000200), r1) sendmsg$MPTCP_PM_CMD_GET_LIMITS(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x0, 0x200, 0x70bd28, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_ADDR={0x14, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @broadcast}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}]}]}, 0x28}}, 0x0) sendmsg$TIPC_NL_MON_SET(r1, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x28008014}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000001, 0x10010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, 0x0, &(0x7f0000000440)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r1, &(0x7f0000000400), 0x0, 0x0, 0x0, 0x1}, 0x7ff) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000480)={{0x1, 0x1, 0x18, r1, {0xffffffffffffffff, 0xee00}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, r5}}, './file0\x00'}) ioctl$IOC_PR_RELEASE(r6, 0x401070ca, &(0x7f0000000500)={0xfffffffffffeffff, 0x40}) utimensat(r4, &(0x7f0000000540)='./file0/../file0\x00', &(0x7f00000005c0)={{0x77359400}}, 0x0) ioctl$BLKSECDISCARD(r4, 0x127d, &(0x7f0000000600)) sendmsg$L2TP_CMD_TUNNEL_DELETE(r1, 0x0, 0x20008000) ioctl$BLKPG(r6, 0x1269, 0x0) sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, &(0x7f0000000980)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000940)={&(0x7f00000008c0)={0x6c, r2, 0x400, 0x70bd2d, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x1}, @MPTCP_PM_ATTR_ADDR={0xc, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x5}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}, @MPTCP_PM_ATTR_ADDR={0x34, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x11}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x3f}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x1}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x3}]}]}, 0x6c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) fchmodat(r6, &(0x7f00000009c0)='./file0\x00', 0x10b) getresuid(&(0x7f0000000a00), &(0x7f0000000a40), &(0x7f0000000a80)) syz_genetlink_get_family_id$mptcp(&(0x7f0000000b00), r1) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000b40)={'veth0_to_bridge\x00'}) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) syz_io_uring_setup(0x0, &(0x7f0000001000)={0x0, 0x0, 0x1}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, 0x0, &(0x7f00000010c0)) openat$sysfs(0xffffffffffffff9c, &(0x7f0000001100)='/sys/block/loop0', 0x0, 0xa0) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000001680)={&(0x7f00000011c0)={0x120, 0x0, 0x0, 0x0, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0x48, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x4}]}, @TIPC_NLA_MON={0x4}, @TIPC_NLA_LINK={0x48, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8}]}]}, @TIPC_NLA_NODE={0x8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ID={0x4}]}, @TIPC_NLA_NODE={0xc, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8}]}, @TIPC_NLA_LINK={0x1c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}, @TIPC_NLA_MEDIA={0x48, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xcd0}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4cda}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}]}]}, 0x120}}, 0x0) 13:42:31 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @remote}, 0x0, {0x2, 0x0, @multicast1}}) 13:42:31 executing program 5: set_mempolicy(0x4005, &(0x7f0000000100)=0x5, 0x81) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x60, &(0x7f0000000000)={{0x0, @dev, 0x0, 0x0, 'ovf\x00', 0x0, 0x0, 0x3}, {@multicast1}}, 0x44) 13:42:31 executing program 4: socketpair(0x10, 0x2, 0x2, &(0x7f00000001c0)) 13:42:31 executing program 0: bpf$MAP_CREATE(0x4, &(0x7f0000000100), 0x48) 13:42:31 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000100)="8e0e9b50081b", 0x6}], 0x1) [ 99.245092][ T5023] netlink: 'syz-executor.3': attribute type 10 has an invalid length. 13:42:31 executing program 4: bpf$MAP_CREATE(0x3, &(0x7f0000000100), 0x48) 13:42:31 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @remote}, 0x0, {0x2, 0x0, @multicast1}}) 13:42:31 executing program 5: set_mempolicy(0x4005, &(0x7f0000000100)=0x5, 0x81) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x60, &(0x7f0000000000)={{0x0, @dev, 0x0, 0x0, 'ovf\x00', 0x0, 0x0, 0x3}, {@multicast1}}, 0x44) 13:42:31 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x28, 0x2, 0x7, 0x301, 0x0, 0x0, {}, [@NFACCT_FILTER={0x14, 0x7, 0x0, 0x1, [@NFACCT_FILTER_MASK={0x8}, @NFACCT_FILTER_VALUE={0x8}]}]}, 0x28}}, 0x0) 13:42:31 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @remote}, 0x0, {0x2, 0x0, @multicast1}}) 13:42:31 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x89a1, &(0x7f00000002c0)={'wg0\x00'}) 13:42:31 executing program 5: set_mempolicy(0x4005, &(0x7f0000000100)=0x5, 0x81) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x60, &(0x7f0000000000)={{0x0, @dev, 0x0, 0x0, 'ovf\x00', 0x0, 0x0, 0x3}, {@multicast1}}, 0x44) 13:42:31 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip_vti0\x00', &(0x7f0000000000)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x6, 0x4, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, 0x4, 0x0, @local, @dev, {[@ssrr={0x89, 0x3}]}}}}}) 13:42:31 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000001c0)={0x2c, 0x2, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_LABELS_MASK={0x18, 0x17, [0x0, 0x0, 0x0, 0x0, 0x0]}]}, 0x2c}}, 0x0) 13:42:31 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000100)="8e0e9b50081b", 0x6}], 0x1) 13:42:31 executing program 2: socketpair(0x15, 0x0, 0x0, &(0x7f0000000180)) 13:42:31 executing program 3: bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500), 0x10) 13:42:31 executing program 5: set_mempolicy(0x4005, &(0x7f0000000100)=0x5, 0x81) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000000)={{0x0, @dev, 0x0, 0x0, 'ovf\x00', 0x0, 0x0, 0x3}, {@multicast1}}, 0x44) 13:42:31 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000001c0)={0x1c, 0x2, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_MARK={0x8}]}, 0x1c}}, 0x0) 13:42:31 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x7}}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0x97, &(0x7f0000000180)=""/151, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:42:31 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000100)="8e0e9b50081b28559b", 0x9}], 0x1) 13:42:31 executing program 2: bpf$PROG_LOAD(0x2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x91) 13:42:31 executing program 5: set_mempolicy(0x4005, &(0x7f0000000100)=0x5, 0x81) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000000)={{0x0, @dev, 0x0, 0x0, 'ovf\x00', 0x0, 0x0, 0x3}, {@multicast1}}, 0x44) 13:42:31 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x3, &(0x7f0000000000)=@framed={{0x18, 0xe}}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0x97, &(0x7f0000000180)=""/151, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:42:31 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8970, &(0x7f00000002c0)={'wg0\x00'}) 13:42:31 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) connect$can_j1939(r0, 0x0, 0x0) 13:42:31 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x9) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a40)=@nat={'nat\x00', 0x1b, 0x5, 0x490, 0xf0, 0x238, 0xffffffff, 0x0, 0x358, 0x470, 0x470, 0xffffffff, 0x470, 0x470, 0x5, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@remote, @ipv6=@loopback}}}, {{@ipv6={@remote, @mcast1, [], [], 'bridge_slave_0\x00', 'bridge_slave_0\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x0, @ipv4=@remote, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @gre_key, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x0, @ipv6=@dev, @ipv4=@local, @icmp_id, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@loopback, @ipv4=@broadcast, @icmp_id, @icmp_id}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffd}}}}, 0x4f0) 13:42:31 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000100)="8e0e9b50081b28559b", 0x9}], 0x1) 13:42:31 executing program 5: set_mempolicy(0x4005, &(0x7f0000000100)=0x5, 0x81) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000000)={{0x0, @dev, 0x0, 0x0, 'ovf\x00', 0x0, 0x0, 0x3}, {@multicast1}}, 0x44) 13:42:31 executing program 0: bpf$MAP_CREATE(0x11, &(0x7f0000000100), 0x48) 13:42:31 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0xf4240, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x97, &(0x7f0000000180)=""/151, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:42:31 executing program 2: socketpair(0x15, 0x805, 0x0, &(0x7f0000000180)) 13:42:31 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000007c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000002300)={0x20, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_WOL_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x20}}, 0x0) 13:42:31 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000100)="8e0e9b50081b28559b", 0x9}], 0x1) 13:42:31 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x60, &(0x7f0000000000)={{0x0, @dev, 0x0, 0x0, 'ovf\x00', 0x0, 0x0, 0x3}, {@multicast1}}, 0x44) 13:42:31 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) pselect6(0x40, &(0x7f0000000380)={0x3}, &(0x7f00000003c0)={0x8}, 0x0, 0x0, 0x0) 13:42:31 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8946, &(0x7f00000002c0)={'wg0\x00'}) 13:42:31 executing program 4: bpf$PROG_LOAD(0x22, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:42:31 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000100)="8e0e9b50081b28559b33", 0xa}], 0x1) 13:42:31 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x890c, 0x0) 13:42:31 executing program 2: unshare(0x6c060000) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000180)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @empty}, {0x2, 0x0, @empty=0xfe000000}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)='gre0\x00', 0x0, 0x0, 0xb77}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r2, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) r3 = socket(0x2, 0x80805, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000480)={0x0, 0x4, 0x6, [0x200, 0x1f, 0x6, 0x9, 0x862, 0x1000]}, &(0x7f00000004c0)=0x14) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r4, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) r5 = socket(0x2, 0x80805, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x10, &(0x7f0000000080)=[@in={0x2, 0x0, @private=0xa010101}]}, &(0x7f0000000100)=0x10) r6 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r5, 0x84, 0x82, &(0x7f0000000300)={r7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {r7, @in6={{0xa, 0x0, 0x0, @loopback}}}}, &(0x7f0000000140)=0xb0) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r4, 0x84, 0x17, &(0x7f0000000300)=ANY=[@ANYRES32=r7, @ANYBLOB="0900ee008375c96cc2fc0cfb193281e26a9f572bd794f5543eb880dff10255c19e45a3e7ae84f882bf4491b1f064162edeb33e3454210100008000000000e882dde1924f45201903c09fe5e1e0d45f83378669520c2ddf379333bbdec6252f79069b1bace1c4bb8fda1a9e73736f210027c30c01b0cd5eba54c2441cb56056e592a607b44aa841747827b345a41d8184dd379b93fdbd2f0285abb179b2a59e6c325d9ee25dabbd402e4059c9464238dc6aa21991dfe77b68469fbf6b093ad1358a46ef3b90196f36c560551e2afea7e2fb24c9860e8c718a5676"], 0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000200)={r7, 0x4ebb7137}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000400)={r8, 0x2c, &(0x7f0000000500)=[@in={0x2, 0x4e23, @empty}, @in6={0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, '\x00', 0x16}, 0x9}]}, &(0x7f0000000100)=0x10) r9 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r9, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r3, 0x84, 0x82, &(0x7f0000000300)={r10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, &(0x7f0000000140)=0xb0) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r2, 0x84, 0x17, &(0x7f0000000300)=ANY=[@ANYRES32=r10, @ANYBLOB="0900ee008375c96cc2fc0cfb193281e26a9f572bd794f5543eb880dff10255c19e45a3e7ae84f882bf4491b1f064162edeb33e3454210100008000000000e882dde1924f45201903c09fe5e1e0d45f83378669520c2ddf379333bbdec6252f79069b1bace1c4bb8fda1a9e73736f210027c30c01b0cd5eba54c2441cb56056e592a607b44aa841747827b345a41d8184dd379b93fdbd2f0285abb179b2a59e6c325d9ee25dabbd402e4059c9464238dc6aa21991dfe77b68469fbf6b093ad1358a46ef3b90196f36c560551e2afea7e2fb24c9860e8c718a5676e34f6c"], 0xf6) ioctl$F2FS_IOC_MOVE_RANGE(r5, 0xc020f509, &(0x7f0000000440)={r1, 0x100, 0x7c, 0x80}) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r11, 0x84, 0x9, &(0x7f0000000000)={r10, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x31}}}, 0x20, 0x1000, 0x42, 0x7, 0x3c, 0x0, 0x6}, 0x9c) setsockopt$inet6_int(r0, 0x29, 0x43, &(0x7f00000000c0)=0x1, 0x4) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1, 0x114, &(0x7f000005ffe4)={0xa, 0x4e23, 0x3f, @dev={0xfe, 0x80, '\x00', 0x1c}, 0x3}, 0x1c) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) 13:42:31 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000100)="8e0e9b50081b28559b33", 0xa}], 0x1) 13:42:31 executing program 3: bpf$MAP_CREATE(0x16, &(0x7f0000000100), 0x48) 13:42:31 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r0, &(0x7f0000000400)={0xfffffffffffffffd, 0x0, &(0x7f00000003c0)={&(0x7f0000000300)={0x14, 0x2, 0x1, 0x801}, 0x14}}, 0x0) 13:42:31 executing program 0: bpf$MAP_CREATE(0xa, &(0x7f0000000100), 0x48) 13:42:31 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000100)="8e0e9b50081b28559b33", 0xa}], 0x1) 13:42:31 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x60, &(0x7f0000000000)={{0x0, @dev, 0x0, 0x0, 'ovf\x00', 0x0, 0x0, 0x3}, {@multicast1}}, 0x44) 13:42:31 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_INTERFACE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r1, 0x5, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}]}, 0x1c}}, 0x0) 13:42:31 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0x97, &(0x7f0000000180)=""/151, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:42:31 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x3, &(0x7f0000000000)=@framed={{}, [], {0x95, 0x0, 0x0, 0x2}}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0x97, &(0x7f0000000180)=""/151, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:42:31 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x19, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 13:42:31 executing program 0: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_DEL_VIF(r0, 0x0, 0xcb, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, @vifc_lcl_ifindex, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) 13:42:32 executing program 2: unshare(0x6c060000) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000180)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @empty}, {0x2, 0x0, @empty=0xfe000000}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)='gre0\x00', 0x0, 0x0, 0xb77}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r2, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) r3 = socket(0x2, 0x80805, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000480)={0x0, 0x4, 0x6, [0x200, 0x1f, 0x6, 0x9, 0x862, 0x1000]}, &(0x7f00000004c0)=0x14) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r4, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) r5 = socket(0x2, 0x80805, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x10, &(0x7f0000000080)=[@in={0x2, 0x0, @private=0xa010101}]}, &(0x7f0000000100)=0x10) r6 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r5, 0x84, 0x82, &(0x7f0000000300)={r7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {r7, @in6={{0xa, 0x0, 0x0, @loopback}}}}, &(0x7f0000000140)=0xb0) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r4, 0x84, 0x17, &(0x7f0000000300)=ANY=[@ANYRES32=r7, @ANYBLOB="0900ee008375c96cc2fc0cfb193281e26a9f572bd794f5543eb880dff10255c19e45a3e7ae84f882bf4491b1f064162edeb33e3454210100008000000000e882dde1924f45201903c09fe5e1e0d45f83378669520c2ddf379333bbdec6252f79069b1bace1c4bb8fda1a9e73736f210027c30c01b0cd5eba54c2441cb56056e592a607b44aa841747827b345a41d8184dd379b93fdbd2f0285abb179b2a59e6c325d9ee25dabbd402e4059c9464238dc6aa21991dfe77b68469fbf6b093ad1358a46ef3b90196f36c560551e2afea7e2fb24c9860e8c718a5676"], 0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000200)={r7, 0x4ebb7137}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000400)={r8, 0x2c, &(0x7f0000000500)=[@in={0x2, 0x4e23, @empty}, @in6={0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, '\x00', 0x16}, 0x9}]}, &(0x7f0000000100)=0x10) r9 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r9, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r3, 0x84, 0x82, &(0x7f0000000300)={r10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, &(0x7f0000000140)=0xb0) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r2, 0x84, 0x17, &(0x7f0000000300)=ANY=[@ANYRES32=r10, @ANYBLOB="0900ee008375c96cc2fc0cfb193281e26a9f572bd794f5543eb880dff10255c19e45a3e7ae84f882bf4491b1f064162edeb33e3454210100008000000000e882dde1924f45201903c09fe5e1e0d45f83378669520c2ddf379333bbdec6252f79069b1bace1c4bb8fda1a9e73736f210027c30c01b0cd5eba54c2441cb56056e592a607b44aa841747827b345a41d8184dd379b93fdbd2f0285abb179b2a59e6c325d9ee25dabbd402e4059c9464238dc6aa21991dfe77b68469fbf6b093ad1358a46ef3b90196f36c560551e2afea7e2fb24c9860e8c718a5676e34f6c"], 0xf6) ioctl$F2FS_IOC_MOVE_RANGE(r5, 0xc020f509, &(0x7f0000000440)={r1, 0x100, 0x7c, 0x80}) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r11, 0x84, 0x9, &(0x7f0000000000)={r10, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x31}}}, 0x20, 0x1000, 0x42, 0x7, 0x3c, 0x0, 0x6}, 0x9c) setsockopt$inet6_int(r0, 0x29, 0x43, &(0x7f00000000c0)=0x1, 0x4) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1, 0x114, &(0x7f000005ffe4)={0xa, 0x4e23, 0x3f, @dev={0xfe, 0x80, '\x00', 0x1c}, 0x3}, 0x1c) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) 13:42:32 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x1fe, &(0x7f0000000180)={&(0x7f0000000380)={0x40, 0x37, 0x9, 0x0, 0x0, {0x1}, [@typed={0x4}, @nested={0xc, 0x1, 0x0, 0x1, [@typed={0x6, 0x0, 0x0, 0x0, @str='\b\x00'}]}, @typed={0x8, 0x2, 0x0, 0x0, @pid=0xffffffffffffffff}, @typed={0x8, 0x5, 0x0, 0x0, @u32=0x8}, @nested={0xc, 0x8, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @uid}]}]}, 0x40}}, 0x0) 13:42:32 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8904, &(0x7f00000002c0)={'wg0\x00'}) 13:42:32 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x9) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000040)={'syztnl0\x00', 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, @mcast2, @remote}}) 13:42:32 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000380)={0x34, 0x37, 0x9, 0x0, 0x0, {0x1}, [@typed={0x4}, @nested={0xc, 0x1, 0x0, 0x1, [@typed={0x6, 0x0, 0x0, 0x0, @str='\b\x00'}]}, @typed={0x8, 0x2, 0x0, 0x0, @pid=0xffffffffffffffff}, @typed={0x8, 0x5, 0x0, 0x0, @u32=0x10}]}, 0x34}}, 0x0) 13:42:32 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x60, &(0x7f0000000000)={{0x0, @dev, 0x0, 0x0, 'ovf\x00', 0x0, 0x0, 0x3}, {@multicast1}}, 0x44) 13:42:32 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x2, &(0x7f00000002c0)={'wg0\x00'}) 13:42:32 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8901, &(0x7f00000002c0)={'wg0\x00'}) 13:42:32 executing program 0: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r1, &(0x7f00000003c0)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x2, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x32) 13:42:32 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000240)={&(0x7f0000000080), 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)={0x18, r1, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x4}]}, 0x18}}, 0x0) [ 100.546305][ T5146] netlink: set zone limit has 8 unknown bytes [ 100.561369][ T5148] netlink: set zone limit has 8 unknown bytes 13:42:32 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x17, 0x0, 0xfffffffb, 0x1, 0x1090}, 0x48) 13:42:32 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000380)={0x30, 0x37, 0x9, 0x0, 0x0, {0x1}, [@typed={0x4}, @nested={0xc, 0x1, 0x0, 0x1, [@typed={0x6, 0x0, 0x0, 0x0, @str='\b\x00'}]}, @typed={0x8, 0x2, 0x0, 0x0, @pid=0xffffffffffffffff}, @nested={0x4}]}, 0x30}}, 0x0) [ 100.647302][ T5163] netlink: set zone limit has 8 unknown bytes 13:42:32 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x5411, &(0x7f00000002c0)={'wg0\x00'}) 13:42:32 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan1\x00', 0x0}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000f40), 0xffffffffffffffff) sendmsg$NL80211_CMD_NEW_KEY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x2c, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r1}, @void}}, [@NL80211_ATTR_KEY={0x10, 0x50, 0x0, 0x1, [@NL80211_KEY_IDX={0x5}, @NL80211_KEY_DEFAULT_MGMT={0x4}]}]}, 0x2c}}, 0x0) 13:42:32 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_NEW(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x14, 0x0, 0x7, 0x401}, 0x14}}, 0x0) 13:42:32 executing program 3: socketpair(0x18, 0x0, 0x3, &(0x7f0000000240)) 13:42:32 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x14, 0x3, 0x2, 0x101}, 0x14}}, 0x0) 13:42:32 executing program 5: set_mempolicy(0x0, &(0x7f0000000100)=0x5, 0x81) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x60, &(0x7f0000000000)={{0x0, @dev, 0x0, 0x0, 'ovf\x00', 0x0, 0x0, 0x3}, {@multicast1}}, 0x44) 13:42:32 executing program 3: socketpair(0x18, 0x0, 0x3, &(0x7f0000000240)) 13:42:32 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000180)={&(0x7f0000000000), 0x9c, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}}, 0x0) 13:42:32 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, 0x2, 0x3, 0x5, 0x0, 0x0, {}, [@NFQA_CFG_CMD={0x8}]}, 0x1c}}, 0x0) 13:42:32 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_GET_BYNAME(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)={0x28, 0xe, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) 13:42:32 executing program 4: pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_devices(r0, 0x0, 0x0) 13:42:32 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_MAKE_EQUIV(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB='('], 0x28}}, 0x0) 13:42:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0xc0189436, &(0x7f0000000240)={'ip_vti0\x00', &(0x7f0000000180)={'gretap0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @remote}}}}) 13:42:32 executing program 3: socketpair(0x18, 0x0, 0x3, &(0x7f0000000240)) 13:42:32 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x401c5820, 0x0) 13:42:32 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@ipv4_getrule={0x1c, 0x22, 0x1}, 0x1c}}, 0x0) 13:42:32 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000180), r0) sendmsg$NLBL_UNLABEL_C_LIST(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, r2, 0x1, 0x0, 0x0, {0x7}}, 0x14}}, 0x0) [ 100.868164][ T5197] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5197 comm=syz-executor.1 13:42:33 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000a80), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0xf}]}, 0x1c}}, 0x0) 13:42:33 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000180), r0) sendmsg$NLBL_UNLABEL_C_LIST(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, r2, 0x1, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) 13:42:33 executing program 5: set_mempolicy(0x0, &(0x7f0000000100)=0x5, 0x81) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x60, &(0x7f0000000000)={{0x0, @dev, 0x0, 0x0, 'ovf\x00', 0x0, 0x0, 0x3}, {@multicast1}}, 0x44) 13:42:33 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x9) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a40)=@nat={'nat\x00', 0x1b, 0x5, 0x490, 0xf0, 0x238, 0xffffffff, 0x0, 0x358, 0x470, 0x470, 0xffffffff, 0x470, 0x470, 0x5, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@remote, @ipv6=@loopback}}}, {{@ipv6={@remote, @mcast1, [], [], 'bridge_slave_0\x00', 'bridge_slave_0\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x0, @ipv4=@remote, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @gre_key, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x0, @ipv6=@dev, @ipv4=@local, @icmp_id, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@loopback, @ipv4=@broadcast, @icmp_id, @icmp_id}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffb}}}}, 0x4f0) 13:42:33 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x8, 0x0, 0x4}, 0x48) 13:42:33 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x8, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:42:33 executing program 2: r0 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r0, &(0x7f0000001800)={0x0, 0x0, 0x0}, 0x2000) 13:42:33 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x20, 0x1, 0x8, 0x801, 0x0, 0x0, {}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x20}}, 0x0) 13:42:33 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x3994, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x1, 0x97, &(0x7f0000000180)=""/151, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:42:33 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x11}, 0x48) [ 100.962866][ T5208] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 13:42:33 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:42:33 executing program 2: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/time\x00') ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, 0x0) 13:42:33 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000180), r0) sendmsg$NLBL_UNLABEL_C_LIST(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, r2, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) 13:42:33 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x4}]}]}}, &(0x7f00000001c0)=""/131, 0x36, 0x83, 0x1}, 0x20) [ 101.012568][ T23] kauditd_printk_skb: 9 callbacks suppressed [ 101.012585][ T23] audit: type=1400 audit(1675777353.064:202): avc: denied { read } for pid=5213 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 101.109498][ T23] audit: type=1400 audit(1675777353.104:203): avc: denied { ioctl } for pid=5223 comm="syz-executor.2" path="time:[4026531834]" dev="nsfs" ino=4026531834 ioctlcmd=0x7202 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 13:42:33 executing program 5: set_mempolicy(0x0, &(0x7f0000000100)=0x5, 0x81) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x60, &(0x7f0000000000)={{0x0, @dev, 0x0, 0x0, 'ovf\x00', 0x0, 0x0, 0x3}, {@multicast1}}, 0x44) 13:42:33 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x3, &(0x7f0000000000)=@framed={{}, [], {0x95, 0x61}}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0x97, &(0x7f0000000180)=""/151, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:42:33 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x9) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f0000000040)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast2, 0x6a437a21dfde1a56, 0x7800}}) 13:42:33 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0xc020660b, 0x0) 13:42:33 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$OSF_MSG_REMOVE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000ac0)={0x268, 0x1, 0x5, 0x5, 0x0, 0x0, {}, [{{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', "10a99e56a1555a4202212caa5fe3444c4fe9c62d7f73f9c871f4fcb5aacd95e5", "9a2b31ec187c25e243b319341bd95c4242da3dec30583614f2a158844beb8e8b"}}}]}, 0x268}}, 0x0) 13:42:33 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x3, &(0x7f0000000000)=@framed={{}, [], {0x95, 0x71}}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0x97, &(0x7f0000000180)=""/151, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:42:33 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x4020940d, 0x0) 13:42:33 executing program 2: pselect6(0xfefdffff, 0x0, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000180)={&(0x7f0000000140), 0x8}) 13:42:33 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x891e, &(0x7f00000002c0)={'wg0\x00'}) 13:42:33 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000007c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000002300)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_WOL_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}]}]}, 0x2c}}, 0x0) 13:42:33 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x1d, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x1, 0x97, &(0x7f0000000180)=""/151, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:42:33 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x18, 0x2, 0x7, 0x201, 0x0, 0x0, {}, [@NFACCT_FILTER={0x4}]}, 0x18}}, 0x0) 13:42:33 executing program 5: set_mempolicy(0x4005, 0x0, 0x81) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x60, &(0x7f0000000000)={{0x0, @dev, 0x0, 0x0, 'ovf\x00', 0x0, 0x0, 0x3}, {@multicast1}}, 0x44) 13:42:33 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x89a1, 0x0) 13:42:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000000c0)={'ip_vti0\x00', &(0x7f0000000280)={'ip_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @private, @multicast1}}}}) 13:42:33 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x89b0, &(0x7f00000002c0)={'wg0\x00'}) 13:42:33 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8914, &(0x7f00000002c0)={'wg0\x00'}) 13:42:33 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x1, 0x97, &(0x7f0000000180)=""/151, 0x0, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:42:33 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r1) sendmsg$NLBL_UNLABEL_C_STATICADD(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x4c, r2, 0x1, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'geneve1\x00'}, @NLBL_UNLABEL_A_SECCTX={0x24, 0x7, 'system_u:object_r:cron_log_t:s0\x00'}]}, 0x4c}}, 0x0) 13:42:33 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x19, 0x0, 0x0, 0x5, 0x0, 0x1}, 0x48) 13:42:33 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) recvmmsg$unix(r0, &(0x7f0000001b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x3, 0x0) 13:42:33 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000000c0)=@framed={{}, [@func]}, &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000340)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:42:33 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9e020000}}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0x97, &(0x7f0000000180)=""/151, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:42:33 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$PNPIPE_ENCAP(r0, 0x113, 0x1, 0x0, 0x0) 13:42:33 executing program 5: set_mempolicy(0x4005, 0x0, 0x81) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x60, &(0x7f0000000000)={{0x0, @dev, 0x0, 0x0, 'ovf\x00', 0x0, 0x0, 0x3}, {@multicast1}}, 0x44) 13:42:33 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan1\x00', 0x0}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000f40), 0xffffffffffffffff) sendmsg$NL80211_CMD_NEW_KEY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x48, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r1}, @void}}, [@NL80211_ATTR_KEY={0x2c, 0x50, 0x0, 0x1, [@NL80211_KEY_DATA_WEP40={0x9, 0x1, "d12549281f"}, @NL80211_KEY_DEFAULT_TYPES={0x8, 0x8, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}, @NL80211_KEY_MODE={0x5}, @NL80211_KEY_IDX={0x5}, @NL80211_KEY_DEFAULT_MGMT={0x4}]}]}, 0x48}}, 0x0) 13:42:33 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, 0x2, 0x3, 0x5, 0x0, 0x0, {}, [@NFQA_CFG_CMD={0x8, 0x1, {0x4}}]}, 0x1c}}, 0x0) 13:42:33 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8943, &(0x7f00000002c0)={'wg0\x00'}) 13:42:33 executing program 4: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000180)={&(0x7f0000000140), 0x7ffffffff000}) 13:42:33 executing program 3: socketpair(0x23, 0x0, 0x2, &(0x7f0000000000)) 13:42:33 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000007c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000002300)={0x34, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}]}]}, 0x34}}, 0x0) 13:42:33 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x80086601, 0x0) 13:42:33 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x891d, &(0x7f00000002c0)={'wg0\x00'}) 13:42:33 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) connect$unix(r0, 0x0, 0x0) 13:42:33 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x1104, 0xffffffffffffffff, 0x80008}, 0x48) 13:42:33 executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) connect$can_j1939(r0, &(0x7f0000000100), 0x18) [ 101.633187][ T23] audit: type=1400 audit(1675777353.694:204): avc: denied { connect } for pid=5305 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 13:42:33 executing program 5: set_mempolicy(0x4005, 0x0, 0x81) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x60, &(0x7f0000000000)={{0x0, @dev, 0x0, 0x0, 'ovf\x00', 0x0, 0x0, 0x3}, {@multicast1}}, 0x44) 13:42:33 executing program 0: pselect6(0x2a00, 0x0, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000180)={&(0x7f0000000140), 0x8}) 13:42:33 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8942, &(0x7f00000002c0)={'wg0\x00'}) 13:42:33 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x1, 0x97, &(0x7f0000000180)=""/151, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:42:33 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x2}}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0x97, &(0x7f0000000180)=""/151, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:42:33 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_GET(r0, &(0x7f0000002380)={0x0, 0x0, &(0x7f0000002340)={&(0x7f0000002300)={0x14, 0x1, 0x8, 0x201}, 0x14}}, 0x0) 13:42:33 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8918, &(0x7f00000002c0)={'wg0\x00'}) 13:42:33 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x1e, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:42:33 executing program 0: request_key(&(0x7f0000000400)='id_resolver\x00', &(0x7f0000000440)={'syz', 0x2}, &(0x7f0000000480)='fscrypt:', 0xfffffffffffffffe) 13:42:33 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0xb, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x5}]}, &(0x7f00000000c0)='GPL\x00', 0x3, 0xc5, &(0x7f0000000100)=""/197, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:42:33 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x96, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:42:33 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000f40), 0xffffffffffffffff) sendmsg$NL80211_CMD_NEW_KEY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x1c, r1, 0x1, 0x0, 0x0, {{0x9}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) 13:42:33 executing program 5: set_mempolicy(0x4005, &(0x7f0000000100), 0x81) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x60, &(0x7f0000000000)={{0x0, @dev, 0x0, 0x0, 'ovf\x00', 0x0, 0x0, 0x3}, {@multicast1}}, 0x44) 13:42:33 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000140)={'wg2\x00', 0x0}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x2, &(0x7f0000000000)=@raw=[@map_idx], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:42:33 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0xc0189436, 0x0) 13:42:33 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1b, 0x0, 0x0, 0x5}, 0x48) 13:42:33 executing program 1: rt_sigprocmask(0x2, &(0x7f00000007c0), &(0x7f0000000800), 0x8) 13:42:33 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0), 0x101042, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000380)) ioctl$PPPIOCSACTIVE(r0, 0x40047459, &(0x7f0000000080)={0xfffffffffffffe43, 0x0}) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000100)="b2ff", 0x2}], 0x1) 13:42:33 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x24, 0x4, 0x8, 0x401, 0x0, 0x0, {}, [@CTA_TIMEOUT_L3PROTO={0x6}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x24}}, 0x0) 13:42:33 executing program 1: bpf$PROG_LOAD(0x8, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) 13:42:33 executing program 3: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f00000027c0), 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000002900)='limits\x00') 13:42:33 executing program 4: syslog(0x3, &(0x7f0000000080)=""/84, 0x54) 13:42:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000580)={'sit0\x00', &(0x7f00000004c0)={'gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x25, 0x4, 0x0, 0x0, 0x94, 0x0, 0x0, 0xff, 0x29, 0x0, @local, @rand_addr=0x64010100, {[@cipso={0x86, 0xe, 0x0, [{0x0, 0x6, "0273df87"}, {0x0, 0x2}]}, @timestamp={0x44, 0x20, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @cipso={0x86, 0x1b, 0x0, [{0x0, 0x9, "020ddf19a75e97"}, {0x0, 0xc, "5140c6fca2d0cb1d2816"}]}, @noop, @generic={0x0, 0xd, "68b4246c26355788f99c6c"}, @rr={0x7, 0x13, 0x0, [@dev, @remote, @loopback, @loopback]}, @ssrr={0x89, 0x13, 0x0, [@broadcast, @multicast2, @local, @empty]}]}}}}}) [ 101.889557][ T23] audit: type=1400 audit(1675777353.944:205): avc: denied { write } for pid=5336 comm="syz-executor.2" name="ppp" dev="devtmpfs" ino=116 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 13:42:34 executing program 1: syz_open_dev$loop(&(0x7f00000000c0), 0x0, 0x20843) 13:42:34 executing program 1: r0 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$unlink(0x9, r1, r0) 13:42:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000580)={'sit0\x00', &(0x7f00000004c0)={'gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x25, 0x4, 0x0, 0x0, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @rand_addr, {[@cipso={0x86, 0xe, 0x0, [{0x0, 0x6, "0273df87"}, {0x0, 0x2}]}, @timestamp={0x44, 0x20, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @cipso={0x86, 0x1b, 0x0, [{0x0, 0x9, "020ddf19a75e97"}, {0x0, 0xc, "5140c6fca2d0cb1d2816"}]}, @noop, @generic={0x0, 0xd, "68b4246c26355788f99c6c"}, @rr={0x7, 0x13, 0x0, [@dev, @remote, @loopback, @loopback]}, @ssrr={0x89, 0x13, 0x0, [@broadcast, @multicast2, @local, @empty]}]}}}}}) 13:42:34 executing program 5: set_mempolicy(0x4005, &(0x7f0000000100), 0x81) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x60, &(0x7f0000000000)={{0x0, @dev, 0x0, 0x0, 'ovf\x00', 0x0, 0x0, 0x3}, {@multicast1}}, 0x44) 13:42:34 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_mreqn(r0, 0x0, 0x4, 0x0, &(0x7f00000003c0)) 13:42:34 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x10, &(0x7f0000000080)={[{@test_dummy_encryption}, {@stripe={'stripe', 0x3d, 0x5}}, {@min_batch_time={'min_batch_time', 0x3d, 0x5}}, {@bh}, {@dioread_nolock}, {@nombcache}]}, 0xff, 0x23f, &(0x7f0000000540)="$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") 13:42:34 executing program 4: mkdir(&(0x7f00000020c0)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000001e40)=@v1={0x0, @aes128, 0x0, @desc1}) chdir(&(0x7f0000000000)='./file0\x00') r1 = open(&(0x7f00000004c0)='./bus\x00', 0x143042, 0x0) ftruncate(r1, 0x2008002) r2 = open(&(0x7f00000004c0)='./bus\x00', 0x143042, 0x0) ftruncate(r2, 0x2008002) 13:42:34 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r0, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000001640)={&(0x7f00000001c0)={0x18, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_WOL_SOPASS={0x4}]}, 0x18}}, 0x0) 13:42:34 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreq(r0, 0x0, 0x3, 0x0, 0x0) 13:42:34 executing program 1: shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000240)=""/251) [ 102.081541][ T5362] loop2: detected capacity change from 0 to 128 13:42:34 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS32(r0, 0x80585414, 0x0) 13:42:34 executing program 3: add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000340)='E', 0x1, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0x0, 0x0) 13:42:34 executing program 1: mount$9p_fd(0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)) syz_clone3(&(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 13:42:34 executing program 0: shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000000)=""/253) 13:42:34 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)={0x0, "00f03979de0164fa385a6eba6983a69b2169947eeb424fbf5a5734ac566bf77c375263300cc5f65a1363d0e8724070350d390c9a3483fd71e6f6b91576ca0f4c"}, 0x48, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r0, r1) [ 102.123946][ T5362] EXT4-fs: test_dummy_encryption option not supported 13:42:34 executing program 5: set_mempolicy(0x4005, &(0x7f0000000100), 0x81) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x60, &(0x7f0000000000)={{0x0, @dev, 0x0, 0x0, 'ovf\x00', 0x0, 0x0, 0x3}, {@multicast1}}, 0x44) 13:42:34 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0xc, 0x0, 0x4, 0x0, 0x908}, 0x48) 13:42:34 executing program 4: r0 = socket$igmp6(0xa, 0x3, 0x2) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000001c0)={@local}, 0x14) 13:42:34 executing program 0: ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000040)={{}, 0x4}) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x101001) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, &(0x7f0000001a80)=0x3) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000001b40)={'security\x00', 0x2, [{}, {}]}, 0x48) 13:42:34 executing program 1: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000240)='encrypted\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f00000002c0)="44b34e0c50dfd7314b6ad760cf9236355c6954451bfc43e6117430e452567d14f25f23f39cdcd33c3ed844c433a2d45cb96d143c310772ff27e72a667d2ddaf29795622586b32ebf16320b05afa2ca2462a09cb6c02fa85f28461a9fe61f481d20", 0x61, r0) 13:42:34 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_mreqn(r0, 0x0, 0x1a, 0x0, &(0x7f00000003c0)) 13:42:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000140)={'sit0\x00', &(0x7f0000000040)={'ip_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @multicast1, @private}}}}) 13:42:34 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @multicast2}, {0x2, 0x0, @broadcast}, {0x2, 0x0, @broadcast}, 0x81}) 13:42:34 executing program 3: process_madvise(0xffffffffffffffff, &(0x7f00000008c0)=[{0x0}], 0x1, 0x0, 0x0) 13:42:34 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_mreqn(r0, 0x0, 0xe, 0x0, &(0x7f00000003c0)) 13:42:34 executing program 4: sigaltstack(&(0x7f0000000380)={0x0, 0x100000003}, 0x0) 13:42:34 executing program 2: shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x1000) 13:42:34 executing program 5: set_mempolicy(0x4005, &(0x7f0000000100)=0x5, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x60, &(0x7f0000000000)={{0x0, @dev, 0x0, 0x0, 'ovf\x00', 0x0, 0x0, 0x3}, {@multicast1}}, 0x44) 13:42:34 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKIOMIN(r0, 0x1278, &(0x7f0000001c40)) 13:42:34 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_mreqn(r0, 0x0, 0x19, 0x0, &(0x7f00000003c0)) 13:42:34 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x800448d2, &(0x7f0000000040)="0004") 13:42:34 executing program 2: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) syz_clone3(&(0x7f0000000880)={0x8800200, 0x0, 0x0, 0x0, {}, 0x0, 0x0, &(0x7f00000007c0)=""/90, &(0x7f0000000840)=[0x0], 0x1}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(0xffffffffffffffff, 0x40082102, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) 13:42:34 executing program 1: add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f00000000c0)={'fscrypt:', @desc4}, &(0x7f00000001c0)={0x0, "c7fcfd16193b5a119b8fe4fcd0ad719f8eec30ec69a8ecd9c8ba792cefc6ee5ac28dcfa0ec22ca77a1de091ecbb5131231d7fc03cbb73cbeeae60599e3b6606e"}, 0x48, 0xfffffffffffffffb) 13:42:34 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz0\x00', 0x200002, 0x0) syz_clone3(&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x9b) [ 102.460355][ T23] audit: type=1400 audit(1675777354.514:206): avc: denied { create } for pid=5411 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 13:42:34 executing program 1: add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f00000000c0)={'fscrypt:', @desc4}, &(0x7f00000001c0)={0x0, "c7fcfd16193b5a119b8fe4fcd0ad719f8eec30ec69a8ecd9c8ba792cefc6ee5ac28dcfa0ec22ca77a1de091ecbb5131231d7fc03cbb73cbeeae60599e3b6606e"}, 0x48, 0xfffffffffffffffb) 13:42:34 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000000c0), 0x0, 0x0) ioctl$IOC_PR_REGISTER(r0, 0x401870c8, &(0x7f0000000000)={0x7974, 0x3, 0x1}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000001c0)={0x2, 0x0, 0x98, &(0x7f0000000100)={0x0, 0x0, 0x7}}) 13:42:34 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000800)={&(0x7f00000006c0)={0x18, 0x0, 0x2, 0x101, 0x0, 0x0, {}, [@CTA_EXPECT_TUPLE={0x4}]}, 0x18}}, 0x0) 13:42:34 executing program 0: add_key(&(0x7f0000000080)='asymmetric\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc4}, &(0x7f00000001c0)={0x0, "119d29dc22a7e2852661199beeeb6390ff8fad429a8775eab4201bb04ba26160cd68b59dfaf17459379c35bbdb6388aea79d42fe9738c90cedae21a8a918b24d"}, 0x48, r0) 13:42:34 executing program 2: r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) pidfd_send_signal(r0, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x80000000}, 0x0) [ 102.502048][ T23] audit: type=1400 audit(1675777354.544:207): avc: denied { ioctl } for pid=5411 comm="syz-executor.4" path="socket:[23411]" dev="sockfs" ino=23411 ioctlcmd=0x48d2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 102.568790][ T3816] udevd[3816]: inotify_add_watch(7, /dev/loop0p7, 10) failed: No such file or directory 13:42:34 executing program 5: set_mempolicy(0x4005, &(0x7f0000000100)=0x5, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x60, &(0x7f0000000000)={{0x0, @dev, 0x0, 0x0, 'ovf\x00', 0x0, 0x0, 0x3}, {@multicast1}}, 0x44) 13:42:34 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000100)={0x1, 0x0, 0x98, &(0x7f0000000040)={0x0, 0xffffffff7fffffff, 0x2}}) 13:42:34 executing program 1: add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f00000000c0)={'fscrypt:', @desc4}, &(0x7f00000001c0)={0x0, "c7fcfd16193b5a119b8fe4fcd0ad719f8eec30ec69a8ecd9c8ba792cefc6ee5ac28dcfa0ec22ca77a1de091ecbb5131231d7fc03cbb73cbeeae60599e3b6606e"}, 0x48, 0xfffffffffffffffb) 13:42:34 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000000c0), 0x0, 0x0) ioctl$IOC_PR_REGISTER(r0, 0x401870c8, &(0x7f0000000000)={0x7974, 0x3, 0x1}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000001c0)={0x2, 0x0, 0x98, &(0x7f0000000100)={0x0, 0x0, 0x7}}) 13:42:34 executing program 4: r0 = getpgid(0x0) process_vm_readv(r0, &(0x7f0000006cc0)=[{&(0x7f0000004b00)=""/102, 0x66}], 0x1, &(0x7f0000006f80)=[{&(0x7f0000006d40)=""/24, 0x18}], 0x1, 0x0) syz_clone3(&(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 13:42:34 executing program 0: bpf$PROG_LOAD(0x1b, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) 13:42:34 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_mreqn(r0, 0x0, 0x21, 0x0, &(0x7f00000003c0)) 13:42:34 executing program 1: add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f00000000c0)={'fscrypt:', @desc4}, &(0x7f00000001c0)={0x0, "c7fcfd16193b5a119b8fe4fcd0ad719f8eec30ec69a8ecd9c8ba792cefc6ee5ac28dcfa0ec22ca77a1de091ecbb5131231d7fc03cbb73cbeeae60599e3b6606e"}, 0x48, 0xfffffffffffffffb) 13:42:34 executing program 0: pkey_mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x2800008, 0xffffffffffffffff) 13:42:34 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000000c0), 0x0, 0x0) ioctl$IOC_PR_REGISTER(r0, 0x401870c8, &(0x7f0000000000)={0x7974, 0x3, 0x1}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000001c0)={0x2, 0x0, 0x98, &(0x7f0000000100)={0x0, 0x0, 0x7}}) 13:42:34 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) 13:42:34 executing program 1: syz_open_procfs(0x0, &(0x7f0000000d00)='net/ip6_flowlabel\x00') [ 102.724567][ T23] audit: type=1400 audit(1675777354.784:208): avc: denied { write } for pid=5454 comm="syz-executor.1" name="ip6_flowlabel" dev="proc" ino=4026533118 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 13:42:34 executing program 5: set_mempolicy(0x4005, &(0x7f0000000100)=0x5, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x60, &(0x7f0000000000)={{0x0, @dev, 0x0, 0x0, 'ovf\x00', 0x0, 0x0, 0x3}, {@multicast1}}, 0x44) 13:42:34 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000000c0), 0x0, 0x0) ioctl$IOC_PR_REGISTER(r0, 0x401870c8, &(0x7f0000000000)={0x7974, 0x3, 0x1}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000001c0)={0x2, 0x0, 0x98, &(0x7f0000000100)={0x0, 0x0, 0x7}}) 13:42:34 executing program 4: add_key$fscrypt_v1(0x0, 0x0, &(0x7f00000002c0)={0x0, "22475aed8248a5656fd26d28a7833cf155cd5c79c17f75e36a6bcfda412a2531773ec6a163c7d1f761a418237adfb6c787e7b35eaa2d8a9d5f74806f2e7b8ee7"}, 0x48, 0x0) syz_clone3(&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 13:42:34 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_mreqn(r0, 0x0, 0x18, 0x0, &(0x7f00000003c0)) 13:42:34 executing program 1: r0 = syz_open_dev$loop(&(0x7f00000000c0), 0x0, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f00000001c0)={0x1, 0x0, 0x98, &(0x7f0000000100)={0x4000, 0x0, 0x77c}}) 13:42:34 executing program 0: pkey_mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x2800008, 0xffffffffffffffff) 13:42:34 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x0) syz_clone3(&(0x7f0000001900)={0x300101000, 0x0, 0x0, &(0x7f0000000340), {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) 13:42:34 executing program 1: r0 = syz_open_dev$loop(&(0x7f00000000c0), 0x0, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f00000001c0)={0x1, 0x0, 0x98, &(0x7f0000000100)={0x4000, 0x0, 0x77c}}) 13:42:34 executing program 2: mkdir(&(0x7f00000020c0)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000001e40)=@v1={0x0, @aes128, 0x0, @desc1}) chdir(&(0x7f0000000000)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) 13:42:34 executing program 0: pkey_mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x2800008, 0xffffffffffffffff) 13:42:34 executing program 4: syz_clone3(&(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x57) 13:42:34 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_AVC(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000440)={0x10}, 0x10}}, 0x0) [ 102.910256][ T23] audit: type=1400 audit(1675777354.964:209): avc: denied { audit_write } for pid=5478 comm="syz-executor.3" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 13:42:35 executing program 5: set_mempolicy(0x4005, &(0x7f0000000100)=0x5, 0x81) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x0, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x60, &(0x7f0000000000)={{0x0, @dev, 0x0, 0x0, 'ovf\x00', 0x0, 0x0, 0x3}, {@multicast1}}, 0x44) 13:42:35 executing program 2: syslog(0x3, &(0x7f0000000000)=""/139, 0x8b) 13:42:35 executing program 1: r0 = syz_open_dev$loop(&(0x7f00000000c0), 0x0, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f00000001c0)={0x1, 0x0, 0x98, &(0x7f0000000100)={0x4000, 0x0, 0x77c}}) 13:42:35 executing program 0: pkey_mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x2800008, 0xffffffffffffffff) 13:42:35 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) 13:42:35 executing program 4: ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000001b40)={'security\x00', 0x2, [{}, {}]}, 0x48) 13:42:35 executing program 5: set_mempolicy(0x4005, &(0x7f0000000100)=0x5, 0x81) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x0, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x60, &(0x7f0000000000)={{0x0, @dev, 0x0, 0x0, 'ovf\x00', 0x0, 0x0, 0x3}, {@multicast1}}, 0x44) 13:42:35 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x200, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000080)=[0x1]) 13:42:35 executing program 1: r0 = syz_open_dev$loop(&(0x7f00000000c0), 0x0, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f00000001c0)={0x1, 0x0, 0x98, &(0x7f0000000100)={0x4000, 0x0, 0x77c}}) 13:42:35 executing program 3: add_key(&(0x7f0000000800)='user\x00', &(0x7f0000000840)={'syz', 0x0}, &(0x7f0000000880)="c6", 0x1, 0xffffffffffffffff) 13:42:35 executing program 0: r0 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc1}, &(0x7f00000002c0)={0x0, "5b3917cba4b53ab58f48708aeb6c0e9a1420fbb4318c507c22389596557104d257525b0e4184a63439997836a1401b7ba06d51e813526125a193ca9575828a22"}, 0x48, r1) keyctl$unlink(0x9, r0, r1) 13:42:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x10, &(0x7f0000000080)={[{@test_dummy_encryption}, {@stripe={'stripe', 0x3d, 0x5}}, {@min_batch_time={'min_batch_time', 0x3d, 0x5}}, {@bh}, {@dioread_nolock}, {@nombcache}]}, 0xff, 0x23f, &(0x7f0000000540)="$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") 13:42:35 executing program 3: setresuid(0xee01, 0x0, 0x0) r0 = getuid() setresuid(0x0, r0, 0x0) syslog(0x0, 0x0, 0x0) 13:42:35 executing program 2: syz_clone3(&(0x7f0000001a40)={0x20200, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 13:42:35 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f00000000c0)={'fscrypt:', @desc4}, &(0x7f00000001c0)={0x0, "c7fcfd16193b5a119b8fe4fcd0ad719f8eec30ec69a8ecd9c8ba792cefc6ee5ac28dcfa0ec22ca77a1de091ecbb5131231d7fc03cbb73cbeeae60599e3b6606e"}, 0x48, 0xfffffffffffffffb) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, r0) 13:42:35 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, &(0x7f0000000dc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000d80)={&(0x7f0000000d00)={0x14}, 0x14}}, 0x0) 13:42:35 executing program 3: shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000480)={{0x3, 0xee00, 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) 13:42:35 executing program 2: shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000140)=""/143) 13:42:35 executing program 5: set_mempolicy(0x4005, &(0x7f0000000100)=0x5, 0x81) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x0, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x60, &(0x7f0000000000)={{0x0, @dev, 0x0, 0x0, 'ovf\x00', 0x0, 0x0, 0x3}, {@multicast1}}, 0x44) 13:42:35 executing program 4: syz_clone3(&(0x7f00000005c0)={0x1d0000100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 103.105666][ T5510] loop1: detected capacity change from 0 to 128 13:42:35 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000580)={'sit0\x00', &(0x7f00000004c0)={'gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x25, 0x4, 0x0, 0x0, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @rand_addr, {[@cipso={0x86, 0xe, 0x0, [{0x0, 0x6, "0273df87"}, {0x0, 0x2}]}, @timestamp={0x44, 0x20, 0x0, 0x0, 0x0, [0x0, 0x7, 0x2, 0x0, 0x0, 0x0, 0x0]}, @cipso={0x86, 0x1b, 0x0, [{0x6, 0x9, "020ddf19a75e97"}, {0x5, 0xc, "5140c6fca2d0cb1d2816"}]}, @noop, @generic={0x0, 0xd, "68b4246c26355788f99c6c"}, @rr={0x7, 0x13, 0x0, [@dev, @remote, @loopback, @loopback]}, @ssrr={0x89, 0x13, 0x0, [@broadcast, @multicast2, @local, @empty]}]}}}}}) 13:42:35 executing program 0: syz_open_procfs(0x0, &(0x7f0000000000)='net/sctp\x00') 13:42:35 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f0000001500)) [ 103.154255][ T5510] EXT4-fs: test_dummy_encryption option not supported [ 103.181375][ T23] audit: type=1400 audit(1675777355.234:210): avc: denied { sys_admin } for pid=5522 comm="syz-executor.4" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 13:42:35 executing program 1: setreuid(0xee01, 0xee01) bpf$PROG_LOAD(0x3, 0x0, 0x4f) 13:42:35 executing program 3: mkdir(&(0x7f00000020c0)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000001e40)=@v1={0x0, @aes128, 0x0, @desc1}) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000001c0)='./bus\x00', 0x2012, 0x0) 13:42:35 executing program 2: shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000140)=""/143) 13:42:35 executing program 5: set_mempolicy(0x4005, &(0x7f0000000100)=0x5, 0x81) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x11, 0x0, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x60, &(0x7f0000000000)={{0x0, @dev, 0x0, 0x0, 'ovf\x00', 0x0, 0x0, 0x3}, {@multicast1}}, 0x44) 13:42:35 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f0000001500)) 13:42:35 executing program 5: set_mempolicy(0x4005, &(0x7f0000000100)=0x5, 0x81) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x11, 0x0, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x60, &(0x7f0000000000)={{0x0, @dev, 0x0, 0x0, 'ovf\x00', 0x0, 0x0, 0x3}, {@multicast1}}, 0x44) 13:42:35 executing program 1: bpf$PROG_LOAD(0xa, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) 13:42:35 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f0000001500)) [ 103.257996][ T23] audit: type=1400 audit(1675777355.314:211): avc: denied { create } for pid=5532 comm="syz-executor.3" name="bus" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=chr_file permissive=1 13:42:35 executing program 4: prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000280)) 13:42:35 executing program 2: shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000140)=""/143) 13:42:35 executing program 3: setresuid(0xee01, 0x0, 0x0) setreuid(0x0, 0x0) 13:42:35 executing program 5: set_mempolicy(0x4005, &(0x7f0000000100)=0x5, 0x81) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x11, 0x0, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x60, &(0x7f0000000000)={{0x0, @dev, 0x0, 0x0, 'ovf\x00', 0x0, 0x0, 0x3}, {@multicast1}}, 0x44) 13:42:35 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f0000001500)) 13:42:35 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000080)={r2}) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x52, &(0x7f00000000c0)={&(0x7f0000000000)=@bridge_setlink={0x94, 0x13, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r1}, [@IFLA_AF_SPEC={0x8, 0xc, 0x0, 0x0, [@AF_BRIDGE={0x4e00}]}, @IFLA_AF_SPEC={0x6c, 0x1a, 0x0, 0x1, [@AF_INET6={0x54, 0x3d, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @mcast1}, @IFLA_INET6_TOKEN={0xffffffffffffff92, 0x7, @private1}, @IFLA_INET6_TOKEN={0x14, 0x7, @dev}, @IFLA_INET6_ADDR_GEN_MODE]}, @AF_BRIDGE={0x2}, @AF_INET6={0xc}, @AF_MPLS={0x4}]}]}, 0x94}}, 0x0) 13:42:35 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000000c0), 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x3f, 0x5, 0x0, 0x2, 0xe, 0x8, "f97f5c3bee82f3728fe9b1cd4951520180147ae0407203d986c555e4f5d7d053cc7f26f452b8aaca38f5265c2f43d004126f0508f2808b2ff8f0a9e076f5d2e3", "e8dbc5c784d633cf48fe242cec62dad3f41eaa3824542275d2e6ee82f7d7ee67a2b92aa7ff4f88fb9d24e2cd2cfb558dfcd1f60896facd76472c15f88eb33212", "82d2c8ac3b9dac3447955d6a447d4990ebd9d2873ca6ed0b1266947f5bf3074e", [0x1000, 0x8]}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000001c0)={0x1, 0x0, 0x98, &(0x7f0000000100)={0x4000, 0xfffffffffffffffd, 0x7}}) 13:42:35 executing program 5: set_mempolicy(0x4005, &(0x7f0000000100)=0x5, 0x81) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x60, &(0x7f0000000000)={{0x0, @dev, 0x0, 0x0, 'ovf\x00', 0x0, 0x0, 0x3}, {@multicast1}}, 0x44) 13:42:35 executing program 2: shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000140)=""/143) 13:42:35 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_mreqn(r0, 0x0, 0x13, 0x0, &(0x7f00000003c0)) 13:42:35 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, 0x0) 13:42:35 executing program 0: add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000340)='E', 0x1, 0xfffffffffffffffc) 13:42:35 executing program 4: mkdir(&(0x7f00000020c0)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000001e40)=@v1={0x0, @aes128, 0x0, @desc1}) chdir(&(0x7f0000000000)='./file0\x00') add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000240)={'fscrypt:', @desc1}, &(0x7f00000002c0)={0x0, "615a091a55a8c9a640115d99d981b3886420589c6685d4982a83b71b906769e737201ac6b7a7804454156569cbf3a5be811debc957b5831b89b59d703e748c7c", 0x10}, 0x48, 0xffffffffffffffff) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x100, 0x0) r3 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffff7) sendfile(r1, r1, 0x0, 0x80000005) 13:42:35 executing program 5: set_mempolicy(0x4005, &(0x7f0000000100)=0x5, 0x81) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x60, &(0x7f0000000000)={{0x0, @dev, 0x0, 0x0, 'ovf\x00', 0x0, 0x0, 0x3}, {@multicast1}}, 0x44) 13:42:35 executing program 3: bpf$PROG_LOAD_XDP(0x5, 0xfffffffffffffffd, 0x8c) 13:42:35 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x20001400) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x20001400) 13:42:35 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_mreqn(r0, 0x0, 0x22, 0x0, &(0x7f00000003c0)) 13:42:35 executing program 0: ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000280)) 13:42:35 executing program 1: syz_clone(0x43008000, 0x0, 0x1a, 0x0, 0x0, 0x0) 13:42:35 executing program 5: set_mempolicy(0x4005, &(0x7f0000000100)=0x5, 0x81) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x60, &(0x7f0000000000)={{0x0, @dev, 0x0, 0x0, 'ovf\x00', 0x0, 0x0, 0x3}, {@multicast1}}, 0x44) 13:42:35 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000002540)=[{&(0x7f0000002380)="a6", 0x1}], 0x1}}], 0x2, 0x4008000) 13:42:35 executing program 5: set_mempolicy(0x4005, &(0x7f0000000100)=0x5, 0x81) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x60, &(0x7f0000000000)={{0x0, @dev, 0x0, 0x0, 'ovf\x00', 0x0, 0x0, 0x3}, {@multicast1}}, 0x44) 13:42:35 executing program 2: pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x2, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) 13:42:35 executing program 3: sched_setattr(0x0, &(0x7f0000000180)={0x38, 0x5}, 0x0) r0 = open(0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x400, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x1c5342, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8000d70d) sendfile(0xffffffffffffffff, r0, &(0x7f0000000240), 0x7ffc) 13:42:36 executing program 4: mkdir(&(0x7f00000020c0)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000001e40)=@v1={0x0, @aes128, 0x0, @desc1}) chdir(&(0x7f0000000000)='./file0\x00') add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000240)={'fscrypt:', @desc1}, &(0x7f00000002c0)={0x0, "615a091a55a8c9a640115d99d981b3886420589c6685d4982a83b71b906769e737201ac6b7a7804454156569cbf3a5be811debc957b5831b89b59d703e748c7c", 0x10}, 0x48, 0xffffffffffffffff) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x100, 0x0) r3 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffff7) sendfile(r1, r1, 0x0, 0x80000005) 13:42:36 executing program 5: set_mempolicy(0x4005, &(0x7f0000000100)=0x5, 0x81) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x60, &(0x7f0000000000)={{0x0, @dev, 0x0, 0x0, 'ovf\x00', 0x0, 0x0, 0x3}, {@multicast1}}, 0x44) 13:42:36 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000100)=0xffffffff) read(r0, &(0x7f0000000300)=""/252, 0xfc) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x10000, 0x0, "67b4a522ef52ffeee99d83c49c8bbdb6b56e30"}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x541b, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) 13:42:36 executing program 1: pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r1, 0x0, 0x4, 0x3) 13:42:36 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.io_service_bytes_recursive\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000240)=ANY=[], 0x57) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) io_setup(0x5, &(0x7f0000000100)=0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/vmstat\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000440)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0}]) 13:42:36 executing program 3: sched_setattr(0x0, &(0x7f0000000180)={0x38, 0x5}, 0x0) r0 = open(0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x400, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x1c5342, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8000d70d) sendfile(0xffffffffffffffff, r0, &(0x7f0000000240), 0x7ffc) 13:42:36 executing program 5: set_mempolicy(0x4005, &(0x7f0000000100)=0x5, 0x81) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x60, &(0x7f0000000000)={{0x0, @dev, 0x0, 0x0, 'ovf\x00', 0x0, 0x0, 0x3}, {@multicast1}}, 0x44) 13:42:36 executing program 1: madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x11) 13:42:36 executing program 5: set_mempolicy(0x4005, &(0x7f0000000100)=0x5, 0x81) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x60, &(0x7f0000000000)={{0x0, @dev, 0x0, 0x0, 'ovf\x00', 0x0, 0x0, 0x3}, {@multicast1}}, 0x44) 13:42:36 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r1, 0x0, r2, 0x0, 0x2, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 13:42:36 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000100)=0xffffffff) read(r0, &(0x7f0000000300)=""/252, 0xfc) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x10000, 0x0, "67b4a522ef52ffeee99d83c49c8bbdb6b56e30"}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x541b, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) 13:42:36 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/tty/ldiscs\x00', 0x0, 0x0) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000040)=0x4) pread64(r0, 0x0, 0x0, 0x0) 13:42:37 executing program 4: mkdir(&(0x7f00000020c0)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000001e40)=@v1={0x0, @aes128, 0x0, @desc1}) chdir(&(0x7f0000000000)='./file0\x00') add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000240)={'fscrypt:', @desc1}, &(0x7f00000002c0)={0x0, "615a091a55a8c9a640115d99d981b3886420589c6685d4982a83b71b906769e737201ac6b7a7804454156569cbf3a5be811debc957b5831b89b59d703e748c7c", 0x10}, 0x48, 0xffffffffffffffff) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x100, 0x0) r3 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffff7) sendfile(r1, r1, 0x0, 0x80000005) 13:42:37 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000740), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_REG(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000780)={0x14, r1, 0x1}, 0x14}}, 0x0) 13:42:37 executing program 5: set_mempolicy(0x4005, &(0x7f0000000100)=0x5, 0x81) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x60, &(0x7f0000000000)={{0x0, @dev, 0x0, 0x0, 'ovf\x00', 0x0, 0x0, 0x3}, {@multicast1}}, 0x44) 13:42:37 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000100)=0xffffffff) read(r0, &(0x7f0000000300)=""/252, 0xfc) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x10000, 0x0, "67b4a522ef52ffeee99d83c49c8bbdb6b56e30"}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x541b, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) 13:42:37 executing program 1: prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1c5342, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000d70d) write$P9_RREADLINK(r1, 0x0, 0x88) 13:42:37 executing program 3: sched_setattr(0x0, &(0x7f0000000180)={0x38, 0x5}, 0x0) r0 = open(0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x400, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x1c5342, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8000d70d) sendfile(0xffffffffffffffff, r0, &(0x7f0000000240), 0x7ffc) 13:42:37 executing program 5: set_mempolicy(0x4005, &(0x7f0000000100)=0x5, 0x81) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x60, &(0x7f0000000000)={{0x0, @dev, 0x0, 0x0, 'ovf\x00', 0x0, 0x0, 0x3}, {@multicast1}}, 0x44) 13:42:37 executing program 2: sched_setattr(0x0, &(0x7f0000000180)={0x38, 0x5}, 0x0) open(0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1c5342, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000d70d) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7ffc) 13:42:37 executing program 5: set_mempolicy(0x4005, &(0x7f0000000100)=0x5, 0x81) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x60, &(0x7f0000000000)={{0x0, @dev, 0x0, 0x0, 'ovf\x00', 0x0, 0x0, 0x3}, {@multicast1}}, 0x44) 13:42:37 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000100)=0xffffffff) read(r0, &(0x7f0000000300)=""/252, 0xfc) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x10000, 0x0, "67b4a522ef52ffeee99d83c49c8bbdb6b56e30"}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x541b, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) 13:42:37 executing program 5: set_mempolicy(0x4005, &(0x7f0000000100)=0x5, 0x81) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x60, &(0x7f0000000000)={{0x0, @dev, 0x0, 0x0, 'ovf\x00', 0x0, 0x0, 0x3}, {@multicast1}}, 0x44) 13:42:37 executing program 5: set_mempolicy(0x4005, &(0x7f0000000100)=0x5, 0x81) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x60, &(0x7f0000000000)={{0x0, @dev, 0x0, 0x0, 'ovf\x00', 0x0, 0x0, 0x3}, {@multicast1}}, 0x44) 13:42:38 executing program 4: mkdir(&(0x7f00000020c0)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000001e40)=@v1={0x0, @aes128, 0x0, @desc1}) chdir(&(0x7f0000000000)='./file0\x00') add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000240)={'fscrypt:', @desc1}, &(0x7f00000002c0)={0x0, "615a091a55a8c9a640115d99d981b3886420589c6685d4982a83b71b906769e737201ac6b7a7804454156569cbf3a5be811debc957b5831b89b59d703e748c7c", 0x10}, 0x48, 0xffffffffffffffff) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x1000) lseek(r2, 0x100, 0x0) r3 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffff7) sendfile(r1, r1, 0x0, 0x80000005) 13:42:38 executing program 5: set_mempolicy(0x4005, &(0x7f0000000100)=0x5, 0x81) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, 0x0, &(0x7f0000000000)) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x60, &(0x7f0000000000)={{0x0, @dev, 0x0, 0x0, 'ovf\x00', 0x0, 0x0, 0x3}, {@multicast1}}, 0x44) 13:42:38 executing program 0: capget(&(0x7f0000003e40)={0x19980330}, &(0x7f0000003e80)) 13:42:38 executing program 1: prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1c5342, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000d70d) write$P9_RREADLINK(r1, 0x0, 0x88) 13:42:38 executing program 2: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80001d00c0d0) fallocate(r0, 0x10, 0x0, 0x4) 13:42:38 executing program 3: sched_setattr(0x0, &(0x7f0000000180)={0x38, 0x5}, 0x0) r0 = open(0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x400, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x1c5342, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8000d70d) sendfile(0xffffffffffffffff, r0, &(0x7f0000000240), 0x7ffc) 13:42:38 executing program 5: set_mempolicy(0x4005, &(0x7f0000000100)=0x5, 0x81) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, 0x0, &(0x7f0000000000)) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x60, &(0x7f0000000000)={{0x0, @dev, 0x0, 0x0, 'ovf\x00', 0x0, 0x0, 0x3}, {@multicast1}}, 0x44) 13:42:38 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, &(0x7f0000000140)='V', 0x1, 0x481, 0x0, 0x0) recvfrom$unix(r0, &(0x7f0000000180)=""/4109, 0x1003, 0x1, 0x0, 0xfe5c) 13:42:38 executing program 0: madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) timer_create(0x6, 0x0, &(0x7f0000000240)) [ 106.107756][ T5663] capability: warning: `syz-executor.0' uses 32-bit capabilities (legacy support in use) 13:42:38 executing program 5: set_mempolicy(0x4005, &(0x7f0000000100)=0x5, 0x81) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, 0x0, &(0x7f0000000000)) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x60, &(0x7f0000000000)={{0x0, @dev, 0x0, 0x0, 'ovf\x00', 0x0, 0x0, 0x3}, {@multicast1}}, 0x44) 13:42:38 executing program 5: set_mempolicy(0x4005, &(0x7f0000000100)=0x5, 0x81) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x60, &(0x7f0000000000)={{0x0, @dev, 0x0, 0x0, 'ovf\x00', 0x0, 0x0, 0x3}, {@multicast1}}, 0x44) 13:42:38 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/class/net', 0x0, 0x0) getdents64(r0, &(0x7f0000000600)=""/4096, 0x1000) 13:42:39 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, &(0x7f0000000140)='V', 0x1, 0x481, 0x0, 0x0) recvmmsg$unix(r0, &(0x7f0000001f00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xd0}}], 0x1, 0x0, 0x0) recvfrom$unix(r0, 0x0, 0x0, 0x1, 0x0, 0x0) 13:42:39 executing program 4: syz_emit_ethernet(0x52, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd60432317001c0000fe8000000000000000000000000000aa913b87e5fc70ca8f6dd584d4be30e9b006000000000000004e224e22", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5091"], 0x0) 13:42:39 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') lseek(0xffffffffffffffff, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000001180)={0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080)='GPL\x00', 0x0, 0x1000, &(0x7f00000000c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000010c0)={0xa}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0, 0x0, &(0x7f0000001140)=[r0]}, 0x80) pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) splice(r2, 0x0, r3, 0x0, 0x2, 0x0) close_range(r0, r1, 0x0) 13:42:39 executing program 5: set_mempolicy(0x4005, &(0x7f0000000100)=0x5, 0x81) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x60, &(0x7f0000000000)={{0x0, @dev, 0x0, 0x0, 'ovf\x00', 0x0, 0x0, 0x3}, {@multicast1}}, 0x44) 13:42:39 executing program 1: r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000040)="ff0204000000000100000000000000000000000000000205", 0x18) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f000000c780)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f000000b1c0)="b380727756609acf71c04c8b0632c45ccffbf2cddffad16f74b11a60ba745eb9aa925024654d46b199f962a967390b3bcae571d976272329cf9890673c2274a3e084f68216eae4e2afe9ba8438961561741c886e6e7829c174ddeb208e66be2a7ef43befe4314af3f50b77fbcaf5d3d586cd06919b7e3f3667ad36ff39c08248040393f0e3d4fbad25087240c2b4d395e25c171abb5799105500ace3b5d7547e521ce02b443fd2ece4da4da6ac9146552a30b83f14ab822ea5", 0xb9}], 0x1}}], 0x1, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) 13:42:39 executing program 2: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80001d00c0d0) fallocate(r0, 0x10, 0x0, 0x4) 13:42:39 executing program 5: set_mempolicy(0x4005, &(0x7f0000000100)=0x5, 0x81) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x60, &(0x7f0000000000)={{0x0, @dev, 0x0, 0x0, 'ovf\x00', 0x0, 0x0, 0x3}, {@multicast1}}, 0x44) 13:42:39 executing program 1: openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/zoneinfo\x00', 0x0, 0x0) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe) madvise(&(0x7f0000554000/0x2000)=nil, 0x2000, 0xe) 13:42:39 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, &(0x7f0000000140)='V', 0x1, 0x481, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r2, 0x0) recvfrom$unix(r0, &(0x7f0000000180)=""/4109, 0x1003, 0x1, 0x0, 0xfe5c) 13:42:39 executing program 5: set_mempolicy(0x4005, &(0x7f0000000100)=0x5, 0x81) socket$inet_udp(0x2, 0x2, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000000)={{0x0, @dev, 0x0, 0x0, 'ovf\x00', 0x0, 0x0, 0x3}, {@multicast1}}, 0x44) 13:42:39 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0), 0x0, 0x10, &(0x7f0000000080), 0x1f1}, 0x48) 13:42:39 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KDGKBMODE(r0, 0x4b44, 0x0) 13:42:39 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\xf3e\t\xa9\xff\vty\x01senux\x00', 0x0) lseek(r0, 0x0, 0x1) 13:42:39 executing program 1: madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xe7}], 0x1, 0x0) 13:42:39 executing program 5: set_mempolicy(0x4005, &(0x7f0000000100)=0x5, 0x81) socket$inet_udp(0x2, 0x2, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000000)={{0x0, @dev, 0x0, 0x0, 'ovf\x00', 0x0, 0x0, 0x3}, {@multicast1}}, 0x44) 13:42:39 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, &(0x7f0000000140)='V', 0x1, 0x481, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r2, 0x0) recvfrom$unix(r0, &(0x7f0000000180)=""/4109, 0x1003, 0x1, 0x0, 0xfe5c) 13:42:39 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x10) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x40806685, &(0x7f00000003c0)={0x1, 0x1, 0x1000, 0x1, &(0x7f0000000240)="80", 0x87, 0x0, &(0x7f0000000080)="6ae5092326b814d60904a6f947a5c916536d62ba892fe0137e35882472be1fea23149baeb23f79db89b5dd90e02640060fb655dc2e7def42b52682e861174c72224490d703760f117b23fcef0eaccd5439071f50522dacfedf4f171325ca6d27ae11055358d37e5be171894650596d6e1223e60d2a252f177199837d9641add955a7973d0b005e"}) 13:42:39 executing program 2: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80001d00c0d0) fallocate(r0, 0x10, 0x0, 0x4) 13:42:39 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, &(0x7f0000000140)='V', 0x1, 0x481, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r2, 0x0) recvfrom$unix(r0, &(0x7f0000000180)=""/4109, 0x1003, 0x1, 0x0, 0xfe5c) 13:42:39 executing program 0: madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) munmap(&(0x7f00002f5000/0x4000)=nil, 0x4000) 13:42:39 executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r0, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x6, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x32) r2 = dup3(r0, r1, 0x0) getsockname$inet6(r2, 0x0, &(0x7f0000000040)) 13:42:39 executing program 5: set_mempolicy(0x4005, &(0x7f0000000100)=0x5, 0x81) socket$inet_udp(0x2, 0x2, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000000)={{0x0, @dev, 0x0, 0x0, 'ovf\x00', 0x0, 0x0, 0x3}, {@multicast1}}, 0x44) 13:42:39 executing program 3: r0 = socket(0x1, 0x3, 0x0) sendto$packet(r0, 0x0, 0x0, 0x880, 0x0, 0xfffffffffffffee0) 13:42:40 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, &(0x7f0000000140)='V', 0x1, 0x481, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r2, 0x0) recvfrom$unix(r0, &(0x7f0000000180)=""/4109, 0x1003, 0x1, 0x0, 0xfe5c) 13:42:40 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x321002, 0x0) 13:42:40 executing program 5: set_mempolicy(0x4005, &(0x7f0000000100)=0x5, 0x81) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x60, 0x0, 0x0) 13:42:40 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, &(0x7f0000000140)='V', 0x1, 0x481, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) recvfrom$unix(r0, &(0x7f0000000180)=""/4109, 0x1003, 0x1, 0x0, 0xfe5c) 13:42:40 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000480)={0x1, &(0x7f0000000440)=[{}]}) 13:42:40 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000480)={0x0, 0x0}) 13:42:40 executing program 2: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80001d00c0d0) fallocate(r0, 0x10, 0x0, 0x4) 13:42:40 executing program 0: memfd_create(&(0x7f0000000000)='^:\x00', 0x2) 13:42:40 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_int(r0, 0x0, 0xb, 0x0, &(0x7f0000000180)) 13:42:40 executing program 5: set_mempolicy(0x4005, &(0x7f0000000100)=0x5, 0x81) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x60, 0x0, 0x0) 13:42:40 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) read$watch_queue(r0, 0x0, 0x7) 13:42:40 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, &(0x7f0000000140)='V', 0x1, 0x481, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) recvfrom$unix(r0, &(0x7f0000000180)=""/4109, 0x1003, 0x1, 0x0, 0xfe5c) 13:42:40 executing program 1: r0 = socket(0x11, 0x3, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000040)={0x0, @broadcast, @initdev}, &(0x7f0000000080)=0xc) 13:42:40 executing program 5: set_mempolicy(0x4005, &(0x7f0000000100)=0x5, 0x81) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x60, 0x0, 0x0) 13:42:40 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, 0x0, 0x0, 0x40) 13:42:40 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000010c0), 0x0, 0x0) syz_open_pts(r0, 0xc8001) 13:42:40 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, &(0x7f0000000140)='V', 0x1, 0x481, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) recvfrom$unix(r0, &(0x7f0000000180)=""/4109, 0x1003, 0x1, 0x0, 0xfe5c) 13:42:40 executing program 1: setuid(0xee00) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) [ 108.208609][ T23] kauditd_printk_skb: 4 callbacks suppressed [ 108.208620][ T23] audit: type=1400 audit(1675777360.264:216): avc: denied { getopt } for pid=5762 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 13:42:40 executing program 1: prlimit64(0x0, 0x7, &(0x7f0000000200), 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 13:42:40 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x0, &(0x7f0000000180)={@ipv4={""/10, ""/2, @private}}, &(0x7f00000000c0)=0xfffffcdc) 13:42:40 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000001480)={&(0x7f0000000000)={0x2, 0x4e25, @loopback}, 0x10, 0x0}, 0x40c0) 13:42:40 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, &(0x7f0000000140)='V', 0x1, 0x481, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, 0xffffffffffffffff, 0x0) recvfrom$unix(r0, &(0x7f0000000180)=""/4109, 0x1003, 0x1, 0x0, 0xfe5c) 13:42:40 executing program 5: set_mempolicy(0x4005, &(0x7f0000000100)=0x5, 0x81) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x60, &(0x7f0000000000)={{0x0, @dev, 0x0, 0x0, 'ovf\x00'}, {@multicast1}}, 0x44) 13:42:40 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000010c0), 0x0, 0x0) syz_open_pts(r0, 0xc8001) 13:42:40 executing program 1: prlimit64(0x0, 0x7, &(0x7f0000000200), 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 13:42:40 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000010c0), 0x0, 0x0) syz_open_pts(r0, 0xc8001) 13:42:40 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0xb, 0x0, &(0x7f0000000300)) 13:42:40 executing program 1: r0 = socket$inet(0x2, 0x3, 0x6) setsockopt$inet_tcp_int(r0, 0x6, 0x24, &(0x7f0000000100), 0x4) 13:42:40 executing program 0: r0 = semget(0x0, 0x0, 0x0) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000040)=""/138) 13:42:40 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, &(0x7f0000000140)='V', 0x1, 0x481, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, 0xffffffffffffffff, 0x0) recvfrom$unix(r0, &(0x7f0000000180)=""/4109, 0x1003, 0x1, 0x0, 0xfe5c) 13:42:40 executing program 5: set_mempolicy(0x4005, &(0x7f0000000100)=0x5, 0x81) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x60, &(0x7f0000000000)={{0x0, @dev, 0x0, 0x0, 'ovf\x00'}, {@multicast1}}, 0x44) 13:42:40 executing program 2: setuid(0xee00) r0 = shmget(0x3, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmat(r0, &(0x7f0000ffd000/0x2000)=nil, 0x0) 13:42:40 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000010c0), 0x0, 0x0) syz_open_pts(r0, 0xc8001) 13:42:40 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x84000, 0x0) 13:42:40 executing program 1: r0 = semget(0x2, 0x0, 0x0) semtimedop(r0, &(0x7f0000000040)=[{0x0, 0x7}], 0x1, 0x0) 13:42:40 executing program 0: r0 = socket(0x1, 0x3, 0x0) sendto$packet(r0, 0x0, 0x0, 0x801, 0x0, 0x0) 13:42:40 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, &(0x7f0000000140)='V', 0x1, 0x481, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, 0xffffffffffffffff, 0x0) recvfrom$unix(r0, &(0x7f0000000180)=""/4109, 0x1003, 0x1, 0x0, 0xfe5c) 13:42:40 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x0, 0x0, &(0x7f0000000200)) 13:42:40 executing program 5: set_mempolicy(0x4005, &(0x7f0000000100)=0x5, 0x81) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x60, &(0x7f0000000000)={{0x0, @dev, 0x0, 0x0, 'ovf\x00'}, {@multicast1}}, 0x44) 13:42:40 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r1, 0x0) recvfrom$unix(r0, &(0x7f0000000180)=""/4109, 0x1003, 0x1, 0x0, 0xfe5c) 13:42:40 executing program 1: r0 = semget(0x2, 0x0, 0x0) semtimedop(r0, &(0x7f0000000040)=[{0x0, 0x7}], 0x1, 0x0) 13:42:40 executing program 3: r0 = socket(0x1, 0x3, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, 0x0, 0x0) 13:42:40 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000001a00)=[{{&(0x7f0000000000)={0x2, 0x4e21, @remote}, 0x10, 0x0}}], 0x1, 0xc0) 13:42:40 executing program 1: r0 = semget(0x2, 0x0, 0x0) semtimedop(r0, &(0x7f0000000040)=[{0x0, 0x7}], 0x1, 0x0) 13:42:40 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000001a00)=[{{&(0x7f0000000000)={0x2, 0x4e21, @empty}, 0x10, 0x0}}], 0x1, 0x80) 13:42:40 executing program 3: prlimit64(0x0, 0x7, &(0x7f0000000200), 0x0) socket$packet(0x11, 0x3, 0x300) 13:42:40 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TCGETS(r0, 0x5401, &(0x7f0000000100)) 13:42:40 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) sendmmsg$inet(r0, &(0x7f0000003cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 13:42:40 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r1, 0x0) recvfrom$unix(r0, &(0x7f0000000180)=""/4109, 0x1003, 0x1, 0x0, 0xfe5c) 13:42:40 executing program 2: r0 = semget$private(0x0, 0x1, 0x5dc) semctl$IPC_STAT(r0, 0x0, 0x2, &(0x7f0000000000)=""/75) semctl$SETALL(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000080)=[0x3, 0x8, 0x1f]) r1 = semget(0x2, 0x1, 0x400) semctl$IPC_RMID(r1, 0x0, 0x0) semget$private(0x0, 0x3, 0x111) 13:42:40 executing program 1: r0 = semget(0x2, 0x0, 0x0) semtimedop(r0, &(0x7f0000000040)=[{0x0, 0x7}], 0x1, 0x0) 13:42:40 executing program 3: prlimit64(0x0, 0x7, &(0x7f0000000200), 0x0) socket$packet(0x11, 0x3, 0x300) 13:42:40 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r1, 0x0) recvfrom$unix(r0, &(0x7f0000000180)=""/4109, 0x1003, 0x1, 0x0, 0xfe5c) 13:42:40 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0xd, &(0x7f0000000380)=""/103, &(0x7f0000000100)=0x67) 13:42:40 executing program 0: r0 = semget(0x0, 0x0, 0x0) semctl$IPC_INFO(r0, 0x0, 0x3, &(0x7f0000000080)=""/111) 13:42:40 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$packet(r0, &(0x7f0000000f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) [ 108.621647][ T23] audit: type=1400 audit(1675777360.674:217): avc: denied { write } for pid=5829 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 13:42:40 executing program 4: sendto$unix(0xffffffffffffffff, &(0x7f0000000140)='V', 0x1, 0x481, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000180)=""/4109, 0x1003, 0x1, 0x0, 0xfe5c) 13:42:40 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000000)=0x68c4, 0x4) 13:42:40 executing program 5: r0 = socket(0x1, 0x3, 0x0) sendto$packet(r0, 0x0, 0x0, 0x20000801, 0x0, 0x0) 13:42:40 executing program 3: prlimit64(0x0, 0x7, &(0x7f0000000200), 0x0) socket$packet(0x11, 0x3, 0x300) 13:42:40 executing program 1: r0 = socket(0x1, 0x3, 0x0) sendto$packet(r0, 0x0, 0x40, 0x0, 0x0, 0x0) 13:42:40 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000010c0), 0x0, 0x0) r1 = syz_open_pts(r0, 0x0) syz_open_pts(r1, 0x25100) 13:42:40 executing program 0: r0 = semget$private(0x0, 0xb, 0x0) semop(r0, &(0x7f0000000140)=[{0x0, 0x7fff}, {0x0, 0x1}], 0x2) 13:42:40 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, 0x0, 0x7e) 13:42:40 executing program 4: sendto$unix(0xffffffffffffffff, &(0x7f0000000140)='V', 0x1, 0x481, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000180)=""/4109, 0x1003, 0x1, 0x0, 0xfe5c) 13:42:40 executing program 3: prlimit64(0x0, 0x7, &(0x7f0000000200), 0x0) socket$packet(0x11, 0x3, 0x300) 13:42:40 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x12, &(0x7f0000000180), 0x4) 13:42:40 executing program 2: semget$private(0x0, 0x1, 0x5dc) 13:42:40 executing program 5: semget(0x0, 0x2, 0x310) 13:42:40 executing program 0: r0 = semget$private(0x0, 0xb, 0x0) semop(r0, &(0x7f0000000140)=[{0x0, 0x7fff}], 0x1) semtimedop(r0, &(0x7f0000000180)=[{0x0, 0xa2d}], 0x1, 0x0) 13:42:40 executing program 4: sendto$unix(0xffffffffffffffff, &(0x7f0000000140)='V', 0x1, 0x481, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000180)=""/4109, 0x1003, 0x1, 0x0, 0xfe5c) 13:42:40 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000003400)=[{{&(0x7f00000015c0)={0xa, 0x4e23, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x4080) 13:42:40 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000003400)=[{{&(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c, 0x0, 0xfffffffffffffe4f, 0x0, 0xffffff37}}], 0x1, 0x0) 13:42:40 executing program 0: semget$private(0x0, 0x1, 0x484) 13:42:40 executing program 5: prlimit64(0x0, 0x7, &(0x7f0000000200), 0x0) inotify_init1(0x0) 13:42:40 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, &(0x7f0000000140)='V', 0x1, 0x481, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r2, 0x0) recvfrom$unix(r0, &(0x7f0000000180)=""/4109, 0x1003, 0x1, 0x0, 0xfe5c) 13:42:40 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000003400)=[{{&(0x7f00000015c0)={0xa, 0x4e23, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x80) 13:42:40 executing program 1: semget$private(0x0, 0xb, 0x89) 13:42:40 executing program 0: openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.pending_reads\x00', 0x60c0, 0x1f2) 13:42:40 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 13:42:40 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TCGETS(r0, 0x5401, 0x0) 13:42:40 executing program 5: r0 = semget$private(0x0, 0x3, 0x0) semop(r0, &(0x7f0000001000)=[{0x2, 0x6}, {0x2, 0x0, 0x1800}], 0x2) 13:42:40 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, &(0x7f0000000140)='V', 0x1, 0x481, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r2, 0x0) recvfrom$unix(r0, &(0x7f0000000180)=""/4109, 0x1003, 0x1, 0x0, 0xfe5c) 13:42:40 executing program 1: semget$private(0x0, 0xb, 0x775) 13:42:41 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, &(0x7f0000000140)='V', 0x1, 0x481, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r2, 0x0) recvfrom$unix(r0, &(0x7f0000000180)=""/4109, 0x1003, 0x1, 0x0, 0xfe5c) 13:42:41 executing program 2: r0 = socket(0x11, 0x3, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, 0x0, 0x0) 13:42:41 executing program 0: semget(0x0, 0x4, 0x26) 13:42:41 executing program 3: r0 = socket(0x1, 0x3, 0x0) sendto$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 108.901124][ T23] audit: type=1400 audit(1675777360.954:218): avc: denied { bind } for pid=5899 comm="syz-executor.3" lport=6 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 108.921956][ T23] audit: type=1400 audit(1675777360.954:219): avc: denied { node_bind } for pid=5899 comm="syz-executor.3" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 13:42:41 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, 0x0, 0x0) 13:42:41 executing program 4: socketpair$unix(0x1, 0x1, 0x0, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000140)='V', 0x1, 0x481, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000180)=""/4109, 0x1003, 0x1, 0x0, 0xfe5c) 13:42:41 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$cgroup_int(r0, 0x0, 0xffffffffffffff36) 13:42:41 executing program 1: semctl$SEM_STAT(0x0, 0x3, 0x12, &(0x7f0000000040)=""/33) 13:42:41 executing program 2: pipe(&(0x7f0000014b40)={0xffffffffffffffff}) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, 0x0) 13:42:41 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000003b00), 0x0, 0x4000) 13:42:41 executing program 5: r0 = socket(0x1, 0x3, 0x0) sendto$packet(r0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe6c) [ 108.972348][ T23] audit: type=1400 audit(1675777361.024:220): avc: denied { setopt } for pid=5911 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 13:42:41 executing program 3: setuid(0xee00) shmget(0x3, 0x1000, 0x4, &(0x7f0000ffc000/0x1000)=nil) 13:42:41 executing program 4: socketpair$unix(0x1, 0x1, 0x0, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000140)='V', 0x1, 0x481, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000180)=""/4109, 0x1003, 0x1, 0x0, 0xfe5c) 13:42:41 executing program 0: semget(0x3, 0x1, 0x108) 13:42:41 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000001a00), 0x0, 0xc0) 13:42:41 executing program 5: mount$9p_fd(0x0, 0x0, 0x0, 0x3810024, 0x0) 13:42:41 executing program 4: socketpair$unix(0x1, 0x1, 0x0, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000140)='V', 0x1, 0x481, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000180)=""/4109, 0x1003, 0x1, 0x0, 0xfe5c) 13:42:41 executing program 3: pipe(&(0x7f0000014b40)={0xffffffffffffffff}) fcntl$getownex(r0, 0x10, 0x0) 13:42:41 executing program 2: r0 = semget$private(0x0, 0x4, 0x0) semtimedop(r0, &(0x7f00000001c0)=[{0x6}], 0x1, 0x0) 13:42:41 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, 0x0) 13:42:41 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) sendmmsg$inet(r0, 0x0, 0x0, 0x24000804) 13:42:41 executing program 1: pipe(&(0x7f0000014b40)={0xffffffffffffffff}) getsockopt$sock_timeval(r0, 0x1, 0x0, 0x0, 0x0) 13:42:41 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x14, 0x2, 0x3, 0x5}, 0x14}}, 0x0) 13:42:41 executing program 3: pipe(&(0x7f0000014b40)={0xffffffffffffffff}) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, 0x0, 0x0) 13:42:41 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendto$unix(0xffffffffffffffff, &(0x7f0000000140)='V', 0x1, 0x481, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r1, 0x0) recvfrom$unix(r0, &(0x7f0000000180)=""/4109, 0x1003, 0x1, 0x0, 0xfe5c) 13:42:41 executing program 2: semctl$SEM_STAT(0x0, 0x2, 0x12, &(0x7f0000000000)=""/107) 13:42:41 executing program 3: semctl$SEM_INFO(0xffffffffffffffff, 0x3, 0x13, &(0x7f0000000100)=""/71) 13:42:41 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg$inet(r0, 0x0, 0x0, 0x4000) 13:42:41 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$BTRFS_IOC_ADD_DEV(r0, 0x5000940a, 0x0) 13:42:41 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, 0x0) 13:42:41 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendto$unix(0xffffffffffffffff, &(0x7f0000000140)='V', 0x1, 0x481, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r1, 0x0) recvfrom$unix(r0, &(0x7f0000000180)=""/4109, 0x1003, 0x1, 0x0, 0xfe5c) 13:42:41 executing program 0: pipe(&(0x7f0000014b40)={0xffffffffffffffff}) getsockname$packet(r0, 0x0, 0x0) 13:42:41 executing program 1: semget$private(0x0, 0x3, 0x442) 13:42:41 executing program 2: pipe(&(0x7f0000014b40)={0xffffffffffffffff}) openat$cgroup_pressure(r0, &(0x7f0000000080)='io.pressure\x00', 0x2, 0x0) 13:42:41 executing program 3: pipe(&(0x7f0000014b40)={0xffffffffffffffff}) fsetxattr$security_capability(r0, &(0x7f0000000040), 0x0, 0x0, 0x0) 13:42:41 executing program 5: pipe(&(0x7f0000014b40)={0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, 0x0) 13:42:41 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendto$unix(0xffffffffffffffff, &(0x7f0000000140)='V', 0x1, 0x481, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r1, 0x0) recvfrom$unix(r0, &(0x7f0000000180)=""/4109, 0x1003, 0x1, 0x0, 0xfe5c) 13:42:41 executing program 3: pipe(&(0x7f0000014b40)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000014b40)={0xffffffffffffffff}) sendfile(r0, r1, 0x0, 0x0) 13:42:41 executing program 5: pipe(&(0x7f0000014b40)={0xffffffffffffffff}) sendto$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 13:42:41 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x4140, 0x0) 13:42:41 executing program 2: openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000000)='io.pressure\x00', 0x2, 0x0) 13:42:41 executing program 3: pipe(&(0x7f0000014b40)={0xffffffffffffffff}) getsockopt$inet_tcp_buf(r0, 0x6, 0x0, 0x0, 0x0) 13:42:41 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$cgroup_devices(r0, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 13:42:41 executing program 1: memfd_create(&(0x7f0000000080)='&\x00', 0x0) [ 109.233920][ T23] audit: type=1400 audit(1675777361.294:221): avc: denied { setattr } for pid=5973 comm="syz-executor.3" name="" dev="pipefs" ino=25403 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 13:42:41 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, 0x0, &(0x7f0000000140)) 13:42:41 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x481, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r2, 0x0) recvfrom$unix(r0, &(0x7f0000000180)=""/4109, 0x1003, 0x1, 0x0, 0xfe5c) 13:42:41 executing program 2: pipe(&(0x7f0000014b40)={0xffffffffffffffff}) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) 13:42:41 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x481, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r2, 0x0) recvfrom$unix(r0, &(0x7f0000000180)=""/4109, 0x1003, 0x1, 0x0, 0xfe5c) 13:42:41 executing program 3: pipe(&(0x7f0000014b40)={0xffffffffffffffff}) fsetxattr$security_capability(r0, 0x0, 0x0, 0x0, 0x0) 13:42:41 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x100200, 0x0) 13:42:41 executing program 2: ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, 0x0) 13:42:41 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$FIONCLEX(r0, 0x5450) 13:42:41 executing program 1: pipe(&(0x7f0000014b40)={0xffffffffffffffff}) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000000), 0x0, 0x0, 0x0) 13:42:41 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x481, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r2, 0x0) recvfrom$unix(r0, &(0x7f0000000180)=""/4109, 0x1003, 0x1, 0x0, 0xfe5c) 13:42:41 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000000), 0x0, 0x0, 0x0) 13:42:41 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) fcntl$addseals(r0, 0x409, 0x0) 13:42:41 executing program 5: r0 = semget$private(0x0, 0x1, 0x0) semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f0000000000)={{0x3}}) 13:42:41 executing program 0: pipe(&(0x7f0000014b40)={0xffffffffffffffff}) ioctl$TIOCGPGRP(r0, 0x540f, 0x0) 13:42:41 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, &(0x7f0000000140), 0x0, 0x481, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r2, 0x0) recvfrom$unix(r0, &(0x7f0000000180)=""/4109, 0x1003, 0x1, 0x0, 0xfe5c) 13:42:41 executing program 0: openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='.\x00', 0x82, 0x0) 13:42:41 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000003b00), 0x0, 0x0) 13:42:41 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='.\x00', 0x0, 0x101) 13:42:41 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff}) ioctl$BTRFS_IOC_DEFAULT_SUBVOL(r0, 0x40089413, 0x0) 13:42:41 executing program 2: pipe(&(0x7f0000000080)={0xffffffffffffffff}) ioctl$FITRIM(r0, 0xc0185879, 0x0) [ 109.408808][ T23] audit: type=1400 audit(1675777361.464:222): avc: denied { setattr } for pid=6021 comm="syz-executor.3" name="PACKET" dev="sockfs" ino=25476 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 13:42:41 executing program 1: timer_create(0x0, 0x0, &(0x7f0000000100)=0x0) timer_gettime(r0, &(0x7f0000000080)) 13:42:41 executing program 0: pipe(&(0x7f0000014b40)={0xffffffffffffffff}) ioctl$BTRFS_IOC_LOGICAL_INO(r0, 0xc0389424, 0x0) 13:42:41 executing program 5: pipe(&(0x7f0000014b40)={0xffffffffffffffff}) read(r0, 0x0, 0x0) 13:42:41 executing program 3: pipe(&(0x7f0000014b40)={0xffffffffffffffff}) ioctl$BTRFS_IOC_SPACE_INFO(r0, 0xc0109414, 0x0) 13:42:41 executing program 2: pipe(&(0x7f0000014b40)={0xffffffffffffffff}) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, 0x0) 13:42:41 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, &(0x7f0000000140), 0x0, 0x481, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r2, 0x0) recvfrom$unix(r0, &(0x7f0000000180)=""/4109, 0x1003, 0x1, 0x0, 0xfe5c) 13:42:41 executing program 3: timer_create(0x3, &(0x7f00000000c0)={0x0, 0x3e, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000100)) 13:42:41 executing program 5: pipe(&(0x7f0000014b40)={0xffffffffffffffff}) connect$packet(r0, 0x0, 0x0) 13:42:41 executing program 2: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$tcp_congestion(r0, 0x0, 0x0) 13:42:41 executing program 1: pipe(&(0x7f0000014b40)={0xffffffffffffffff}) sendmmsg$inet6(r0, 0x0, 0x0, 0x0) 13:42:41 executing program 0: pipe(&(0x7f0000014b40)={0xffffffffffffffff}) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 13:42:41 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, &(0x7f0000000140), 0x0, 0x481, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r2, 0x0) recvfrom$unix(r0, &(0x7f0000000180)=""/4109, 0x1003, 0x1, 0x0, 0xfe5c) 13:42:41 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x8101, 0x0) 13:42:41 executing program 2: timer_create(0x2, &(0x7f0000000100)={0x0, 0x1c}, &(0x7f0000000140)) 13:42:41 executing program 5: pipe(&(0x7f0000014b40)={0xffffffffffffffff}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, 0x0) 13:42:41 executing program 0: pipe(&(0x7f0000014b40)={0xffffffffffffffff, 0xffffffffffffffff}) bind$netlink(r0, 0x0, 0x0) 13:42:41 executing program 1: pipe(&(0x7f0000014b40)={0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) 13:42:41 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, &(0x7f0000000140)='V', 0x1, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r2, 0x0) recvfrom$unix(r0, &(0x7f0000000180)=""/4109, 0x1003, 0x1, 0x0, 0xfe5c) 13:42:41 executing program 2: r0 = eventfd2(0x0, 0x0) write$eventfd(r0, &(0x7f0000002040), 0x8) 13:42:41 executing program 3: pipe(&(0x7f0000014b40)={0xffffffffffffffff}) read(r0, &(0x7f0000005080)=""/4096, 0x1000) 13:42:41 executing program 0: r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000100), 0x1, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, 0x0) 13:42:41 executing program 5: pipe(&(0x7f0000014b40)={0xffffffffffffffff}) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) 13:42:41 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00'}) 13:42:41 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, &(0x7f0000000140)='V', 0x1, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r2, 0x0) recvfrom$unix(r0, &(0x7f0000000180)=""/4109, 0x1003, 0x1, 0x0, 0xfe5c) 13:42:41 executing program 0: pipe(&(0x7f0000014b40)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, 0x0) 13:42:41 executing program 5: openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000002600), 0x1, 0x0) 13:42:41 executing program 1: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz1\x00', 0x1ff) 13:42:41 executing program 2: timer_create(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, 0x0) 13:42:41 executing program 5: pipe(&(0x7f0000014b40)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, 0x0) 13:42:41 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, &(0x7f0000000140)='V', 0x1, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r2, 0x0) recvfrom$unix(r0, &(0x7f0000000180)=""/4109, 0x1003, 0x1, 0x0, 0xfe5c) 13:42:41 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fcntl$lock(r0, 0x7, &(0x7f0000000040)={0x0, 0x3}) 13:42:42 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fcntl$lock(r0, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7}) 13:42:42 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) accept4(r0, 0x0, 0x0, 0x0) 13:42:42 executing program 3: openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4b4821, 0x0) 13:42:42 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, &(0x7f0000000140)='V', 0x1, 0x481, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r2, 0x0) recvfrom$unix(r0, &(0x7f0000000180)=""/4109, 0x1003, 0x1, 0x0, 0xfe5c) 13:42:42 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff}) fchmod(r0, 0x0) 13:42:42 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x200602, 0x0) fcntl$setflags(r0, 0x2, 0x0) 13:42:42 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) 13:42:42 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) linkat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', r0, &(0x7f0000000180)='./file0\x00', 0x0) 13:42:42 executing program 5: pipe(&(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000040)='fd/3\x00') 13:42:42 executing program 2: r0 = socket$unix(0x1, 0x5, 0x0) getsockname(r0, 0x0, &(0x7f0000000340)) 13:42:42 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@random={'user.', 'security.apparmor\x00'}) 13:42:42 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x200602, 0x0) fcntl$lock(r0, 0x7, 0x0) [ 110.488889][ T23] audit: type=1400 audit(1675777362.544:223): avc: denied { accept } for pid=6101 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_dgram_socket permissive=1 13:42:42 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, &(0x7f0000000140)='V', 0x1, 0x481, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r2, 0x0) recvfrom$unix(r0, &(0x7f0000000180)=""/4109, 0x1003, 0x1, 0x0, 0xfe5c) 13:42:42 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/class/dmi', 0x0, 0x0) fchown(r0, 0x0, 0xffffffffffffffff) setns(r0, 0x0) r1 = dup3(r0, r0, 0x80000) openat$cgroup(r1, &(0x7f0000000180)='syz0\x00', 0x200002, 0x0) mq_open(&(0x7f0000000100)='BEN\x89\xfa\xff', 0x0, 0xe3, 0x0) r2 = mq_open(&(0x7f0000000080)='\'^%--\xfb\\@,%#\x00\tu3\xd2\x99\x05\xbc\xbd8>\x99\xae\xe1\xd8\xeb\xe5j\rz\xe2o\x15\x18\xc1\xfa#', 0x46, 0x11, &(0x7f0000000040)={0x5, 0x3, 0x50a910f0, 0xfff}) r3 = openat$incfs(0xffffffffffffffff, &(0x7f00000000c0)='.log\x00', 0xf4200, 0x80) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/class/dmi', 0x0, 0x0) fchown(r4, 0x0, 0xffffffffffffffff) r5 = socket$packet(0x11, 0x3, 0x300) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/class/dmi', 0x0, 0x0) fchown(r6, 0x0, 0xffffffffffffffff) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/class/dmi', 0x0, 0x0) fchown(r7, 0x0, 0xffffffffffffffff) r8 = syz_open_procfs$userns(0x0, &(0x7f0000000040)) getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f0000000100)) r10 = getgid() fchown(r8, r9, r10) r11 = syz_open_procfs$userns(0x0, &(0x7f0000000040)) getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f0000000100)) r13 = getgid() fchown(r11, r12, r13) getresuid(&(0x7f0000000380)=0x0, &(0x7f00000003c0), &(0x7f0000000480)) r15 = socket$netlink(0x10, 0x3, 0x6) r16 = signalfd4(r1, &(0x7f00000004c0), 0x8, 0x0) r17 = getpgid(0x0) getpgrp(r17) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000001c0)="27f029c1c6b59067ac2f80", 0xb}, {&(0x7f0000000200)="875e1136f56c7e931b30f54dd19626e5f451d757f0176d689a68375b96096befb8f4af9673632e665327c05ec8d12b2fbd72d43da1224a18697150657702600f9b78989a720ca1ed2911eb03b50f863a7072b74b4c81607015f3c72780befb62bbe46908ffb5e7410461df4b7c8ca7c0026199a1d57438eda2ccf4ed7b3f6bfe3c9514729f1468d759c8cda971f5c556d8d1227e64b4c5b4128e047dab4e282e7985fb33a09fd14bcc1804bb069d135605dd78553e4c3391c8665bdd72e4e8fb1b841f8c0cc7d440e53f95bc0955d9ee07e3ea243b0c481a709c3dfc2709fe585e0169e7df33e829bd12d02be0b65148d25eb468", 0xf4}, {&(0x7f0000000300)="39c17e60a273ea4e518b7a81557786699fa05665bc13", 0x16}], 0x3, &(0x7f0000000500)=[@rights={{0x18, 0x1, 0x1, [r1, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r4, r5, r6, r7, r2]}}, @cred={{0x1c, 0x1, 0x2, {0x0, r9, r13}}}, @cred={{0x1c, 0x1, 0x2, {0x0, r14, 0xee00}}}, @rights={{0x14, 0x1, 0x1, [r2]}}, @rights={{0x20, 0x1, 0x1, [r2, 0xffffffffffffffff, r15, r3]}}, @rights={{0x18, 0x1, 0x1, [r1, r16]}}, @cred={{0x1c, 0x1, 0x2, {r17, 0xee01, 0xee01}}}], 0xf0, 0x4000}, 0x24000014) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r3, 0x10e, 0x8, &(0x7f0000000140)=0x40, 0x4) 13:42:42 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xc, &(0x7f00000018c0), 0x4) 13:42:42 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000d00)={0x0, 0x0, &(0x7f00000002c0)=[{0x0}, {&(0x7f0000000180)={0x10}, 0x10}], 0x2}, 0x0) 13:42:42 executing program 0: r0 = inotify_init1(0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x85000ca2) 13:42:42 executing program 5: r0 = inotify_init1(0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x4000002) chmod(&(0x7f0000000100)='./file0\x00', 0x0) 13:42:42 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, &(0x7f0000000140)='V', 0x1, 0x481, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r2, 0x0) recvfrom$unix(r0, &(0x7f0000000180)=""/4109, 0x1003, 0x1, 0x0, 0xfe5c) 13:42:42 executing program 1: mremap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2000, 0x3, &(0x7f0000ffa000/0x2000)=nil) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x400000, 0x0, &(0x7f0000c00000/0x400000)=nil) 13:42:42 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x586203, 0x0) 13:42:42 executing program 5: r0 = inotify_init1(0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x4000002) chmod(&(0x7f0000000100)='./file0\x00', 0x0) 13:42:42 executing program 0: mq_open(&(0x7f0000000000)='BEN\x89\xfa\xff', 0x80, 0xa3, 0x0) 13:42:42 executing program 2: r0 = epoll_create(0x4) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) getpeername$netlink(r2, 0x0, &(0x7f0000000040)) [ 110.606418][ T6133] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6133 comm=syz-executor.3 13:42:42 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, &(0x7f0000000140)='V', 0x1, 0x481, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, r2, 0x0) recvfrom$unix(r0, &(0x7f0000000180)=""/4109, 0x1003, 0x1, 0x0, 0xfe5c) 13:42:42 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x902, 0x0) write$cgroup_type(r0, 0x0, 0x5) 13:42:42 executing program 3: mq_open(&(0x7f0000000080)='BEN\x89\xfa\xff', 0x800, 0x54, 0x0) 13:42:42 executing program 0: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000140), 0x8, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/class/dmi', 0x0, 0x0) fcntl$dupfd(r0, 0x0, r1) 13:42:42 executing program 5: r0 = inotify_init1(0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x4000002) chmod(&(0x7f0000000100)='./file0\x00', 0x0) 13:42:42 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, &(0x7f0000000140)='V', 0x1, 0x481, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, r2, 0x0) recvfrom$unix(r0, &(0x7f0000000180)=""/4109, 0x1003, 0x1, 0x0, 0xfe5c) 13:42:42 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/class/dmi', 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) dup3(r0, r1, 0x0) 13:42:42 executing program 3: mq_open(&(0x7f0000000000)='BEN\x89\xfa\xff', 0x80, 0xb3, 0x0) 13:42:42 executing program 1: mq_open(&(0x7f0000000000)='BEN\x89\xfa\xff', 0x0, 0xa3, 0x0) 13:42:42 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, 0x0, 0x0) 13:42:42 executing program 2: mq_open(&(0x7f0000000100)='BEN\x89\xfa\xff', 0x0, 0xe1, 0x0) 13:42:42 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, &(0x7f0000000140)='V', 0x1, 0x481, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, r2, 0x0) recvfrom$unix(r0, &(0x7f0000000180)=""/4109, 0x1003, 0x1, 0x0, 0xfe5c) 13:42:42 executing program 5: r0 = inotify_init1(0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x4000002) chmod(&(0x7f0000000100)='./file0\x00', 0x0) 13:42:42 executing program 3: r0 = epoll_create(0x4) epoll_pwait(r0, &(0x7f0000000080)=[{}], 0x1, 0xc0, 0x0, 0x0) 13:42:42 executing program 1: mq_open(&(0x7f0000000100)='BEN\x89\xfa\xff', 0x0, 0xe3, &(0x7f0000000040)) 13:42:42 executing program 0: epoll_create(0x4) mq_open(&(0x7f0000000100)='BEN\x89\xfa\xff', 0x0, 0x163, &(0x7f0000000040)) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) ioctl$TUNGETVNETBE(0xffffffffffffffff, 0x800454df, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) shmctl$IPC_STAT(0x0, 0x2, 0x0) epoll_pwait(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 13:42:42 executing program 2: mq_open(&(0x7f0000000100)='BEN\x89\xfa\xff', 0x800, 0xe1, 0x0) 13:42:42 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r0, &(0x7f00000000c0)=""/99, 0x63, 0x0, 0x0, 0x0) 13:42:42 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, &(0x7f0000000140)='V', 0x1, 0x481, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, 0xffffffffffffffff, 0x0) recvfrom$unix(r0, &(0x7f0000000180)=""/4109, 0x1003, 0x1, 0x0, 0xfe5c) 13:42:42 executing program 1: mq_open(&(0x7f0000000000)='BEN\x89\xfa\xff', 0x80, 0x0, 0x0) 13:42:42 executing program 0: mq_open(&(0x7f0000001880)='trusted.overlay.opaque\x00', 0x0, 0x11a, &(0x7f00000018c0)) 13:42:42 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000001040), 0x0, 0x0, 0x3) 13:42:42 executing program 1: mq_open(&(0x7f00000002c0)='n\xb1\x15uX8\xc6\xc8&\v\n\x9e%\xd0\xe1ju\xe9\xe8\xf5\x049\xac\xceh\xbf*\xd8\x18,\x9a\xaas\xec\xd6%#\xac-\xe7\xbeIY,\x04EZ\x00-p\xee+jB\'\xc1\x1b+4k8\xf0\xa5\xdd>Bi\xbf~\xb9\x9a\xb7\xda\xf7\x13\xae\xc14_m\xa6\x99\xd6\x94\xc7\x824K\x18\x8e\xab\xa1\xfc\xebO\xd8\xfb#D\xff\xe6\a#J\xfcXX\x88|\xa6\xd3\xac1\a\xc0\x9c\xf7\x1c\x9f?[\xc4\x17%B4\xc5\x8bk8\xc8O\xa1\xdc\xf2\xa7(I\x9c\xeaU\xe9{A\x17K\xf6\xd6\xa0\xf7v\xf7|\xd5\xfc\xff\xc7\xa9\xbegh\xe2\x92\xb6O', 0x0, 0x0, 0x0) 13:42:42 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, &(0x7f0000000140)='V', 0x1, 0x481, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, 0xffffffffffffffff, 0x0) recvfrom$unix(r0, &(0x7f0000000180)=""/4109, 0x1003, 0x1, 0x0, 0xfe5c) 13:42:42 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/class/dmi', 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) write$P9_RLINK(r2, 0x0, 0x0) [ 110.855400][ T23] audit: type=1400 audit(1675777362.914:224): avc: denied { setattr } for pid=6187 comm="syz-executor.2" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:null_device_t tclass=chr_file permissive=1 13:42:43 executing program 3: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000140), 0x8, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/class/dmi', 0x0, 0x0) dup3(r0, r1, 0x0) 13:42:43 executing program 0: mq_open(&(0x7f0000000080)='BEN\x89\xfa\xff', 0x800, 0x0, 0x0) 13:42:43 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, &(0x7f0000000140)='V', 0x1, 0x481, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, 0xffffffffffffffff, 0x0) recvfrom$unix(r0, &(0x7f0000000180)=""/4109, 0x1003, 0x1, 0x0, 0xfe5c) 13:42:43 executing program 2: mq_open(&(0x7f0000001880)='trusted.overlay.opaque\x00', 0x40, 0x11a, &(0x7f00000018c0)) 13:42:43 executing program 5: r0 = mq_open(&(0x7f0000000100)='BEN\x89\xfa\xff', 0x0, 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/class/dmi', 0x0, 0x0) fcntl$dupfd(r1, 0x0, r0) 13:42:43 executing program 1: pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x0) read$watch_queue(r0, 0x0, 0x0) 13:42:43 executing program 2: r0 = epoll_create(0x4) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) write$P9_RLINK(r2, 0x0, 0x0) 13:42:43 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f0000000140)='V', 0x1, 0x481, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000180)=""/4109, 0x1003, 0x1, 0x0, 0xfe5c) 13:42:43 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/class/dmi', 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) write$cgroup_devices(r2, 0x0, 0x0) 13:42:43 executing program 3: mq_open(&(0x7f0000000100)='BEN\x89\xfa\xff', 0x0, 0xe3, 0x0) 13:42:43 executing program 1: r0 = epoll_create(0x8) pipe2(&(0x7f0000002200)={0xffffffffffffffff}, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000002240)) 13:42:43 executing program 2: mq_open(&(0x7f0000000000)='BEN\x89\xfa\xff', 0x40, 0xa3, 0x0) 13:42:43 executing program 3: r0 = mq_open(&(0x7f0000000100)='BEN\x89\xfa\xff', 0x0, 0x0, 0x0) preadv(r0, 0x0, 0x0, 0x0, 0x0) 13:42:43 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f0000000140)='V', 0x1, 0x481, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000180)=""/4109, 0x1003, 0x1, 0x0, 0xfe5c) 13:42:43 executing program 0: mq_open(&(0x7f0000000000)='BEN\x89\xfa\xff', 0x0, 0x1a1, 0x0) 13:42:43 executing program 5: r0 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000002280)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) fstat(r0, &(0x7f00000022c0)) 13:42:43 executing program 0: r0 = epoll_create(0x4) epoll_pwait2(r0, &(0x7f0000000080), 0x1, &(0x7f0000000000)={0x0, 0x3938700}, 0x0, 0xfffffffffffffc8f) 13:42:43 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)=@abs, 0x6e) 13:42:43 executing program 1: msgget$private(0x0, 0x491) 13:42:43 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$P9_RLINK(r0, 0xffffffffffffffff, 0x0) 13:42:43 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f0000000140)='V', 0x1, 0x481, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r1, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000180)=""/4109, 0x1003, 0x1, 0x0, 0xfe5c) 13:42:43 executing program 5: symlinkat(&(0x7f0000000080)='./file1\x00', 0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00') readlinkat(0xffffffffffffff9c, &(0x7f00000005c0)='./file1\x00', &(0x7f0000000600)=""/5, 0x5) 13:42:43 executing program 1: mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x100, 0x88) 13:42:43 executing program 3: mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f0000000000)='./file0\x00', 0x18000, 0x0) 13:42:43 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, &(0x7f0000000140)='V', 0x1, 0x481, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r2, 0x0) recvfrom$unix(r0, 0x0, 0x0, 0x1, 0x0, 0x0) 13:42:43 executing program 5: r0 = epoll_create(0x4) r1 = mq_open(&(0x7f0000000000)='+\x00', 0x43, 0x62, &(0x7f0000000040)={0x100, 0x8001, 0x6, 0xa5}) fcntl$setflags(r1, 0x2, 0x0) epoll_pwait(r0, &(0x7f0000001580)=[{}], 0x1, 0xaf53, 0x0, 0x0) 13:42:43 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xc, [@fwd={0xa}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000000340)=""/201, 0x1000000, 0xc9, 0x1}, 0x20) 13:42:43 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, &(0x7f0000000140)='V', 0x1, 0x481, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r2, 0x0) recvfrom$unix(r0, 0x0, 0x0, 0x1, 0x0, 0x0) 13:42:43 executing program 0: mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1000, 0x0) open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f0000000300)='./file0\x00', 0x282, 0x0) 13:42:44 executing program 2: mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x1000, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x101041, 0x0) 13:42:44 executing program 3: symlinkat(&(0x7f0000000080)='./file1\x00', 0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00') linkat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x400) 13:42:44 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$P9_RRENAMEAT(r0, 0x0, 0xfffffffffffffda9) 13:42:44 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, &(0x7f0000000140)='V', 0x1, 0x481, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r2, 0x0) recvfrom$unix(r0, 0x0, 0x0, 0x1, 0x0, 0x0) 13:42:44 executing program 0: mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f0000000180)='./file0\x00', 0x4002, 0x70) 13:42:44 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, &(0x7f0000000140)='V', 0x1, 0x481, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r2, 0x0) recvfrom$unix(r0, &(0x7f0000000180)=""/4109, 0x1003, 0x0, 0x0, 0xfe5c) 13:42:44 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x0, [], 0xa}}, &(0x7f0000000340)=""/201, 0x1a, 0xc9, 0x1}, 0x20) 13:42:44 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) 13:42:44 executing program 5: r0 = epoll_create(0x4) r1 = mq_open(&(0x7f0000000000)='+\x00', 0x43, 0x62, &(0x7f0000000040)={0x100, 0x8001, 0x6, 0xa5}) fcntl$setflags(r1, 0x2, 0x0) epoll_pwait(r0, &(0x7f0000001580)=[{}], 0x1, 0xaf53, 0x0, 0x0) 13:42:44 executing program 3: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x810, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) 13:42:44 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000a7e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000003b810000c50000006d000000850000005000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='ext4_request_blocks\x00', r1}, 0x10) 13:42:44 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0x17, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x0, 0xa, 0xfffffffffffffff0}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:42:44 executing program 2: mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x1000, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x101041, 0x0) 13:42:44 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000004ac0), 0x400, 0x0) 13:42:44 executing program 0: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x777c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001440)=ANY=[@ANYBLOB="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"/1846], &(0x7f0000000340)='syzkaller\x00'}, 0x48) write$cgroup_devices(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0xfffff801, 0xffffffff, 0x9, 0x700, 0xffffffffffffffff, 0xc, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x5, 0x3}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = bpf$MAP_CREATE(0x1200000000000000, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000005c0)={0xffffffffffffffff, &(0x7f0000000480), 0x0}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000940)={0x18, 0x2, &(0x7f0000000200)=@raw=[@map_val={0x18, 0x0, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x7ff}], &(0x7f0000000240)='syzkaller\x00', 0x3, 0x0, 0x0, 0x41000, 0x1, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000500)={0x9, 0x1}, 0x8, 0x10, &(0x7f00000008c0)={0x5, 0xc, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000900)=[r1, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000780)={&(0x7f00000006c0)='./file0\x00'}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)={&(0x7f00000007c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socketpair(0x11, 0x2, 0x300, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)=0x7) bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) [ 112.695567][ T23] audit: type=1400 audit(1675777364.754:225): avc: denied { kernel } for pid=6273 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 13:42:44 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x777c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001440)=ANY=[@ANYBLOB="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"/1846], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x22, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) socketpair(0x11, 0x2, 0x300, &(0x7f0000000240)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000005c0)={0xffffffffffffffff, &(0x7f0000000480), 0x0}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000b80)={0xffffffffffffffff, 0xe0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000500)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000009c0), &(0x7f0000000a00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000a40)}}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0x22, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x1, &(0x7f0000001e00)=ANY=[@ANYBLOB="9433c5f204000000d97ea51d598194557587981266c8c69d0878421b73951d87565d349e9269a7e7faad8d707aeeb4da61605439e0ad054c3d1aed9ac39800afac702f0191c84e95e8773f60b81b0aac91a12cae15b4590a01981b91cf17e9c54a887f75c5c17f68892d4152f1985a16c5ebd5e4d399234a934761a417905fc74db89ff14498fb48226b6c78a055a263dcbe0b"], &(0x7f0000000240)='GPL\x00', 0x9, 0x0, 0x0, 0x41000, 0x4, '\x00', r2, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000c00)={0x5, 0x6, 0xb93, 0xe41}, 0x10, 0x5f8a, r3, 0x0, &(0x7f0000000c40)}, 0x80) r4 = bpf$MAP_CREATE(0x1200000000000000, &(0x7f0000000000)=@base={0x5, 0x2, 0x7, 0x1ff, 0x0, 0x1}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000005c0)={r4, &(0x7f0000000480), 0x0}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000940)={0x18, 0x4, &(0x7f0000000200)=@raw=[@map_idx, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7ff}], &(0x7f0000000240)='syzkaller\x00', 0x3, 0xaf, &(0x7f0000000340)=""/175, 0x41000, 0x1, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x9, 0x1}, 0x8, 0x10, &(0x7f00000008c0)={0x5, 0xc, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000900)=[0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={0xffffffffffffffff, 0x115, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000880)={&(0x7f0000000840)='./file0\x00'}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0xfffff801, 0xffffffff, 0x9, 0x700, 0xffffffffffffffff, 0xc, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x5, 0x3}, 0x48) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) r6 = bpf$MAP_CREATE(0x1200000000000000, &(0x7f0000000000)=@base={0x5, 0x2, 0x7, 0x1ff, 0x0, 0x1}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000005c0)={r6, &(0x7f0000000480), 0x0}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000b80)={0xffffffffffffffff, 0xe0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000500)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000009c0), &(0x7f0000000a00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000a40)}}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r8, 0x18000000000002a0, 0x22, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x1, &(0x7f0000001e00)=ANY=[@ANYBLOB="9433c5f204000000d97ea51d598194557587981266c8c69d0878421b73951d87565d349e9269a7e7faad8d707aeeb4da61605439e0ad054c3d1aed9ac39800afac702f0191c84e95e8773f60b81b0aac91a12cae15b4590a01981b91cf17e9c54a887f75c5c17f68892d4152f1985a16c5ebd5e4d399234a934761a417905fc74db89ff14498fb48226b6c78a055a263dcbe0b"], &(0x7f0000000240)='GPL\x00', 0x9, 0x0, 0x0, 0x41000, 0x4, '\x00', r7, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000c00)={0x5, 0x6, 0xb93, 0xe41}, 0x10, 0x5f8a, r8, 0x0, &(0x7f0000000c40)}, 0x80) bpf$MAP_CREATE(0x1200000000000000, &(0x7f0000000000)=@base={0x5, 0x2, 0x7, 0x1ff, 0x0, 0x1}, 0x48) openat$cgroup_ro(r0, &(0x7f0000000040)='blkio.bfq.empty_time\x00', 0x0, 0x0) 13:42:44 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002880)={0x18, 0x3, &(0x7f0000002680)=@framed, &(0x7f0000002700)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:42:45 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, &(0x7f0000000140)='V', 0x1, 0x481, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r2, 0x0) recvfrom$unix(r0, &(0x7f0000000180)=""/4109, 0x1003, 0x0, 0x0, 0xfe5c) 13:42:45 executing program 2: perf_event_open(&(0x7f0000000080)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:42:45 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@fwd={0x0, 0x2}]}}, &(0x7f0000000340)=""/201, 0x26, 0xc9, 0x1}, 0x20) 13:42:45 executing program 5: r0 = epoll_create(0x4) r1 = mq_open(&(0x7f0000000000)='+\x00', 0x43, 0x62, &(0x7f0000000040)={0x100, 0x8001, 0x6, 0xa5}) fcntl$setflags(r1, 0x2, 0x0) epoll_pwait(r0, &(0x7f0000001580)=[{}], 0x1, 0xaf53, 0x0, 0x0) 13:42:45 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x421, &(0x7f0000000340)='bdev!)-%+wl`n\x00posi\x19Mx_dxl_acc\xe5sszQ\tU\x97\x12=J\xd5\x8b;B\xe3\x1a\x17f\xb2@\x8a\x8b6\xff\xff\xff\x01fE\xaea\x10{\xac\xa9+V\x863Hhk{2\x00\x14I\xf7\xb6\xcd)\x05\x87q6\xed~\xd0\xb2\xf8\x8d*\b\xe4\"\x1e\xbf\x8f_[\x17@\xe5\xec\x10\a\xb95w\x8byx/J\xb3\xaa\xd4W\xd2\xedN\x8cw\xe6\x99\xfe \x84]8\x940U\xb3E;\xff\xa1!\x9a\x87\x88\x02\xbf\xab\x97B\xd9\x06\xf2\n\xf7\x1f\xd8v\x7fD\xf2\x87\xf7}V\x89}\xf0\xb7\x8d\x85\xf6\x9b\xcc\xd3Lh.\r\xd3J\"\x1f\xdeW;F.\xdf$\xee\x18\x0e5\xa1\xfcN\x88`\xbbj \xaf<\xf1\xbe`4,q[M\xb0-\xd0\x8cloB\x91&\xf3\x97\xd7-\xb78\\\x90/\x9b\xf0\xccr\xc1\xa8\x85E\x85p+\xd1\xbe\x10\rgx\xb8\x93k|\x8d\xc7x\x01\x0e\xb4~\xb2\xdeQ\xdf\x8c\x1dTi\xafq\xde\xe4c&\x99\xd6psf\xa8\xacjh9\x8bk\x8f\n$\xf2\x06#\xc8\xd2\x00\x00w\x03,\xbb\xed\xf1o\xd8\x19\xd2\x1d\xbb\xd3\x18E\x0e&\x83\xdfWL?P$\xb4a\f\x154\xdd\xacx\x91<\x97\x13\xab\xe2\xdd\n\x13\x19\xb9U\n\xb5\xb6\xffBQ\x80\xe6\xe6\xaf\x06\xcd/\x87\x11\xf1\xb9\xbe&,c\xfd3\xc4\xeaP\x9b\xe25\xcc\xa4RDx\xad\xc0\x8f|\xe3u\xbe\x1e\xd5\xa6\xcc\xb8\x86\x8b0\'\xcc\x01\x9bQ/\xf9\xa7vfa\xdf!\x1axt\xd1\r\xd9&MC\xcc,2\xce\xd2kCJ\x10\x88\x00\x00\x00\x00\x00\x00\x00\x00\xc1b\xbc\\l$+ne\x8a\xa3\xcc\x88\xda\xea\x9f\xc4\x17{=2{2\xf9i\x06\x06u\xe6&\x90\bu\x00\x00\x00\x00\x00\x00\n\xf07~\xa8\xc5\x05\xa5\x03\xc0\xb5r$q@\xe4\xc7\xa1B>\xfe\x03s\a\x1b4k\x80\x1e\xe1\x87\xb0\x9b\xb7aS\x9b\x04x\xb2\x1f\xa2\x00\x1f\x80R\xf2b\xc9+\xe6\x88\xf5\xff\x88#\xd0\xe4\xf5z\xa7#c\xe4!4N\xbf\x8ar\x8e\x1c\x11=\x8b\xf8G\xfc )\r\xbe\x1e\xae\x14@\xa9\x94\xa95i\x91\x87\x10\x18\x92UMW\xc6\xd4n\xa1\x1a\xdf\xe6H\x1b\xae\x02S\v\xb9A\xd3\xee\x9f\xd3{\xd1v\x06\xaa\xaa.\b\xef\x86\x17\x1c\x80\xa4\v\xf4\xe6:\xf4\xab\x1f\xb1\xf9\xdf\xab\xc5I \xc9v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x004\xe7\xb6\xc2>\xc3\xa4@\xbb\xb3\xed\xba\rr\xf05\xd4\xfep{\xc58\x95\xdf\x06v\xd8\xea\xac{Q\x8f\xa9\x0e\x12\xd3%u\x1f;\xb6\x88\xe8\xf6\xe4$%\x8b\x00Uw\x8b\xed\xbf\xbb)\xc6\x82\xd2\x1a\xa7\x8e\xff\x1c4\x90\xd3\xea\xb2!m\x98\x95x>\xcb\xe9\xa5\x92\x84g\n\xef$\\\xe7Y\x82B\xcch\x06\x17\x82\x11A\xaab\xf6h\xde\x87O\xf2w\x94\xbb1\xb0\xe9\x80\xf0\x85\xb8\xeb\x19v\xe0\xcb\xf6\xcd@%I\x03n\xe3\xf5\xa6\x8c\x1d\xf1\xc1\xb1\x7f=\'\xd3\xec;|\x04>z\xf6}\x01\xa8\xd8k\xed\xd5\b\xd9i\xcb\x12\x96}\xd4\xb2\xd0\xc8\xf1\xf4\xc4\xb0(\xd0\xf3\t#e\xd1\r:\xef\xec\n\xc3\xad<\"\xa8\x0e\x98\xc9\x97\"\xb1\xd4G\xc5~C\x98\x04\xe2\xec\x98\xf4\x11\x81\ag`\x88^6i}\xc4\xbduI\xf9\xbb\xcc\xac\xcd\x1a\xc2\xbe$\xb58\xc3v|\xbf\rx\xf4\xe1\xa57P\xb24\xa1}\x8e\xaaC\xd3\xdb\x93\xee\xb1y\xc1\xfb\x9b\x02\xdd\"\xdf\xb2P\x0f1\xcf\xf3/cl\x85K\xa2\xc8om\"\x80vh~\xd4\n\xa2\x02\xea+B\x8a+#n\x8fGP\xa8Vj\xa9\x00\xcf\xac\x17\xe0]\\\x9b\xcbiU\x88\xef\x98\xba\xb0xLb\x12\x934\x0f\x98\"o\x1d\xa0J\x87y8oW\xeeE\xf1\xdf0U\xad\xae\x9e\\f\xd7\x8b\x14\x971Q\xc4\xd7\x16\x9cZD\xfc\xf4y\xfe<\xb0\xban\xde\xa0\xaf\x02eC\xad\xcf\xb7x\x10T\x9a\xca\x12\xb7\xe8J@\xcd\xef\xea\x88\x8c\xd2\x15N\x18UK\xe5i\xd9\x8b\xe2\xc6\xf00\xdfd\xfd7\xb3\xd9\xd3l\x00'/1057}, 0x30) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, 0x0, &(0x7f0000000140)=""/235}, 0x20) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40305828, &(0x7f0000000040)) 13:42:45 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x777c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001440)=ANY=[@ANYBLOB="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"/1846], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x22, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) socketpair(0x11, 0x2, 0x300, &(0x7f0000000240)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000005c0)={0xffffffffffffffff, &(0x7f0000000480), 0x0}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000b80)={0xffffffffffffffff, 0xe0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000500)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000009c0), &(0x7f0000000a00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000a40)}}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0x22, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x1, &(0x7f0000001e00)=ANY=[@ANYBLOB="9433c5f204000000d97ea51d598194557587981266c8c69d0878421b73951d87565d349e9269a7e7faad8d707aeeb4da61605439e0ad054c3d1aed9ac39800afac702f0191c84e95e8773f60b81b0aac91a12cae15b4590a01981b91cf17e9c54a887f75c5c17f68892d4152f1985a16c5ebd5e4d399234a934761a417905fc74db89ff14498fb48226b6c78a055a263dcbe0b"], &(0x7f0000000240)='GPL\x00', 0x9, 0x0, 0x0, 0x41000, 0x4, '\x00', r2, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000c00)={0x5, 0x6, 0xb93, 0xe41}, 0x10, 0x5f8a, r3, 0x0, &(0x7f0000000c40)}, 0x80) r4 = bpf$MAP_CREATE(0x1200000000000000, &(0x7f0000000000)=@base={0x5, 0x2, 0x7, 0x1ff, 0x0, 0x1}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000005c0)={r4, &(0x7f0000000480), 0x0}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000940)={0x18, 0x4, &(0x7f0000000200)=@raw=[@map_idx, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7ff}], &(0x7f0000000240)='syzkaller\x00', 0x3, 0xaf, &(0x7f0000000340)=""/175, 0x41000, 0x1, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x9, 0x1}, 0x8, 0x10, &(0x7f00000008c0)={0x5, 0xc, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000900)=[0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={0xffffffffffffffff, 0x115, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000880)={&(0x7f0000000840)='./file0\x00'}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0xfffff801, 0xffffffff, 0x9, 0x700, 0xffffffffffffffff, 0xc, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x5, 0x3}, 0x48) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) r6 = bpf$MAP_CREATE(0x1200000000000000, &(0x7f0000000000)=@base={0x5, 0x2, 0x7, 0x1ff, 0x0, 0x1}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000005c0)={r6, &(0x7f0000000480), 0x0}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000b80)={0xffffffffffffffff, 0xe0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000500)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000009c0), &(0x7f0000000a00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000a40)}}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcd0cdfa146ec561750379585e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b3185fec0e07004e1a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c11160fb20b1c581e7be6ba0dc001c4110555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab3aa32f948c06b59b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697aeea0182babd18cae1bd4f4390af9a9ceafd07ed00b0000002cab154ad029a1090000002780870014f51c3c975d5aec84222fff0d7216fdb0d3a0ec4be3e563112f0b39501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a2a71bc85018e5ff2c910496f18afc9ffc2cc788bee1b47683db01a469398685211bbae3e26d0a50e7313bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcd36e7487afa447e2edfae4f390a7237841cef384b22cc22ee17476d738952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d3ae486aca54183fb01c73f979ca9857399537f5dc2acb72c7ead0509d380578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a088a22e8b15c3e233db7ab22e30d46a9624d37c10223fdae7ed04935c3c90d3add8eebc8619d73415cda2130f5011e48455b5a8b90dfae158b94f50adab988dd8e12baf5cc9398fff00404d5d99f82e20ee6a8c88e18c2977aab37d9ac4cfc1c74f0e2a9bf62ffec6459db40000000000000007ff57c39495c826b956ba859ac8e3c177b91bd7d5e41ff868f7ca1664fe2f3ced84680900000000000000d16d7d9158ffffffff00000000ef069dc42749289f854797f2f900c2a12d8c38a967c1bbe09315c29877a331bcc87dc3addb08141bdee5d27874b1f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a9e90d767671414c99d4894edff8249dc1e3428d2129369ee1b85af1eb2eea0d0df414b315f651c8412392191fa83ee830548f11e1038debd64cbe359454a3f2239cfe35f81b7aded448859968ff0e90500d0b07c0dd00490f167e6d5c1109681739dc33f75b2042b8ff8c21ad702cca54728acad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92052188bd20785f653b621491dc6aaee0d40973109644fb94c06006e3c1be2f633c1d987591ec3db58a7bb3042ec3f771f7a1338a5c3dd35e926049fe86e09c58e273cd905deb28c13c1ed1c0d9cae846bcbfa8cce7b893e1590bab105b0cb578af7dc7d5e87d4cd376444e2de02f47c61e8e84ff828de453f3489460fd83210e95307e676e1fb4d5865c0ca177a4c7fbb4e62b445c00f576b2b5cc7f819abd0f885cc4806f47ffb966fcf1e54f5a2d38708194cd6f496e5dee734fe7da3770845cf442d488afdc0e17000000000000000000000000000000000000000000000000000005205000000dc1c56d59f35d3676329a18cda690d192a070886df42b2708398773b45198b4a34ac977ebd4450e121d01342703f5bf030e935878a6d169cdfaa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c30930804fdc3690d10ecb65dc5b47481edbf1eee2e8893e903054d16d29c28eb5167e9936ed327fb237a56224e49d9ea955a5f0dec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf817becd9e5a225d67521d1128eac7d80a6225c3e2f0932223bfbf69ff861f4394836ddf128d6d19079e64336e09000000c78ad67548f4b192be1827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429a863903ca75f4c7df3ea8fc2018d07af1491ef060cd4403a099f324661fdcfa68f65bd06b4082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b98a8bf6c747d9a1cc500bb892c3a16ff10feea20bdac89afb758cf350000000000000000000000000200000000000000ed713df0c59e38928511a64845f1b21ed03369719fa905909d8ce35b42761c46d040e53a0a227e9cecd4d414231baa4894a13763ea5de7a52e61a588babaf5da9a28f477e032400938116cb294447898039724881de3ba3dd5e5e115b58d438b17ad11bf1b1f1ed057d89ec46b2b9bb434e9187a728d1136333958469b22d2126664b5299cc3167ac9a4d501638b978e1c692da5261dae5c9d13065b8ed8b358e7273dfa1e9a8dc1d16aa1edd0c274dedb7cd7e4753c152b4e0e3d124e561420587b9b00ab68c32d6b397c5e7cc4e803e6b6e8ed547e2875372023d111e64cd9ee3635888ecbc7352fd60f348456d74e9e7c09ee202dd09524ecfd3d8c836c0a13a9a45a7e2cec88fa2710ee35cded1b824fe4fe68849eee41b5e335aeec0f27053b3a07a001ffe29c5cc3a0ccdcc74330c2a995378d225495c5"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r8, 0x18000000000002a0, 0x22, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x1, &(0x7f0000001e00)=ANY=[@ANYBLOB="9433c5f204000000d97ea51d598194557587981266c8c69d0878421b73951d87565d349e9269a7e7faad8d707aeeb4da61605439e0ad054c3d1aed9ac39800afac702f0191c84e95e8773f60b81b0aac91a12cae15b4590a01981b91cf17e9c54a887f75c5c17f68892d4152f1985a16c5ebd5e4d399234a934761a417905fc74db89ff14498fb48226b6c78a055a263dcbe0b"], &(0x7f0000000240)='GPL\x00', 0x9, 0x0, 0x0, 0x41000, 0x4, '\x00', r7, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000c00)={0x5, 0x6, 0xb93, 0xe41}, 0x10, 0x5f8a, r8, 0x0, &(0x7f0000000c40)}, 0x80) bpf$MAP_CREATE(0x1200000000000000, &(0x7f0000000000)=@base={0x5, 0x2, 0x7, 0x1ff, 0x0, 0x1}, 0x48) openat$cgroup_ro(r0, &(0x7f0000000040)='blkio.bfq.empty_time\x00', 0x0, 0x0) 13:42:45 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xb, [@fwd={0xa}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000340)=""/201, 0x2f, 0xc9, 0x1}, 0x20) 13:42:45 executing program 1: openat$tun(0xffffffffffffff9c, &(0x7f0000000340), 0x4000, 0x0) 13:42:45 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000040), 0x12) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6628, 0x0) 13:42:45 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000018c00)={0x18, 0x3, &(0x7f0000000a00)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000440)='GPL\x00', 0x4, 0xb0, &(0x7f0000000480)=""/176, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000000c0)='fsi_master_gpio_cmd_abs_addr\x00', r0}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 13:42:45 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x421, &(0x7f0000000340)='bdev!)-%+wl`n\x00posi\x19Mx_dxl_acc\xe5sszQ\tU\x97\x12=J\xd5\x8b;B\xe3\x1a\x17f\xb2@\x8a\x8b6\xff\xff\xff\x01fE\xaea\x10{\xac\xa9+V\x863Hhk{2\x00\x14I\xf7\xb6\xcd)\x05\x87q6\xed~\xd0\xb2\xf8\x8d*\b\xe4\"\x1e\xbf\x8f_[\x17@\xe5\xec\x10\a\xb95w\x8byx/J\xb3\xaa\xd4W\xd2\xedN\x8cw\xe6\x99\xfe \x84]8\x940U\xb3E;\xff\xa1!\x9a\x87\x88\x02\xbf\xab\x97B\xd9\x06\xf2\n\xf7\x1f\xd8v\x7fD\xf2\x87\xf7}V\x89}\xf0\xb7\x8d\x85\xf6\x9b\xcc\xd3Lh.\r\xd3J\"\x1f\xdeW;F.\xdf$\xee\x18\x0e5\xa1\xfcN\x88`\xbbj \xaf<\xf1\xbe`4,q[M\xb0-\xd0\x8cloB\x91&\xf3\x97\xd7-\xb78\\\x90/\x9b\xf0\xccr\xc1\xa8\x85E\x85p+\xd1\xbe\x10\rgx\xb8\x93k|\x8d\xc7x\x01\x0e\xb4~\xb2\xdeQ\xdf\x8c\x1dTi\xafq\xde\xe4c&\x99\xd6psf\xa8\xacjh9\x8bk\x8f\n$\xf2\x06#\xc8\xd2\x00\x00w\x03,\xbb\xed\xf1o\xd8\x19\xd2\x1d\xbb\xd3\x18E\x0e&\x83\xdfWL?P$\xb4a\f\x154\xdd\xacx\x91<\x97\x13\xab\xe2\xdd\n\x13\x19\xb9U\n\xb5\xb6\xffBQ\x80\xe6\xe6\xaf\x06\xcd/\x87\x11\xf1\xb9\xbe&,c\xfd3\xc4\xeaP\x9b\xe25\xcc\xa4RDx\xad\xc0\x8f|\xe3u\xbe\x1e\xd5\xa6\xcc\xb8\x86\x8b0\'\xcc\x01\x9bQ/\xf9\xa7vfa\xdf!\x1axt\xd1\r\xd9&MC\xcc,2\xce\xd2kCJ\x10\x88\x00\x00\x00\x00\x00\x00\x00\x00\xc1b\xbc\\l$+ne\x8a\xa3\xcc\x88\xda\xea\x9f\xc4\x17{=2{2\xf9i\x06\x06u\xe6&\x90\bu\x00\x00\x00\x00\x00\x00\n\xf07~\xa8\xc5\x05\xa5\x03\xc0\xb5r$q@\xe4\xc7\xa1B>\xfe\x03s\a\x1b4k\x80\x1e\xe1\x87\xb0\x9b\xb7aS\x9b\x04x\xb2\x1f\xa2\x00\x1f\x80R\xf2b\xc9+\xe6\x88\xf5\xff\x88#\xd0\xe4\xf5z\xa7#c\xe4!4N\xbf\x8ar\x8e\x1c\x11=\x8b\xf8G\xfc )\r\xbe\x1e\xae\x14@\xa9\x94\xa95i\x91\x87\x10\x18\x92UMW\xc6\xd4n\xa1\x1a\xdf\xe6H\x1b\xae\x02S\v\xb9A\xd3\xee\x9f\xd3{\xd1v\x06\xaa\xaa.\b\xef\x86\x17\x1c\x80\xa4\v\xf4\xe6:\xf4\xab\x1f\xb1\xf9\xdf\xab\xc5I \xc9v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x004\xe7\xb6\xc2>\xc3\xa4@\xbb\xb3\xed\xba\rr\xf05\xd4\xfep{\xc58\x95\xdf\x06v\xd8\xea\xac{Q\x8f\xa9\x0e\x12\xd3%u\x1f;\xb6\x88\xe8\xf6\xe4$%\x8b\x00Uw\x8b\xed\xbf\xbb)\xc6\x82\xd2\x1a\xa7\x8e\xff\x1c4\x90\xd3\xea\xb2!m\x98\x95x>\xcb\xe9\xa5\x92\x84g\n\xef$\\\xe7Y\x82B\xcch\x06\x17\x82\x11A\xaab\xf6h\xde\x87O\xf2w\x94\xbb1\xb0\xe9\x80\xf0\x85\xb8\xeb\x19v\xe0\xcb\xf6\xcd@%I\x03n\xe3\xf5\xa6\x8c\x1d\xf1\xc1\xb1\x7f=\'\xd3\xec;|\x04>z\xf6}\x01\xa8\xd8k\xed\xd5\b\xd9i\xcb\x12\x96}\xd4\xb2\xd0\xc8\xf1\xf4\xc4\xb0(\xd0\xf3\t#e\xd1\r:\xef\xec\n\xc3\xad<\"\xa8\x0e\x98\xc9\x97\"\xb1\xd4G\xc5~C\x98\x04\xe2\xec\x98\xf4\x11\x81\ag`\x88^6i}\xc4\xbduI\xf9\xbb\xcc\xac\xcd\x1a\xc2\xbe$\xb58\xc3v|\xbf\rx\xf4\xe1\xa57P\xb24\xa1}\x8e\xaaC\xd3\xdb\x93\xee\xb1y\xc1\xfb\x9b\x02\xdd\"\xdf\xb2P\x0f1\xcf\xf3/cl\x85K\xa2\xc8om\"\x80vh~\xd4\n\xa2\x02\xea+B\x8a+#n\x8fGP\xa8Vj\xa9\x00\xcf\xac\x17\xe0]\\\x9b\xcbiU\x88\xef\x98\xba\xb0xLb\x12\x934\x0f\x98\"o\x1d\xa0J\x87y8oW\xeeE\xf1\xdf0U\xad\xae\x9e\\f\xd7\x8b\x14\x971Q\xc4\xd7\x16\x9cZD\xfc\xf4y\xfe<\xb0\xban\xde\xa0\xaf\x02eC\xad\xcf\xb7x\x10T\x9a\xca\x12\xb7\xe8J@\xcd\xef\xea\x88\x8c\xd2\x15N\x18UK\xe5i\xd9\x8b\xe2\xc6\xf00\xdfd\xfd7\xb3\xd9\xd3l\x00'/1057}, 0x30) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000800), 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40305828, &(0x7f0000000040)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 13:42:45 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x5, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) 13:42:46 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xc, [@fwd={0xa, 0x0, 0x0, 0xc}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000000340)=""/201, 0x30, 0xc9, 0x1}, 0x20) 13:42:46 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, &(0x7f0000000140)='V', 0x1, 0x481, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r2, 0x0) recvfrom$unix(r0, &(0x7f0000000180)=""/4109, 0x1003, 0x0, 0x0, 0xfe5c) 13:42:46 executing program 1: syz_clone(0x12003080, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a00)="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") 13:42:46 executing program 5: r0 = epoll_create(0x4) r1 = mq_open(&(0x7f0000000000)='+\x00', 0x43, 0x62, &(0x7f0000000040)={0x100, 0x8001, 0x6, 0xa5}) fcntl$setflags(r1, 0x2, 0x0) epoll_pwait(r0, &(0x7f0000001580)=[{}], 0x1, 0xaf53, 0x0, 0x0) 13:42:46 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x421, &(0x7f0000000340)='bdev!)-%+wl`n\x00posi\x19Mx_dxl_acc\xe5sszQ\tU\x97\x12=J\xd5\x8b;B\xe3\x1a\x17f\xb2@\x8a\x8b6\xff\xff\xff\x01fE\xaea\x10{\xac\xa9+V\x863Hhk{2\x00\x14I\xf7\xb6\xcd)\x05\x87q6\xed~\xd0\xb2\xf8\x8d*\b\xe4\"\x1e\xbf\x8f_[\x17@\xe5\xec\x10\a\xb95w\x8byx/J\xb3\xaa\xd4W\xd2\xedN\x8cw\xe6\x99\xfe \x84]8\x940U\xb3E;\xff\xa1!\x9a\x87\x88\x02\xbf\xab\x97B\xd9\x06\xf2\n\xf7\x1f\xd8v\x7fD\xf2\x87\xf7}V\x89}\xf0\xb7\x8d\x85\xf6\x9b\xcc\xd3Lh.\r\xd3J\"\x1f\xdeW;F.\xdf$\xee\x18\x0e5\xa1\xfcN\x88`\xbbj \xaf<\xf1\xbe`4,q[M\xb0-\xd0\x8cloB\x91&\xf3\x97\xd7-\xb78\\\x90/\x9b\xf0\xccr\xc1\xa8\x85E\x85p+\xd1\xbe\x10\rgx\xb8\x93k|\x8d\xc7x\x01\x0e\xb4~\xb2\xdeQ\xdf\x8c\x1dTi\xafq\xde\xe4c&\x99\xd6psf\xa8\xacjh9\x8bk\x8f\n$\xf2\x06#\xc8\xd2\x00\x00w\x03,\xbb\xed\xf1o\xd8\x19\xd2\x1d\xbb\xd3\x18E\x0e&\x83\xdfWL?P$\xb4a\f\x154\xdd\xacx\x91<\x97\x13\xab\xe2\xdd\n\x13\x19\xb9U\n\xb5\xb6\xffBQ\x80\xe6\xe6\xaf\x06\xcd/\x87\x11\xf1\xb9\xbe&,c\xfd3\xc4\xeaP\x9b\xe25\xcc\xa4RDx\xad\xc0\x8f|\xe3u\xbe\x1e\xd5\xa6\xcc\xb8\x86\x8b0\'\xcc\x01\x9bQ/\xf9\xa7vfa\xdf!\x1axt\xd1\r\xd9&MC\xcc,2\xce\xd2kCJ\x10\x88\x00\x00\x00\x00\x00\x00\x00\x00\xc1b\xbc\\l$+ne\x8a\xa3\xcc\x88\xda\xea\x9f\xc4\x17{=2{2\xf9i\x06\x06u\xe6&\x90\bu\x00\x00\x00\x00\x00\x00\n\xf07~\xa8\xc5\x05\xa5\x03\xc0\xb5r$q@\xe4\xc7\xa1B>\xfe\x03s\a\x1b4k\x80\x1e\xe1\x87\xb0\x9b\xb7aS\x9b\x04x\xb2\x1f\xa2\x00\x1f\x80R\xf2b\xc9+\xe6\x88\xf5\xff\x88#\xd0\xe4\xf5z\xa7#c\xe4!4N\xbf\x8ar\x8e\x1c\x11=\x8b\xf8G\xfc )\r\xbe\x1e\xae\x14@\xa9\x94\xa95i\x91\x87\x10\x18\x92UMW\xc6\xd4n\xa1\x1a\xdf\xe6H\x1b\xae\x02S\v\xb9A\xd3\xee\x9f\xd3{\xd1v\x06\xaa\xaa.\b\xef\x86\x17\x1c\x80\xa4\v\xf4\xe6:\xf4\xab\x1f\xb1\xf9\xdf\xab\xc5I \xc9v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x004\xe7\xb6\xc2>\xc3\xa4@\xbb\xb3\xed\xba\rr\xf05\xd4\xfep{\xc58\x95\xdf\x06v\xd8\xea\xac{Q\x8f\xa9\x0e\x12\xd3%u\x1f;\xb6\x88\xe8\xf6\xe4$%\x8b\x00Uw\x8b\xed\xbf\xbb)\xc6\x82\xd2\x1a\xa7\x8e\xff\x1c4\x90\xd3\xea\xb2!m\x98\x95x>\xcb\xe9\xa5\x92\x84g\n\xef$\\\xe7Y\x82B\xcch\x06\x17\x82\x11A\xaab\xf6h\xde\x87O\xf2w\x94\xbb1\xb0\xe9\x80\xf0\x85\xb8\xeb\x19v\xe0\xcb\xf6\xcd@%I\x03n\xe3\xf5\xa6\x8c\x1d\xf1\xc1\xb1\x7f=\'\xd3\xec;|\x04>z\xf6}\x01\xa8\xd8k\xed\xd5\b\xd9i\xcb\x12\x96}\xd4\xb2\xd0\xc8\xf1\xf4\xc4\xb0(\xd0\xf3\t#e\xd1\r:\xef\xec\n\xc3\xad<\"\xa8\x0e\x98\xc9\x97\"\xb1\xd4G\xc5~C\x98\x04\xe2\xec\x98\xf4\x11\x81\ag`\x88^6i}\xc4\xbduI\xf9\xbb\xcc\xac\xcd\x1a\xc2\xbe$\xb58\xc3v|\xbf\rx\xf4\xe1\xa57P\xb24\xa1}\x8e\xaaC\xd3\xdb\x93\xee\xb1y\xc1\xfb\x9b\x02\xdd\"\xdf\xb2P\x0f1\xcf\xf3/cl\x85K\xa2\xc8om\"\x80vh~\xd4\n\xa2\x02\xea+B\x8a+#n\x8fGP\xa8Vj\xa9\x00\xcf\xac\x17\xe0]\\\x9b\xcbiU\x88\xef\x98\xba\xb0xLb\x12\x934\x0f\x98\"o\x1d\xa0J\x87y8oW\xeeE\xf1\xdf0U\xad\xae\x9e\\f\xd7\x8b\x14\x971Q\xc4\xd7\x16\x9cZD\xfc\xf4y\xfe<\xb0\xban\xde\xa0\xaf\x02eC\xad\xcf\xb7x\x10T\x9a\xca\x12\xb7\xe8J@\xcd\xef\xea\x88\x8c\xd2\x15N\x18UK\xe5i\xd9\x8b\xe2\xc6\xf00\xdfd\xfd7\xb3\xd9\xd3l\x00'/1057}, 0x30) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000800), 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40305828, &(0x7f0000000040)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 13:42:46 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x777c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001440)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcd0cdfa146ec561750379585e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bdb2209c67deca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c581e7be6ba0dc001c4110555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697aeea0182babd18cae1bd4f4390af9a9ceafd0002cab154ad029a1090000002780870014f51c3c975d5aec84222fff0d7216fdb0d3a0ec4be3e563112f0b39501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a2a71bc85018e5ff2c910496f18afc9ffc2cc788bee1b47683db01a469398685211dfbbae3e2ed0a50e7313bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcd36e7487afa447e2edfae4f390a8337841cef386e22cc22ee17476d738952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d3ae486aca54183fb01c73f979ca9857399537f5dc2acb72e7ead0509d380578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a088a22e8b15c3e233db7ab22e30d46a9624d37c10223fdae7ed04935c3c90d3add8eebc8619d73415cda2130f5011e48455b5a8b90dfae158b94f50adab988dd8e12baf5cc9398fff00404d5d99f82e20ee6a8c88e18c2977aab37d9ac4cfc1c7b40000000000040007ff57c39495c826b956ba859ac8e3c177b91bd7d5e41ff868f7ca1664fe2f3ced846891180604b60c2499d16d7d9158ffffffff00000000ef069dc42749a89f854797f2f900c2a12d8c38a967c1bbe09315c29877a331bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a9e90d767671414c99d4894ee7f8249dc1e3428d2129369ee1b85af6eb2eea0d0df414b315f651c8412392191fa83ee830548f11e1038debd64cbe359454a3f2239cfe35f81b7a490f167e6d5c1109681739dc33f75b2042b8ff8c21ad702cca54728acad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92052188bd20785f653b621491dc6aaee0d40973109644fb94c06006eff1be2f633c1d987591ec3db58a7bb3042ec3f771f7a1338a5c3dd35e926049fe86e09c58e273cd905deb28c13c1ed1c0d9cae846bcbfa8cce7b893e1590bab105b0cb578af7dc7d5e87d44ff828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4e62b445c00f576b2b5cc7f819abd0f885cc4806f40300966fcf1e54f5a2d38708194cd6f496e5dee734fe7da3770845cf442d488afdc0e17000000000000000000000000000000000000000000000000000005205000000dc1c56d59f35d3676329bb8cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e121d01342703f5bf030e935878a6d169cdfaa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c3093c3690d10ecb65dc5b47481edbf1eee2e8893e903054d16d29c28eb5167e9936ed327fb237a56224e49d9ea955a5f0dec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf817becd9e5a225d67521dc728eac7d80a5656ac2cbde21d3ebfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be1827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429a863903ca75f4c7df3ea8fc2018d07af1491ef060cd4403a099f324661fdcfa68f65bd06b4082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea20bdac89bfb758cf35000000000000000000000000000000ca06f256c8028e0f9b65f037b21f3289f86a6826c69fa35ba5cbc3f2db1516ffc5c6e3fa618b24a6ce160fceecaab37b61fa0a2d8974e69115d33394e86e4b838297add6e1bf29ab029784ba20f96936b7e4746e92dea6c5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab900"/1846], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x22, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) socketpair(0x11, 0x2, 0x300, &(0x7f0000000240)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000005c0)={0xffffffffffffffff, &(0x7f0000000480), 0x0}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000b80)={0xffffffffffffffff, 0xe0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000500)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000009c0), &(0x7f0000000a00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000a40)}}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0x22, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x1, &(0x7f0000001e00)=ANY=[@ANYBLOB="9433c5f204000000d97ea51d598194557587981266c8c69d0878421b73951d87565d349e9269a7e7faad8d707aeeb4da61605439e0ad054c3d1aed9ac39800afac702f0191c84e95e8773f60b81b0aac91a12cae15b4590a01981b91cf17e9c54a887f75c5c17f68892d4152f1985a16c5ebd5e4d399234a934761a417905fc74db89ff14498fb48226b6c78a055a263dcbe0b"], &(0x7f0000000240)='GPL\x00', 0x9, 0x0, 0x0, 0x41000, 0x4, '\x00', r2, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000c00)={0x5, 0x6, 0xb93, 0xe41}, 0x10, 0x5f8a, r3, 0x0, &(0x7f0000000c40)}, 0x80) r4 = bpf$MAP_CREATE(0x1200000000000000, &(0x7f0000000000)=@base={0x5, 0x2, 0x7, 0x1ff, 0x0, 0x1}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000005c0)={r4, &(0x7f0000000480), 0x0}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000940)={0x18, 0x4, &(0x7f0000000200)=@raw=[@map_idx, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7ff}], &(0x7f0000000240)='syzkaller\x00', 0x3, 0xaf, &(0x7f0000000340)=""/175, 0x41000, 0x1, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x9, 0x1}, 0x8, 0x10, &(0x7f00000008c0)={0x5, 0xc, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000900)=[0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={0xffffffffffffffff, 0x115, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000880)={&(0x7f0000000840)='./file0\x00'}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0xfffff801, 0xffffffff, 0x9, 0x700, 0xffffffffffffffff, 0xc, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x5, 0x3}, 0x48) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) r6 = bpf$MAP_CREATE(0x1200000000000000, &(0x7f0000000000)=@base={0x5, 0x2, 0x7, 0x1ff, 0x0, 0x1}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000005c0)={r6, &(0x7f0000000480), 0x0}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000b80)={0xffffffffffffffff, 0xe0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000500)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000009c0), &(0x7f0000000a00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000a40)}}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r8, 0x18000000000002a0, 0x22, 0x60000000, &(0x7f0000000100)="b9ff03076044238cb89e14f008001be0ffff00004000630477fbac14140cac14140c62079f4b4d2f87e5feca6aab845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0xfe, 0x60000000}, 0x2c) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x1, &(0x7f0000001e00)=ANY=[@ANYBLOB="9433c5f204000000d97ea51d598194557587981266c8c69d0878421b73951d87565d349e9269a7e7faad8d707aeeb4da61605439e0ad054c3d1aed9ac39800afac702f0191c84e95e8773f60b81b0aac91a12cae15b4590a01981b91cf17e9c54a887f75c5c17f68892d4152f1985a16c5ebd5e4d399234a934761a417905fc74db89ff14498fb48226b6c78a055a263dcbe0b"], &(0x7f0000000240)='GPL\x00', 0x9, 0x0, 0x0, 0x41000, 0x4, '\x00', r7, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000c00)={0x5, 0x6, 0xb93, 0xe41}, 0x10, 0x5f8a, r8, 0x0, &(0x7f0000000c40)}, 0x80) bpf$MAP_CREATE(0x1200000000000000, &(0x7f0000000000)=@base={0x5, 0x2, 0x7, 0x1ff, 0x0, 0x1}, 0x48) openat$cgroup_ro(r0, &(0x7f0000000040)='blkio.bfq.empty_time\x00', 0x0, 0x0) 13:42:46 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000018c00)={0x18, 0x3, &(0x7f0000000a00)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000440)='GPL\x00', 0x4, 0xb0, &(0x7f0000000480)=""/176, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0x12) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x401c5820, &(0x7f0000000000)=0x8000) close(0xffffffffffffffff) 13:42:46 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='blkio.bfq.io_serviced\x00', 0x26e1, 0x0) close(0xffffffffffffffff) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='blkio.bfq.idle_time\x00', 0x26e1, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000880)='ip60\xb7\xb5\x04F\x13\x87\xa1\xe3d\xbdx\x95\xb7\x13i\xe3\xa0\\XJ~\xdaW\xe0\x03\xaa\xcd\x12\x91\x18\x15\xd1\xd5\xfbB\xd0\xe2\xfdS\x94.\x8f{(\xf9\x1f\xa6I\n\x17WE\x15\x1c\xabX>\x7f`\xde\xdb.\'\x9fpH\x0467\x9d\x01\xfe<\x02\x83\x99 \xfc^\xcb:\xcds\x89X\xcb\xd18\xb4\xea\x98\a\xeaB\xd4\x1e\xd0PB\x91\x15\xd3\xb8\xaf \xc6\x18\xf7\x84 z\x12\xdb\xbd\xce\xe6&\xe1;t\x82\x96\xe0Y\xe0\x85VGr=\xda\xdc\xd6\x9d\x0f\x98\xefZ5\xd2\xb7\x1e\xfa/\xc7isq\x9f\xeb\xf1\xd8l`\x06O\x81-\xdd\xb5\x12\xce?r\xe0\xfe\x02\xe2\xa8o\x1fRf\x18\fI\x99\xa6G\xc9\x86\xf1\xc3?%\xc7\x9c\xca\xb5a\xb2]\xc4\x11N\xbe\xc8\xed\xa5\x83\xd4\xc1\x00\xfa#O\xb6gR#\x19\xa9\xdf\x14\x1fc\x17.\xa0\xdd\xbf\x91)!\x9f\x98u\x85\xec>\xf6*\xbc\xaas\xd3\xae\xe6\x01\xeb\'\xc0\xd1e-$\x13K\x1ce\xd4*vX\xce?\xcf:\xe5\x88W') perf_event_open(&(0x7f0000000180)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000552d, 0x30414, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x83}, 0x0, 0x3b, 0x7d, 0x0, 0x4, 0x101, 0x745c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x4, 0x4e, 0x1, 0x0, 0x1ff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_config_ext={0x5, 0x200001}, 0x0, 0x40006, 0x10, 0x0, 0x9, 0x5026, 0xfff, 0x0, 0x4, 0x0, 0x3}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x3) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'dummy0\x00', 0x10}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan1\x00', 0x10}) r5 = bpf$ITER_CREATE(0x21, &(0x7f00000003c0)={r1}, 0x8) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000001a00)={0x0, &(0x7f0000000100)}) r6 = bpf$ITER_CREATE(0x21, &(0x7f00000019c0), 0xfffffffffffffe5f) recvmsg(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000540)=@l2tp={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000340)=[{&(0x7f0000001d00)=""/209, 0xd1}, {&(0x7f00000005c0)=""/92, 0x5c}, {&(0x7f0000001b00)=""/211, 0xd3}], 0x3, &(0x7f0000000640)=""/20, 0x14}, 0x121) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000440)='!&((\xa4\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000080)) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f00000009c0)=""/4096) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.io_serviced\x00', 0x0, 0x0) write$cgroup_int(r6, &(0x7f00000002c0), 0x12) perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0x4, 0x0, 0x0, 0x4, 0x0, 0x8000007, 0x73dc0ac7e45fd081, 0xc, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x9}, 0x4100a, 0x5, 0x88, 0x2, 0x1b, 0x7, 0x202, 0x0, 0x400007, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r5, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8923, &(0x7f0000000080)) socketpair(0x1, 0x1, 0x20000, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8923, &(0x7f0000000080)) sendmsg$inet(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000001e00)="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", 0x152}, {&(0x7f0000001a40)="7e54fa50343f4174c561c7b95f0dcf0e00a5b0078457a9a028d456e89f8105fac7a838632ea14b93162067366abfd4833fa46ed8478260a76cb0baa5caeaf5f4aa2d4b526286435b348ccc4acc4a01b0085773be16265e46f391d7e73b169fd6a7f6bd6242501af21fc95591cbdfa3d1b031e972272919f8481d9904bfdd7dd72d78b14ea736aed362feb36102d94a358b66aac4da66d9a34aedd00342475989a38d9966", 0xa4}], 0x2, &(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESHEX], 0x128}, 0x210c0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)=0x1fffffffffffd, 0x12) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x3) 13:42:46 executing program 0: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={@cgroup, 0xffffffffffffffff, 0x28}, 0x14) 13:42:46 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000003bc0)={0x0, 0x0, 0x0}, 0x3) 13:42:46 executing program 0: syz_clone(0x85041080, 0x0, 0x0, 0x0, 0x0, 0x0) 13:42:46 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000100)='sys_exit\x00', r0}, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) close(r1) 13:42:46 executing program 1: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x100) socketpair(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x29, 0x0, 0x0, &(0x7f00000002c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x383, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000), 0x248800) perf_event_open(&(0x7f0000000380)={0x3, 0x80, 0x0, 0x5, 0x5, 0x0, 0x0, 0x7fffffff, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x2}, 0x80020, 0x0, 0x6, 0x3, 0x3ff, 0x0, 0x0, 0x0, 0x7ff}, 0xffffffffffffffff, 0x1, r0, 0x0) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3400, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x20}, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffffffffff8}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x1) [ 114.622025][ T23] kauditd_printk_skb: 2 callbacks suppressed [ 114.622037][ T23] audit: type=1400 audit(1675777366.674:228): avc: denied { create } for pid=6355 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 114.649199][ C1] hrtimer: interrupt took 17680 ns 13:42:47 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x421, &(0x7f0000000340)='bdev!)-%+wl`n\x00posi\x19Mx_dxl_acc\xe5sszQ\tU\x97\x12=J\xd5\x8b;B\xe3\x1a\x17f\xb2@\x8a\x8b6\xff\xff\xff\x01fE\xaea\x10{\xac\xa9+V\x863Hhk{2\x00\x14I\xf7\xb6\xcd)\x05\x87q6\xed~\xd0\xb2\xf8\x8d*\b\xe4\"\x1e\xbf\x8f_[\x17@\xe5\xec\x10\a\xb95w\x8byx/J\xb3\xaa\xd4W\xd2\xedN\x8cw\xe6\x99\xfe \x84]8\x940U\xb3E;\xff\xa1!\x9a\x87\x88\x02\xbf\xab\x97B\xd9\x06\xf2\n\xf7\x1f\xd8v\x7fD\xf2\x87\xf7}V\x89}\xf0\xb7\x8d\x85\xf6\x9b\xcc\xd3Lh.\r\xd3J\"\x1f\xdeW;F.\xdf$\xee\x18\x0e5\xa1\xfcN\x88`\xbbj \xaf<\xf1\xbe`4,q[M\xb0-\xd0\x8cloB\x91&\xf3\x97\xd7-\xb78\\\x90/\x9b\xf0\xccr\xc1\xa8\x85E\x85p+\xd1\xbe\x10\rgx\xb8\x93k|\x8d\xc7x\x01\x0e\xb4~\xb2\xdeQ\xdf\x8c\x1dTi\xafq\xde\xe4c&\x99\xd6psf\xa8\xacjh9\x8bk\x8f\n$\xf2\x06#\xc8\xd2\x00\x00w\x03,\xbb\xed\xf1o\xd8\x19\xd2\x1d\xbb\xd3\x18E\x0e&\x83\xdfWL?P$\xb4a\f\x154\xdd\xacx\x91<\x97\x13\xab\xe2\xdd\n\x13\x19\xb9U\n\xb5\xb6\xffBQ\x80\xe6\xe6\xaf\x06\xcd/\x87\x11\xf1\xb9\xbe&,c\xfd3\xc4\xeaP\x9b\xe25\xcc\xa4RDx\xad\xc0\x8f|\xe3u\xbe\x1e\xd5\xa6\xcc\xb8\x86\x8b0\'\xcc\x01\x9bQ/\xf9\xa7vfa\xdf!\x1axt\xd1\r\xd9&MC\xcc,2\xce\xd2kCJ\x10\x88\x00\x00\x00\x00\x00\x00\x00\x00\xc1b\xbc\\l$+ne\x8a\xa3\xcc\x88\xda\xea\x9f\xc4\x17{=2{2\xf9i\x06\x06u\xe6&\x90\bu\x00\x00\x00\x00\x00\x00\n\xf07~\xa8\xc5\x05\xa5\x03\xc0\xb5r$q@\xe4\xc7\xa1B>\xfe\x03s\a\x1b4k\x80\x1e\xe1\x87\xb0\x9b\xb7aS\x9b\x04x\xb2\x1f\xa2\x00\x1f\x80R\xf2b\xc9+\xe6\x88\xf5\xff\x88#\xd0\xe4\xf5z\xa7#c\xe4!4N\xbf\x8ar\x8e\x1c\x11=\x8b\xf8G\xfc )\r\xbe\x1e\xae\x14@\xa9\x94\xa95i\x91\x87\x10\x18\x92UMW\xc6\xd4n\xa1\x1a\xdf\xe6H\x1b\xae\x02S\v\xb9A\xd3\xee\x9f\xd3{\xd1v\x06\xaa\xaa.\b\xef\x86\x17\x1c\x80\xa4\v\xf4\xe6:\xf4\xab\x1f\xb1\xf9\xdf\xab\xc5I \xc9v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x004\xe7\xb6\xc2>\xc3\xa4@\xbb\xb3\xed\xba\rr\xf05\xd4\xfep{\xc58\x95\xdf\x06v\xd8\xea\xac{Q\x8f\xa9\x0e\x12\xd3%u\x1f;\xb6\x88\xe8\xf6\xe4$%\x8b\x00Uw\x8b\xed\xbf\xbb)\xc6\x82\xd2\x1a\xa7\x8e\xff\x1c4\x90\xd3\xea\xb2!m\x98\x95x>\xcb\xe9\xa5\x92\x84g\n\xef$\\\xe7Y\x82B\xcch\x06\x17\x82\x11A\xaab\xf6h\xde\x87O\xf2w\x94\xbb1\xb0\xe9\x80\xf0\x85\xb8\xeb\x19v\xe0\xcb\xf6\xcd@%I\x03n\xe3\xf5\xa6\x8c\x1d\xf1\xc1\xb1\x7f=\'\xd3\xec;|\x04>z\xf6}\x01\xa8\xd8k\xed\xd5\b\xd9i\xcb\x12\x96}\xd4\xb2\xd0\xc8\xf1\xf4\xc4\xb0(\xd0\xf3\t#e\xd1\r:\xef\xec\n\xc3\xad<\"\xa8\x0e\x98\xc9\x97\"\xb1\xd4G\xc5~C\x98\x04\xe2\xec\x98\xf4\x11\x81\ag`\x88^6i}\xc4\xbduI\xf9\xbb\xcc\xac\xcd\x1a\xc2\xbe$\xb58\xc3v|\xbf\rx\xf4\xe1\xa57P\xb24\xa1}\x8e\xaaC\xd3\xdb\x93\xee\xb1y\xc1\xfb\x9b\x02\xdd\"\xdf\xb2P\x0f1\xcf\xf3/cl\x85K\xa2\xc8om\"\x80vh~\xd4\n\xa2\x02\xea+B\x8a+#n\x8fGP\xa8Vj\xa9\x00\xcf\xac\x17\xe0]\\\x9b\xcbiU\x88\xef\x98\xba\xb0xLb\x12\x934\x0f\x98\"o\x1d\xa0J\x87y8oW\xeeE\xf1\xdf0U\xad\xae\x9e\\f\xd7\x8b\x14\x971Q\xc4\xd7\x16\x9cZD\xfc\xf4y\xfe<\xb0\xban\xde\xa0\xaf\x02eC\xad\xcf\xb7x\x10T\x9a\xca\x12\xb7\xe8J@\xcd\xef\xea\x88\x8c\xd2\x15N\x18UK\xe5i\xd9\x8b\xe2\xc6\xf00\xdfd\xfd7\xb3\xd9\xd3l\x00'/1057}, 0x30) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000800), 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40305828, &(0x7f0000000040)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 13:42:47 executing program 0: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x100) socketpair(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x29, 0x0, 0x0, &(0x7f00000002c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x383, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000180)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) perf_event_open(&(0x7f0000000380)={0x3, 0x80, 0x2, 0x5, 0x5, 0x0, 0x0, 0x7fffffff, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x80020, 0x0, 0x6, 0x3, 0x3ff}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x20}, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffffffffff8}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x1) 13:42:47 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x850, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x0, 0x3, 0x6, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x3}, 0x10808, 0x0, 0x9, 0x8, 0x81, 0x0, 0x3f, 0x0, 0x20b0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000820004000000000000000c00850000000f00000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)=0x27fff) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000380)) 13:42:47 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x777c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001440)=ANY=[@ANYBLOB="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"/1846], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x22, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) socketpair(0x11, 0x2, 0x300, &(0x7f0000000240)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000005c0)={0xffffffffffffffff, &(0x7f0000000480), 0x0}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000b80)={0xffffffffffffffff, 0xe0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000500)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000009c0), &(0x7f0000000a00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000a40)}}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0x22, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x1, &(0x7f0000001e00)=ANY=[@ANYBLOB="9433c5f204000000d97ea51d598194557587981266c8c69d0878421b73951d87565d349e9269a7e7faad8d707aeeb4da61605439e0ad054c3d1aed9ac39800afac702f0191c84e95e8773f60b81b0aac91a12cae15b4590a01981b91cf17e9c54a887f75c5c17f68892d4152f1985a16c5ebd5e4d399234a934761a417905fc74db89ff14498fb48226b6c78a055a263dcbe0b"], &(0x7f0000000240)='GPL\x00', 0x9, 0x0, 0x0, 0x41000, 0x4, '\x00', r2, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000c00)={0x5, 0x6, 0xb93, 0xe41}, 0x10, 0x5f8a, r3, 0x0, &(0x7f0000000c40)}, 0x80) r4 = bpf$MAP_CREATE(0x1200000000000000, &(0x7f0000000000)=@base={0x5, 0x2, 0x7, 0x1ff, 0x0, 0x1}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000005c0)={r4, &(0x7f0000000480), 0x0}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000940)={0x18, 0x4, &(0x7f0000000200)=@raw=[@map_idx, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7ff}], &(0x7f0000000240)='syzkaller\x00', 0x3, 0xaf, &(0x7f0000000340)=""/175, 0x41000, 0x1, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x9, 0x1}, 0x8, 0x10, &(0x7f00000008c0)={0x5, 0xc, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000900)=[0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={0xffffffffffffffff, 0x115, 0x8}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000880)={&(0x7f0000000840)='./file0\x00'}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0xfffff801, 0xffffffff, 0x9, 0x700, 0xffffffffffffffff, 0xc, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x5, 0x3}, 0x48) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) r6 = bpf$MAP_CREATE(0x1200000000000000, &(0x7f0000000000)=@base={0x5, 0x2, 0x7, 0x1ff, 0x0, 0x1}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000005c0)={r6, &(0x7f0000000480), 0x0}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000b80)={0xffffffffffffffff, 0xe0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000500)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000009c0), &(0x7f0000000a00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000a40)}}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r8, 0x18000000000002a0, 0x22, 0x60000000, &(0x7f0000000100)="b9ff03076044238cb89e14f008001be0ffff00004000630477fbac14140cac14140c62079f4b4d2f87e5feca6aab845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0xfe, 0x60000000}, 0x2c) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x1, &(0x7f0000001e00)=ANY=[@ANYBLOB="9433c5f204000000d97ea51d598194557587981266c8c69d0878421b73951d87565d349e9269a7e7faad8d707aeeb4da61605439e0ad054c3d1aed9ac39800afac702f0191c84e95e8773f60b81b0aac91a12cae15b4590a01981b91cf17e9c54a887f75c5c17f68892d4152f1985a16c5ebd5e4d399234a934761a417905fc74db89ff14498fb48226b6c78a055a263dcbe0b"], &(0x7f0000000240)='GPL\x00', 0x9, 0x0, 0x0, 0x41000, 0x4, '\x00', r7, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000c00)={0x5, 0x6, 0xb93, 0xe41}, 0x10, 0x5f8a, r8, 0x0, &(0x7f0000000c40)}, 0x80) bpf$MAP_CREATE(0x1200000000000000, &(0x7f0000000000)=@base={0x5, 0x2, 0x7, 0x1ff, 0x0, 0x1}, 0x48) openat$cgroup_ro(r0, &(0x7f0000000040)='blkio.bfq.empty_time\x00', 0x0, 0x0) 13:42:47 executing program 4: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_clone(0x40040100, &(0x7f0000000000), 0x0, &(0x7f0000000040), 0x0, &(0x7f00000000c0)="66f6a421a7f13d5f6e5754351143668bc8d30242f255c92235d6d695a6c789b1ce3d6269922f4afffc071d7e27f4f121e11c75425ca718386752c70d199102583ee8d7acbfff4e21255304f31880c6b01f91042d68f9e2d2cb00fc9ba5d92f212cd7962bf11db6dba32c1892") 13:42:47 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x421, &(0x7f0000000340)='bdev!)-%+wl`n\x00posi\x19Mx_dxl_acc\xe5sszQ\tU\x97\x12=J\xd5\x8b;B\xe3\x1a\x17f\xb2@\x8a\x8b6\xff\xff\xff\x01fE\xaea\x10{\xac\xa9+V\x863Hhk{2\x00\x14I\xf7\xb6\xcd)\x05\x87q6\xed~\xd0\xb2\xf8\x8d*\b\xe4\"\x1e\xbf\x8f_[\x17@\xe5\xec\x10\a\xb95w\x8byx/J\xb3\xaa\xd4W\xd2\xedN\x8cw\xe6\x99\xfe \x84]8\x940U\xb3E;\xff\xa1!\x9a\x87\x88\x02\xbf\xab\x97B\xd9\x06\xf2\n\xf7\x1f\xd8v\x7fD\xf2\x87\xf7}V\x89}\xf0\xb7\x8d\x85\xf6\x9b\xcc\xd3Lh.\r\xd3J\"\x1f\xdeW;F.\xdf$\xee\x18\x0e5\xa1\xfcN\x88`\xbbj \xaf<\xf1\xbe`4,q[M\xb0-\xd0\x8cloB\x91&\xf3\x97\xd7-\xb78\\\x90/\x9b\xf0\xccr\xc1\xa8\x85E\x85p+\xd1\xbe\x10\rgx\xb8\x93k|\x8d\xc7x\x01\x0e\xb4~\xb2\xdeQ\xdf\x8c\x1dTi\xafq\xde\xe4c&\x99\xd6psf\xa8\xacjh9\x8bk\x8f\n$\xf2\x06#\xc8\xd2\x00\x00w\x03,\xbb\xed\xf1o\xd8\x19\xd2\x1d\xbb\xd3\x18E\x0e&\x83\xdfWL?P$\xb4a\f\x154\xdd\xacx\x91<\x97\x13\xab\xe2\xdd\n\x13\x19\xb9U\n\xb5\xb6\xffBQ\x80\xe6\xe6\xaf\x06\xcd/\x87\x11\xf1\xb9\xbe&,c\xfd3\xc4\xeaP\x9b\xe25\xcc\xa4RDx\xad\xc0\x8f|\xe3u\xbe\x1e\xd5\xa6\xcc\xb8\x86\x8b0\'\xcc\x01\x9bQ/\xf9\xa7vfa\xdf!\x1axt\xd1\r\xd9&MC\xcc,2\xce\xd2kCJ\x10\x88\x00\x00\x00\x00\x00\x00\x00\x00\xc1b\xbc\\l$+ne\x8a\xa3\xcc\x88\xda\xea\x9f\xc4\x17{=2{2\xf9i\x06\x06u\xe6&\x90\bu\x00\x00\x00\x00\x00\x00\n\xf07~\xa8\xc5\x05\xa5\x03\xc0\xb5r$q@\xe4\xc7\xa1B>\xfe\x03s\a\x1b4k\x80\x1e\xe1\x87\xb0\x9b\xb7aS\x9b\x04x\xb2\x1f\xa2\x00\x1f\x80R\xf2b\xc9+\xe6\x88\xf5\xff\x88#\xd0\xe4\xf5z\xa7#c\xe4!4N\xbf\x8ar\x8e\x1c\x11=\x8b\xf8G\xfc )\r\xbe\x1e\xae\x14@\xa9\x94\xa95i\x91\x87\x10\x18\x92UMW\xc6\xd4n\xa1\x1a\xdf\xe6H\x1b\xae\x02S\v\xb9A\xd3\xee\x9f\xd3{\xd1v\x06\xaa\xaa.\b\xef\x86\x17\x1c\x80\xa4\v\xf4\xe6:\xf4\xab\x1f\xb1\xf9\xdf\xab\xc5I \xc9v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x004\xe7\xb6\xc2>\xc3\xa4@\xbb\xb3\xed\xba\rr\xf05\xd4\xfep{\xc58\x95\xdf\x06v\xd8\xea\xac{Q\x8f\xa9\x0e\x12\xd3%u\x1f;\xb6\x88\xe8\xf6\xe4$%\x8b\x00Uw\x8b\xed\xbf\xbb)\xc6\x82\xd2\x1a\xa7\x8e\xff\x1c4\x90\xd3\xea\xb2!m\x98\x95x>\xcb\xe9\xa5\x92\x84g\n\xef$\\\xe7Y\x82B\xcch\x06\x17\x82\x11A\xaab\xf6h\xde\x87O\xf2w\x94\xbb1\xb0\xe9\x80\xf0\x85\xb8\xeb\x19v\xe0\xcb\xf6\xcd@%I\x03n\xe3\xf5\xa6\x8c\x1d\xf1\xc1\xb1\x7f=\'\xd3\xec;|\x04>z\xf6}\x01\xa8\xd8k\xed\xd5\b\xd9i\xcb\x12\x96}\xd4\xb2\xd0\xc8\xf1\xf4\xc4\xb0(\xd0\xf3\t#e\xd1\r:\xef\xec\n\xc3\xad<\"\xa8\x0e\x98\xc9\x97\"\xb1\xd4G\xc5~C\x98\x04\xe2\xec\x98\xf4\x11\x81\ag`\x88^6i}\xc4\xbduI\xf9\xbb\xcc\xac\xcd\x1a\xc2\xbe$\xb58\xc3v|\xbf\rx\xf4\xe1\xa57P\xb24\xa1}\x8e\xaaC\xd3\xdb\x93\xee\xb1y\xc1\xfb\x9b\x02\xdd\"\xdf\xb2P\x0f1\xcf\xf3/cl\x85K\xa2\xc8om\"\x80vh~\xd4\n\xa2\x02\xea+B\x8a+#n\x8fGP\xa8Vj\xa9\x00\xcf\xac\x17\xe0]\\\x9b\xcbiU\x88\xef\x98\xba\xb0xLb\x12\x934\x0f\x98\"o\x1d\xa0J\x87y8oW\xeeE\xf1\xdf0U\xad\xae\x9e\\f\xd7\x8b\x14\x971Q\xc4\xd7\x16\x9cZD\xfc\xf4y\xfe<\xb0\xban\xde\xa0\xaf\x02eC\xad\xcf\xb7x\x10T\x9a\xca\x12\xb7\xe8J@\xcd\xef\xea\x88\x8c\xd2\x15N\x18UK\xe5i\xd9\x8b\xe2\xc6\xf00\xdfd\xfd7\xb3\xd9\xd3l\x00'/1057}, 0x30) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000800), 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40305828, &(0x7f0000000040)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 13:42:47 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000002080)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000000c0)='mm_page_alloc\x00', r0}, 0x10) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r1}, 0x8) write$cgroup_int(r2, &(0x7f00000001c0), 0xfffffdef) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000280)={0x1, 0x80, 0x3f, 0x1, 0x2, 0xbd, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x0, 0xec}, 0x10, 0x1, 0x0, 0x7, 0x1, 0xff, 0x9f, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x53) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x32600) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) write$cgroup_type(r3, &(0x7f0000000080), 0x11ffffce1) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000018c00)={0x18, 0x3, &(0x7f0000000500)=ANY=[], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x660c, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='rcu_utilization\x00', r4}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00), 0xc) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) syz_clone(0x998e000, &(0x7f00000002c0)="0c7a1ac922638160f06b176088a63eafedd751b5ac00c77865effa2bfce0fbd2e26b580820d7e9c95ca4ada3fbfdb19e960e870d5dff343c09c3e5894205078d626de0c3410af3f7", 0x48, &(0x7f0000000100), &(0x7f0000000380), &(0x7f00000003c0)) perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 13:42:47 executing program 4: syz_clone(0xc3240480, 0x0, 0x0, 0x0, 0x0, 0x0) 13:42:47 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000100)='sys_exit\x00', r0}, 0x10) bpf$MAP_CREATE(0xa, 0x0, 0x0) 13:42:47 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f00000004c0)=ANY=[@ANYRESHEX, @ANYRES8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='io.stat\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(r3, &(0x7f00000002c0)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000800)=0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuacct.usage_sys\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f0000000300), 0x12) close(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) 13:42:47 executing program 2: syz_clone(0xe000600, 0x0, 0x0, 0x0, 0x0, 0x0) 13:42:47 executing program 2: syz_clone(0xe000600, 0x0, 0x0, 0x0, 0x0, 0x0) 13:42:47 executing program 4: syz_clone(0x68024400, 0x0, 0x0, 0x0, 0x0, 0x0) 13:42:47 executing program 2: syz_clone(0xe000600, 0x0, 0x0, 0x0, 0x0, 0x0) 13:42:48 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x850, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x0, 0x3, 0x6, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x3}, 0x10808, 0x0, 0x9, 0x8, 0x81, 0x0, 0x3f, 0x0, 0x20b0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000820004000000000000000c00850000000f00000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)=0x27fff) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000380)) 13:42:48 executing program 2: syz_clone(0xe000600, 0x0, 0x0, 0x0, 0x0, 0x0) 13:42:48 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x13, 0x0, 0x0) 13:42:48 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={0x0, r0}, 0x10) bpf$MAP_CREATE(0x7, 0x0, 0x0) 13:42:48 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000100)='sys_exit\x00', r0}, 0x10) bpf$MAP_CREATE(0x9, 0x0, 0x0) 13:42:48 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$MAP_CREATE(0x10, 0x0, 0x0) 13:42:48 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='blkio.bfq.io_queued_recursive\x00', 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=[@cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x40}, 0x100) socketpair(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000002c0)) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x383, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000180)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) perf_event_open(&(0x7f0000000380)={0x3, 0x80, 0x2, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x2}, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x20}, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffffffffff8}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x1) [ 116.912898][ T6377] syz-executor.4 (6377) used greatest stack depth: 10136 bytes left 13:42:50 executing program 0: r0 = perf_event_open(&(0x7f0000002480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x0) 13:42:50 executing program 4: syz_clone(0x68024400, 0x0, 0x0, 0x0, 0x0, 0x0) 13:42:50 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='blkio.bfq.io_queued_recursive\x00', 0x0, 0x0) recvmsg$unix(r0, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x29, 0x0, 0x0, &(0x7f00000002c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x383, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000180)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r3, &(0x7f0000000000), 0x248800) perf_event_open(&(0x7f0000000380)={0x3, 0x80, 0x2, 0x5, 0x5, 0x0, 0x0, 0x7fffffff, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x2}, 0x80020, 0x0, 0x6, 0x3, 0x3ff, 0x0, 0x0, 0x0, 0x7ff}, 0xffffffffffffffff, 0x1, r1, 0x0) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3400, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x20}, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffffffffff8}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x1) 13:42:50 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41029}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001a00)={0x0, 0x0, &(0x7f0000001840)=[{0x0}], 0x1}, 0x0) close(0xffffffffffffffff) close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a0, &(0x7f0000000000)='&@[\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000000c0)='memory.max\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x11, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="225b180828c7180000000000000000000000000007000000000000000000f3d15b4d676af9302f880f850bcc61424a3205d3630aea89000000000000"], &(0x7f0000000540)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) socketpair(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xa) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8922, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc87,\x00\xd2\x97C\x00\x00\x00') write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x12, 0xff, 0x4, 0xa}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r4}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x12, 0xff, 0x4, 0xa}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r5}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x0, 0xd, &(0x7f0000000780)=ANY=[@ANYBLOB="18000000010000000000000001000080023a0800020000001851000002000000000000000000000018150000", @ANYRES32, @ANYBLOB="0000000000000000cb010000", @ANYRES32=r3, @ANYBLOB="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"], &(0x7f00000002c0)='GPL\x00', 0x0, 0xfd, &(0x7f0000000400)=""/253, 0x40f00, 0x1a, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000580)={0x4, 0x5, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, r4, r5]}, 0x80) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000000000000001) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)=0x4) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x3) write$cgroup_int(r1, &(0x7f0000000180), 0x12) 13:42:50 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x850, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x0, 0x3, 0x6, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x3}, 0x10808, 0x0, 0x9, 0x8, 0x81, 0x0, 0x3f, 0x0, 0x20b0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000820004000000000000000c00850000000f00000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)=0x27fff) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000380)) 13:42:50 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='blkio.bfq.io_queued_recursive\x00', 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=[@cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x40}, 0x100) socketpair(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000002c0)) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x383, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000180)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) perf_event_open(&(0x7f0000000380)={0x3, 0x80, 0x2, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x2}, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x20}, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffffffffff8}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x1) [ 118.798624][ T6426] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 118.809224][ T6426] CPU: 0 PID: 6426 Comm: syz-executor.5 Not tainted 6.2.0-rc7-syzkaller-00011-g05ecb680708a-dirty #0 [ 118.820111][ T6426] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 118.830284][ T6426] Call Trace: [ 118.833568][ T6426] [ 118.836531][ T6426] dump_stack_lvl+0xda/0x130 [ 118.841248][ T6426] dump_stack+0x15/0x20 [ 118.845417][ T6426] dump_header+0x95/0x3c0 [ 118.849766][ T6426] oom_kill_process+0xe3/0x3e0 [ 118.854540][ T6426] out_of_memory+0x9f0/0xc30 [ 118.859153][ T6426] mem_cgroup_out_of_memory+0x139/0x190 [ 118.864733][ T6426] memory_max_write+0x1e3/0x270 [ 118.869709][ T6426] ? memory_max_show+0x70/0x70 [ 118.874693][ T6426] cgroup_file_write+0x16b/0x310 [ 118.879697][ T6426] ? __check_object_size+0x329/0x4e0 [ 118.884992][ T6426] ? cgroup_seqfile_stop+0x70/0x70 [ 118.890123][ T6426] kernfs_fop_write_iter+0x1ca/0x2b0 [ 118.895441][ T6426] vfs_write+0x45a/0x750 [ 118.899736][ T6426] ksys_write+0xeb/0x1a0 [ 118.904072][ T6426] __x64_sys_write+0x42/0x50 [ 118.908748][ T6426] do_syscall_64+0x41/0xc0 [ 118.913188][ T6426] ? irqentry_exit+0x12/0x40 [ 118.917958][ T6426] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 118.923873][ T6426] RIP: 0033:0x7f48a205c0f9 [ 118.928346][ T6426] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 118.948035][ T6426] RSP: 002b:00007f48a13cf168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 118.956457][ T6426] RAX: ffffffffffffffda RBX: 00007f48a217bf80 RCX: 00007f48a205c0f9 [ 118.964572][ T6426] RDX: 0000000000000012 RSI: 0000000020000180 RDI: 0000000000000005 [ 118.972546][ T6426] RBP: 00007f48a20b7ae9 R08: 0000000000000000 R09: 0000000000000000 [ 118.980522][ T6426] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 118.988544][ T6426] R13: 00007ffd1da5275f R14: 00007f48a13cf300 R15: 0000000000022000 [ 118.996530][ T6426] 13:42:51 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000100)='sys_exit\x00', r0}, 0x10) bpf$MAP_CREATE(0x6, 0x0, 0x0) 13:42:51 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='blkio.bfq.io_queued_recursive\x00', 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=[@cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x40}, 0x100) socketpair(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000002c0)) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x383, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000180)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) perf_event_open(&(0x7f0000000380)={0x3, 0x80, 0x2, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x2}, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x20}, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffffffffff8}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x1) [ 118.999947][ T6426] memory: usage 9204kB, limit 0kB, failcnt 0 [ 119.006055][ T6426] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 119.013137][ T6426] Memory cgroup stats for /syz5: [ 119.013893][ T6426] anon 520192 [ 119.013893][ T6426] file 8314880 [ 119.013893][ T6426] kernel 589824 [ 119.013893][ T6426] kernel_stack 81920 [ 119.013893][ T6426] pagetables 262144 [ 119.013893][ T6426] sec_pagetables 0 [ 119.013893][ T6426] percpu 256 [ 119.013893][ T6426] sock 0 [ 119.013893][ T6426] vmalloc 0 [ 119.013893][ T6426] shmem 8306688 [ 119.013893][ T6426] file_mapped 57344 [ 119.013893][ T6426] file_dirty 8192 [ 119.013893][ T6426] file_writeback 0 [ 119.013893][ T6426] swapcached 0 [ 119.013893][ T6426] inactive_anon 8810496 [ 119.013893][ T6426] active_anon 16384 [ 119.013893][ T6426] inactive_file 4096 [ 119.013893][ T6426] active_file 4096 [ 119.013893][ T6426] unevictable 0 [ 119.013893][ T6426] slab_reclaimable 42760 [ 119.013893][ T6426] slab_unreclaimable 106928 [ 119.013893][ T6426] slab 149688 [ 119.013893][ T6426] workingset_refault_anon 0 [ 119.013893][ T6426] workingset_refault_file 1 [ 119.013893][ T6426] workingset_activate_anon 0 [ 119.108903][ T6426] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=6424,uid=0 [ 119.124475][ T6426] Memory cgroup out of memory: Killed process 6424 (syz-executor.5) total-vm:46344kB, anon-rss:372kB, file-rss:8832kB, shmem-rss:0kB, UID:0 pgtables:84kB oom_score_adj:1000 13:42:51 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x850, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x0, 0x3, 0x6, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x3}, 0x10808, 0x0, 0x9, 0x8, 0x81, 0x0, 0x3f, 0x0, 0x20b0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000820004000000000000000c00850000000f00000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)=0x27fff) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000380)) 13:42:51 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000100)='sys_exit\x00', r0}, 0x10) bpf$MAP_CREATE(0x6, 0x0, 0x0) 13:42:51 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000100)='sys_exit\x00', r0}, 0x10) bpf$MAP_CREATE(0x17, 0x0, 0x0) 13:42:51 executing program 4: syz_clone(0x68024400, 0x0, 0x0, 0x0, 0x0, 0x0) [ 119.220143][ T3124] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 119.230160][ T3124] CPU: 0 PID: 3124 Comm: syz-executor.5 Not tainted 6.2.0-rc7-syzkaller-00011-g05ecb680708a-dirty #0 [ 119.241055][ T3124] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 119.251124][ T3124] Call Trace: [ 119.254403][ T3124] [ 119.257334][ T3124] dump_stack_lvl+0xda/0x130 [ 119.261968][ T3124] dump_stack+0x15/0x20 [ 119.266200][ T3124] dump_header+0x95/0x3c0 [ 119.270570][ T3124] oom_kill_process+0xe3/0x3e0 [ 119.275380][ T3124] out_of_memory+0x9f0/0xc30 [ 119.279970][ T3124] ? try_to_free_mem_cgroup_pages+0x220/0x480 [ 119.286055][ T3124] mem_cgroup_out_of_memory+0x139/0x190 [ 119.291654][ T3124] try_charge_memcg+0x767/0xd10 [ 119.296515][ T3124] obj_cgroup_charge_pages+0xbd/0x1c0 [ 119.301942][ T3124] obj_cgroup_charge+0xd7/0x140 [ 119.306891][ T3124] slab_pre_alloc_hook+0x112/0x180 [ 119.312096][ T3124] kmem_cache_alloc_lru+0x56/0x280 [ 119.317280][ T3124] ? sock_alloc_inode+0x34/0xa0 [ 119.322184][ T3124] sock_alloc_inode+0x34/0xa0 [ 119.326978][ T3124] ? sockfs_init_fs_context+0x70/0x70 [ 119.332355][ T3124] alloc_inode+0x38/0x150 [ 119.336799][ T3124] new_inode_pseudo+0x17/0x70 [ 119.341480][ T3124] __sock_create+0x12b/0x4e0 [ 119.346084][ T3124] __sys_socket+0x9f/0x220 [ 119.350596][ T3124] __x64_sys_socket+0x3f/0x50 [ 119.355391][ T3124] do_syscall_64+0x41/0xc0 [ 119.359816][ T3124] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 119.365838][ T3124] RIP: 0033:0x7f48a205d777 [ 119.370254][ T3124] Code: f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 29 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 119.390015][ T3124] RSP: 002b:00007ffd1da522d8 EFLAGS: 00000202 ORIG_RAX: 0000000000000029 [ 119.398579][ T3124] RAX: ffffffffffffffda RBX: 00007ffd1da52a40 RCX: 00007f48a205d777 [ 119.406548][ T3124] RDX: 0000000000000006 RSI: 0000000000000001 RDI: 0000000000000002 [ 119.414520][ T3124] RBP: 0000000000000003 R08: 0000000000000000 R09: 00007ffd1da52850 [ 119.422492][ T3124] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000032 [ 119.430516][ T3124] R13: 000000000001cf9a R14: 000000000000001c R15: 00007ffd1da52a80 [ 119.438545][ T3124] [ 119.441684][ T3124] memory: usage 8968kB, limit 0kB, failcnt 19 [ 119.447816][ T3124] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 119.454686][ T3124] Memory cgroup stats for /syz5: [ 119.455173][ T3124] anon 421888 [ 119.455173][ T3124] file 8314880 [ 119.455173][ T3124] kernel 446464 [ 119.455173][ T3124] kernel_stack 49152 [ 119.455173][ T3124] pagetables 192512 [ 119.455173][ T3124] sec_pagetables 0 [ 119.455173][ T3124] percpu 256 [ 119.455173][ T3124] sock 0 [ 119.455173][ T3124] vmalloc 0 [ 119.455173][ T3124] shmem 8306688 [ 119.455173][ T3124] file_mapped 16384 [ 119.455173][ T3124] file_dirty 8192 [ 119.455173][ T3124] file_writeback 0 [ 119.455173][ T3124] swapcached 0 [ 119.455173][ T3124] inactive_anon 8671232 [ 119.455173][ T3124] active_anon 57344 [ 119.455173][ T3124] inactive_file 4096 [ 119.455173][ T3124] active_file 4096 [ 119.455173][ T3124] unevictable 0 [ 119.455173][ T3124] slab_reclaimable 38632 [ 119.455173][ T3124] slab_unreclaimable 86200 [ 119.455173][ T3124] slab 124832 [ 119.455173][ T3124] workingset_refault_anon 0 [ 119.455173][ T3124] workingset_refault_file 1 [ 119.455173][ T3124] workingset_activate_anon 0 [ 119.549724][ T3124] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=3124,uid=0 [ 119.564917][ T3124] Memory cgroup out of memory: Killed process 3124 (syz-executor.5) total-vm:42372kB, anon-rss:364kB, file-rss:8832kB, shmem-rss:0kB, UID:0 pgtables:76kB oom_score_adj:0 [ 119.592221][ T3124] socket: no more sockets [ 120.196145][ T3144] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 120.285959][ T3144] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 120.346301][ T3144] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 120.417004][ T3144] netdevsim netdevsim5 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 121.054548][ T3144] device hsr_slave_0 left promiscuous mode [ 121.060770][ T3144] device hsr_slave_1 left promiscuous mode [ 121.067461][ T3144] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 121.074930][ T3144] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 121.084267][ T3144] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 121.091733][ T3144] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 121.100115][ T3144] device bridge_slave_1 left promiscuous mode [ 121.106496][ T3144] bridge0: port 2(bridge_slave_1) entered disabled state [ 121.115669][ T3144] device bridge_slave_0 left promiscuous mode [ 121.121847][ T3144] bridge0: port 1(bridge_slave_0) entered disabled state [ 121.132374][ T3144] device veth1_macvtap left promiscuous mode [ 121.138423][ T3144] device veth0_macvtap left promiscuous mode [ 121.144556][ T3144] device veth1_vlan left promiscuous mode [ 121.150297][ T3144] device veth0_vlan left promiscuous mode [ 121.247748][ T3144] team0 (unregistering): Port device team_slave_1 removed [ 121.258601][ T3144] team0 (unregistering): Port device team_slave_0 removed [ 121.267455][ T3144] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 121.279504][ T3144] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 121.307260][ T3144] bond0 (unregistering): Released all slaves 13:42:57 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000740)={0x0, &(0x7f0000000000)=""/220, 0xfffffffffffffeb9, 0xe3}, 0x81) 13:42:57 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000100)='sys_exit\x00', r0}, 0x10) bpf$MAP_CREATE(0x6, 0x0, 0x0) 13:42:57 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='blkio.bfq.io_queued_recursive\x00', 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=[@cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x40}, 0x100) socketpair(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000002c0)) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x383, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000180)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) perf_event_open(&(0x7f0000000380)={0x3, 0x80, 0x2, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x2}, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x20}, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffffffffff8}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x1) 13:42:57 executing program 4: syz_clone(0x68024400, 0x0, 0x0, 0x0, 0x0, 0x0) 13:42:57 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x850, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x0, 0x3, 0x6, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={0x0, 0x3}, 0x10808, 0x0, 0x9, 0x8, 0x0, 0xfff, 0x3f, 0x0, 0x20b0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000820004000000000000000c00850000000f00000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)=0x27fff) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000380)) 13:42:57 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000100)='sys_exit\x00', r0}, 0x10) bpf$MAP_CREATE(0x12, 0x0, 0x0) 13:42:57 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000100)='sys_exit\x00', r0}, 0x10) bpf$MAP_CREATE(0x6, 0x0, 0x0) 13:42:58 executing program 2: r0 = perf_event_open(&(0x7f0000002480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) 13:42:58 executing program 2: bpf$BPF_PROG_TEST_RUN(0x2, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)}, 0x48) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x6, 0x8}, 0xc) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0xf, &(0x7f0000000600)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x2}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x8}, @generic={0x9, 0x8, 0x0, 0x6, 0x7fff}, @generic={0x0, 0xd, 0xb, 0x0, 0x9}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0xffff95b2}, @alu={0x7, 0x0, 0xd, 0x8, 0x0, 0xfffffffffffffffe, 0x4}, @map_val={0x18, 0x4, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5}]}, &(0x7f00000001c0)='syzkaller\x00', 0x8, 0x27, &(0x7f0000000140)=""/39, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000180), 0x8, 0x10, 0x0}, 0x80) syz_clone(0x42122000, &(0x7f0000000100), 0x0, &(0x7f00000002c0), &(0x7f0000000500), &(0x7f0000000680)="4921e58ec4dc14a970d39f87836e8aa768402e265077557097e82bb7fe650f2dd036d82b186a2d3ac27c475e3f1752a13f9c10e37b5a5494ec5e92682fba4747e624cacf6a848869c05c3c451d736dc30bdc5f6dc2bf0027e730a32cd4b9fc42414c516180988d8993fcebf6b3aa0eaf485f9625a46fdbc57576cc8d7452ae4d0ee30135b4e843611e7f027a4587150afbe5aa792b595005170a1a11325974f31c3a6350ea6514919d0a9465cdd898bf5d02d58d") bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000004c0)={@map=r0, r1, 0x24, 0x2}, 0x14) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) [ 125.950236][ T23] audit: type=1400 audit(1675777378.004:229): avc: denied { write } for pid=6648 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 13:42:58 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x20000000, 0x0, 0x1}, 0x48) 13:42:58 executing program 2: r0 = perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8162, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r0) 13:42:58 executing program 4: r0 = perf_event_open(&(0x7f0000002480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, r0, 0x0) [ 126.153398][ T23] audit: type=1400 audit(1675777378.214:230): avc: denied { cpu } for pid=6657 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 128.214537][ T6667] chnl_net:caif_netlink_parms(): no params data found [ 128.243023][ T6667] bridge0: port 1(bridge_slave_0) entered blocking state [ 128.250130][ T6667] bridge0: port 1(bridge_slave_0) entered disabled state [ 128.257649][ T6667] device bridge_slave_0 entered promiscuous mode [ 128.264914][ T6667] bridge0: port 2(bridge_slave_1) entered blocking state [ 128.271981][ T6667] bridge0: port 2(bridge_slave_1) entered disabled state [ 128.279591][ T6667] device bridge_slave_1 entered promiscuous mode [ 128.295315][ T6667] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 128.305591][ T6667] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 128.322547][ T6667] team0: Port device team_slave_0 added [ 128.328785][ T6667] team0: Port device team_slave_1 added [ 128.342417][ T6667] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 128.349835][ T6667] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 128.375905][ T6667] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 128.387870][ T6667] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 128.394859][ T6667] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 128.420817][ T6667] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 128.444454][ T6667] device hsr_slave_0 entered promiscuous mode [ 128.450914][ T6667] device hsr_slave_1 entered promiscuous mode [ 128.457378][ T6667] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 128.464941][ T6667] Cannot create hsr debugfs directory [ 128.807140][ T6667] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 128.816912][ T6667] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 128.826046][ T6667] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 128.836140][ T6667] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 128.851651][ T6667] bridge0: port 2(bridge_slave_1) entered blocking state [ 128.858880][ T6667] bridge0: port 2(bridge_slave_1) entered forwarding state [ 128.866229][ T6667] bridge0: port 1(bridge_slave_0) entered blocking state [ 128.873300][ T6667] bridge0: port 1(bridge_slave_0) entered forwarding state [ 128.912213][ T6667] 8021q: adding VLAN 0 to HW filter on device bond0 [ 128.924585][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 128.934736][ T34] bridge0: port 1(bridge_slave_0) entered disabled state [ 128.942934][ T34] bridge0: port 2(bridge_slave_1) entered disabled state [ 128.953853][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 128.966774][ T6667] 8021q: adding VLAN 0 to HW filter on device team0 [ 128.978178][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 128.987933][ T6] bridge0: port 1(bridge_slave_0) entered blocking state [ 128.995068][ T6] bridge0: port 1(bridge_slave_0) entered forwarding state [ 129.014182][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 129.022636][ T6] bridge0: port 2(bridge_slave_1) entered blocking state [ 129.029793][ T6] bridge0: port 2(bridge_slave_1) entered forwarding state [ 129.039093][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 129.047887][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 129.061084][ T6667] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 129.071521][ T6667] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 129.085201][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 129.093624][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 129.102783][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 129.111591][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 129.169209][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 129.177833][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 129.187231][ T6667] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 129.257910][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 129.266799][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 129.336878][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 129.346720][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 129.356449][ T6667] device veth0_vlan entered promiscuous mode [ 129.363932][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 129.371828][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 129.381869][ T6667] device veth1_vlan entered promiscuous mode [ 129.396126][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 129.404389][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 129.412866][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 129.421451][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 129.431600][ T6667] device veth0_macvtap entered promiscuous mode [ 129.440925][ T6667] device veth1_macvtap entered promiscuous mode [ 129.453636][ T6667] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 129.464109][ T6667] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 129.473999][ T6667] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 129.484442][ T6667] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 129.494330][ T6667] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 129.504772][ T6667] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 129.514606][ T6667] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 129.525059][ T6667] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 129.534881][ T6667] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 129.545318][ T6667] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 129.560070][ T6667] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 129.567597][ T3243] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 129.576070][ T3243] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 129.584134][ T3243] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 129.593053][ T3243] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 129.603005][ T6667] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 129.613571][ T6667] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 129.623459][ T6667] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 129.633917][ T6667] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 129.643766][ T6667] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 129.654221][ T6667] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 129.664036][ T6667] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 129.674474][ T6667] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 129.684411][ T6667] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 129.694839][ T6667] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 129.708029][ T6667] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 129.716066][ T3222] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 129.724898][ T3222] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 129.735415][ T6667] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 129.744172][ T6667] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 129.752933][ T6667] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 129.761663][ T6667] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 13:43:08 executing program 0: mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) 13:43:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) symlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00') 13:43:08 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x1022, 0x0, &(0x7f0000000380)) getitimer(0x0, &(0x7f0000000000)) 13:43:08 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000002480)={0x0, 0x0, &(0x7f00000022c0)=[{&(0x7f0000000140)="e0056291ae36815d4f56fbb0e81a2d5da7a8e08ba01b03f4b0a2c1f31b534607245c472d974f729e48de879aba743024eb9849523a7c03a88480ae0b6b4e1e5f3a990f6ea90ebab993e85748e7688ad352b11cbef6d1a069eb4d80b0186efe85db4add074f8826c0b6fad4b3f128675854de7e4fba9a0d8f", 0x78}, {&(0x7f00000001c0)="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", 0xff8}, {&(0x7f00000011c0)="1901d02251f10384dde616a5ff1069414c15b2e1c857747ba8b106bcef82947c7f8e205761c67b5ebe150961a54f2aab30d865e3ccdc05caadde5462e5b0a4864d221a0e2bae5c98f2200f879eb0c2dc1c0381516730a9fc1daa0c90e7c983841496563953b621a8f83103729602d1806c730ba823979e990f011eeb3428f7", 0x7f}, {&(0x7f0000001240)="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", 0xe7a}], 0x4, &(0x7f00000023c0)=[@cred, @cred, @cred, @rights, @cred], 0x98}, 0x0) 13:43:08 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x20000000, 0x0, 0x1}, 0x48) 13:43:08 executing program 5: mmap(&(0x7f0000fa1000/0x2000)=nil, 0x2000, 0xaf158fad81d39636, 0x10, 0xffffffffffffffff, 0x0) 13:43:08 executing program 1: r0 = socket$unix(0x1, 0x5, 0x0) setsockopt$sock_int(r0, 0xffff, 0x200, 0x0, 0x0) 13:43:08 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0x4, 0x4, 0x4, 0xf7a9}, 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), 0x0}, 0x20) 13:43:08 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0x17, 0x0, 0x4, 0xf7a9}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x20) 13:43:08 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000740)={0x6, 0x4, &(0x7f0000000580)=@framed={{}, [@alu={0x7, 0x1, 0x0, 0x0, 0x0, 0x18}]}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf7, &(0x7f0000000640)=""/247, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:43:08 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0x19, 0x4, 0x4, 0xf7a9}, 0x48) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f00000001c0)={r0, &(0x7f0000000000), 0x0}, 0x20) 13:43:08 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{}]}]}}, &(0x7f0000000200)=""/234, 0x32, 0xea, 0x1}, 0x20) 13:43:13 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0x8, 0x4, 0x4, 0xf7a9, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x40000}, 0x48) 13:43:13 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000740)={0x6, 0x3, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf600}}, &(0x7f0000000500)='syzkaller\x00', 0x5, 0xf7, &(0x7f0000000640)=""/247, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:43:13 executing program 4: mq_open(&(0x7f0000000000)='BEN\x89\xfa\xff', 0x80, 0x163, &(0x7f0000000040)) 13:43:13 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0x7, 0x4, 0x300, 0xf7a9, 0x0, 0x1}, 0x48) 13:43:13 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_devices(r0, &(0x7f0000000100)='devices.deny\x00', 0x2, 0x0) write$cgroup_devices(r1, 0x0, 0x0) 13:43:13 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x20000000, 0x0, 0x1}, 0x48) 13:43:13 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_pressure(r0, &(0x7f0000000440)='memory.pressure\x00', 0x2, 0x0) close(r1) 13:43:13 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000740)={0x6, 0x4, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000}, [@alu={0x7, 0x1}]}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf7, &(0x7f0000000640)=""/247, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:43:13 executing program 2: socketpair(0x11, 0x80003, 0x0, &(0x7f0000000000)) 13:43:13 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000740)={0x6, 0x3, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c00}}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf7, &(0x7f0000000640)=""/247, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:43:13 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000740)={0x6, 0x4, &(0x7f0000000580)=@framed={{}, [@alu={0x7, 0x1, 0x3}]}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf7, &(0x7f0000000640)=""/247, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:43:13 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0x9, 0x4, 0x4, 0xf7a9, 0x140}, 0x48) 13:43:19 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0x19, 0x0, 0x4}, 0x48) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000400), 0x8) 13:43:19 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0x19, 0x4, 0x4, 0xf7a9, 0x8}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000100)={r0, 0x0}, 0x20) 13:43:19 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func={0x0, 0x0, 0x0, 0x6, 0x3}]}}, &(0x7f0000000200)=""/155, 0x26, 0x9b, 0x1}, 0x20) 13:43:19 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_freezer_state(r0, &(0x7f0000000180), 0x2, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000440)='FROZEN\x00', 0x7) 13:43:19 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000380)=""/220, 0x2a, 0xdc, 0x1}, 0x20) 13:43:19 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x20000000, 0x0, 0x1}, 0x48) 13:43:19 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000740)={0x6, 0x4, &(0x7f0000000580)=@framed={{}, [@alu={0x7, 0x0, 0x4}]}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf7, &(0x7f0000000640)=""/247, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:43:19 executing program 4: syz_clone(0x4c240000, 0x0, 0x0, 0x0, 0x0, 0x0) 13:43:19 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0x19, 0x4, 0x4, 0xf7a9}, 0x48) bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f00000001c0)={r0, 0x0, 0x0}, 0x20) 13:43:19 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0xe, 0x4, 0x4, 0xf7a9}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, &(0x7f0000000000), 0x0}, 0x20) 13:43:19 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000740)='freezer.state\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000007c0)={r1, 0x11, 0x0, 0x0, 0x0}, 0x20) 13:43:19 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000c00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000001fc0)={0x0, 0x0, &(0x7f0000001f40)=[{0x0}, {0x0, 0x11000000}, {&(0x7f0000000f40)="bb", 0x1}], 0x3}, 0x0) 13:43:27 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0xffff, 0x1022, 0x0, 0x0) symlink(&(0x7f0000000080)='.\x00', &(0x7f0000000000)='./file0\x00') chroot(&(0x7f0000000340)='./file0/file0\x00') chroot(&(0x7f0000000240)='./file0/file0/../file0\x00') 13:43:27 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0x14, 0x4, 0x4, 0xf7a9}, 0x48) 13:43:27 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0x10, 0x4, 0x0, 0x9bad}, 0x48) 13:43:27 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000c40)="d7b86f842dd516e2c1a6b7ded6124962cc08c48b60f78bfb1f4c16fe888d", 0x1e}, {0x0}, {&(0x7f0000000440)="807f68e09ab2282bd3a3222621fb142e828ff2a66b2744364554db53a5fcb1ea2985b0bf5ad49efb5fd064447d69c75bbb23db58b5e19fdaa3d311c7f6c2567f5c9f41a504248f76bc3b5e16e25c704d22d51dbb837b32362d18ae3e4ffcfe5a529f978c9a2d1a078a2372b5157cccc2767a5bb6ebbbf5fd5d0570fbbcec0c94fecd5fe3e9e5cfab90cc02e010aef4713f34046527ead6ff27671813c51f35981ff761e7aff3aa918fd659add18012554a589b55f45e111ea173", 0xba}, {&(0x7f0000000500)="542465d79a4bc4703069b72790c4669fcd920c000af8b668b2e143e31966e33ef3ea6cc756cd1a7829dcfa9554f19e66d200a83338479e7cf310c911a0c6f48865c04f329638e4880f3960524845ca7747c95ce0eb192ed7735d31c05b81644b0a74ca24e3956802b7b77420a656d11c2dae72c12d3242633bdcaf4ad35d438ffab0c3d4c58a8018e29629d9abe5193ecd48e945ac74260068ed0cda5ab5044b9fd63a3ee2843783", 0xa8}], 0x4}, 0x0) recvmsg$unix(r1, &(0x7f0000000840)={&(0x7f0000000000), 0x6e, &(0x7f00000007c0)=[{&(0x7f00000000c0)=""/153, 0x99}, {&(0x7f00000006c0)=""/231, 0xe7}], 0x2, &(0x7f0000000880)=ANY=[], 0x38}, 0x42) 13:43:27 executing program 4: r0 = socket(0x18, 0x3, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f0000000140), 0xc, 0x0, 0x0, 0x0, 0x248}, 0x0) 13:43:27 executing program 3: pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x0) ioctl$KDSKBMODE(r0, 0x20004b07, &(0x7f0000000000)) 13:43:27 executing program 4: r0 = perf_event_open(&(0x7f0000000d00)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 13:43:27 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000740)={0x6, 0x4, &(0x7f0000000580)=@framed={{}, [@alu={0x0, 0x0, 0x4}]}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf7, &(0x7f0000000640)=""/247, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:43:27 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x16, 0x0, 0x35a, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x5}, 0x48) 13:43:27 executing program 5: mknod(&(0x7f0000000000)='./bus\x00', 0x8000, 0x4086333) open$dir(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) 13:43:27 executing program 3: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='\x00'}, 0x10) 13:43:27 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002ec0)={&(0x7f0000002d80)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000002dc0)=""/214, 0x26, 0xd6, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000001c0)={r0, 0x20, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0}}, 0x10) 13:43:32 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000080), 0xfb2, 0x2001) ioctl$BTRFS_IOC_WAIT_SYNC(r0, 0x5521, 0x0) 13:43:32 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f0000000000)={0x101}, 0x88) 13:43:32 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@ipmr_newroute={0x1c, 0x2e, 0x7f7f}, 0x1c}}, 0x0) 13:43:32 executing program 5: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f00000001c0), 0x20000, 0x0) 13:43:32 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func={0x0, 0x2, 0x0, 0x6}]}}, &(0x7f0000000200)=""/155, 0x26, 0x9b, 0x1}, 0x20) 13:43:32 executing program 2: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) 13:43:32 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, 0x0) 13:43:32 executing program 4: bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000800)="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", 0x5fa}], 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/notes', 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x0) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3000}, [@alu={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @jmp={0x5, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, 0x0) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f0000000800)={{}, 0x0, 0x0, @inherit={0x48, 0x0}, @subvolid=0x1f}) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) 13:43:32 executing program 2: syz_clone3(&(0x7f00000002c0)={0xa044100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 13:43:32 executing program 5: mincore(&(0x7f0000400000/0xc00000)=nil, 0xc00000, &(0x7f0000000040)=""/41) 13:43:32 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x7) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000b63fe4)={0xa, 0x7, 0x0, @loopback}, 0x1c) 13:43:32 executing program 2: io_setup(0xe0, &(0x7f0000000000)=0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = creat(&(0x7f0000000300)='./file0\x00', 0x0) io_submit(r0, 0x2, &(0x7f00000014c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1, r2}]) [ 160.066844][ T23] audit: type=1400 audit(1675777412.124:231): avc: denied { read } for pid=7312 comm="syz-executor.2" path="socket:[28979]" dev="sockfs" ino=28979 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 13:43:38 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1c5342, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000d70d) setxattr$trusted_overlay_nlink(&(0x7f0000000140)='./bus\x00', &(0x7f0000000180), 0x0, 0x0, 0x0) 13:43:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f2, &(0x7f0000000000)={'sit0\x00', 0x0}) 13:43:38 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x2}}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x2}}]}}, &(0x7f0000000180)=""/4096, 0x4a, 0x1000, 0x1}, 0x20) 13:43:38 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f0000000200)=""/195, 0x26, 0xc3, 0x1}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) 13:43:38 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001600)={0x6, 0x7, &(0x7f0000001500)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}]}, &(0x7f00000012c0)='syzkaller\x00', 0x1, 0x25, &(0x7f0000001480)=""/37, 0x41100, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001580)={0xa}, 0x8, 0x10, &(0x7f00000015c0)={0x0, 0xe, 0x0, 0x4}, 0x10}, 0x80) 13:43:38 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x1}, 0x10) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f00000000c0), 0x8) [ 166.265406][ T23] audit: type=1400 audit(1675777418.324:232): avc: denied { write } for pid=7316 comm="syz-executor.0" name="001" dev="devtmpfs" ino=143 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 13:43:38 executing program 1: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder0\x00', 0x2, 0x0) mmap$binder(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) 13:43:38 executing program 4: getresgid(&(0x7f0000002840), &(0x7f0000002880), 0x0) 13:43:38 executing program 2: syz_clone(0x2000000, 0x0, 0x0, &(0x7f0000000740), 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000300)=[0x0, 0x0], 0x0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000003c0), 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000b80)={0xffffffffffffffff, 0xe0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000940)=[0x0], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a00), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) 13:43:38 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) recvfrom(r0, &(0x7f0000000140)=""/194, 0xc2, 0x0, 0x0, 0x0) dup2(r0, r1) 13:43:38 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x2, 0x0) ioctl$EVIOCSREP(r0, 0x40084503, &(0x7f0000000080)) [ 166.347956][ T23] audit: type=1400 audit(1675777418.394:233): avc: denied { connect } for pid=7324 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 166.368101][ T23] audit: type=1400 audit(1675777418.394:234): avc: denied { setopt } for pid=7324 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 13:43:38 executing program 4: syz_open_dev$loop(&(0x7f0000000040), 0x8a, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) syz_genetlink_get_family_id$gtp(0x0, 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) 13:43:38 executing program 5: pipe(0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) socket$inet6(0x18, 0x3, 0x2c) 13:43:44 executing program 0: socket$inet(0x2, 0x5, 0x2) 13:43:44 executing program 3: syz_clone(0x40240000, &(0x7f00000003c0)="381f20ef467a3aeb3f339e49a8461455fc4911a98f066cc41df86a8879fa70a04fb6c1cbe3ca1ac12e014903d87b898cb8f604f42a8d9b07b3d8ac1610906a70a86429180428cc5ef4d7728923051d0d076a37e9455f2aaf15c0b0a2bd2dad783971c28dc520a19ce37f24e0abc58277910c52bfa51100d9cef4a368d7178a7fee71cb2fbc28328b0e933394a9", 0x8d, &(0x7f0000000000), 0x0, &(0x7f0000000200)="23c0049731dbc70631d9b9d60c72f27d8fe06c14f8bda7c0fdf56a86aaea67e2b4913bdf32120c4441178f44be539bd9596a59227ccdee77fe08f3d7d4e2ac627b164f2e7ed0ab5935909aee42b20ca89136f0ccc7417dbfb8c2d81782832cc013") r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000280)={0x0, r0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r1, 0x0, 0x1, &(0x7f0000000040)='\x00'}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0xd, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) 13:43:44 executing program 1: mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) munmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000) mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) 13:43:44 executing program 2: syz_clone(0x0, &(0x7f0000002500), 0x0, 0x0, 0x0, &(0x7f0000002600)="05") 13:43:44 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r0, &(0x7f0000001740)={&(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f0000001700)=[@rights], 0x18}, 0x0) 13:43:44 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r0, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)=[@rights], 0x10}, 0x0) 13:43:44 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect(r0, &(0x7f0000000100), 0xa) 13:43:44 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) sendmsg$unix(r0, &(0x7f0000001740)={&(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e, 0x0}, 0x4008050) 13:43:44 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000040)='=', 0x1, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000080)="85", 0x1, 0x0, 0x0, 0x0) shutdown(r0, 0x0) recvmsg(r0, &(0x7f0000001440)={0x0, 0x16, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0xf99e}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) 13:43:44 executing program 2: syz_emit_ethernet(0x46, &(0x7f0000000100)={@broadcast, @local, @val={@void}, {@arp={0x806, @ether_ipv6={0x1, 0x86dd, 0x6, 0x10, 0x0, @empty, @private1, @link_local, @ipv4={'\x00', '\xff\xff', @dev}}}}}, 0x0) 13:43:44 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000040)='=', 0x1, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000080)="85", 0x1, 0x0, 0x0, 0x0) shutdown(r0, 0x0) recvmsg(r0, &(0x7f0000001440)={0x0, 0x16, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0xf99e}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) 13:43:44 executing program 5: syz_emit_ethernet(0x42, &(0x7f0000000280)={@dev={'\xaa\xaa\xaa\xaa\xaa', 0x2b}, @dev, @val={@void}, {@mpls_mc={0x8848, {[], @ipv6=@udp={0x0, 0x6, "4a75be", 0x8, 0x11, 0x0, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {[], {0x0, 0x0, 0x8}}}}}}}, 0x0) [ 172.635080][ T23] audit: type=1400 audit(1675777424.694:235): avc: denied { name_bind } for pid=7361 comm="syz-executor.1" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 172.657061][ T23] audit: type=1400 audit(1675777424.694:236): avc: denied { node_bind } for pid=7361 comm="syz-executor.1" saddr=255.255.255.255 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 13:43:51 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000280)=ANY=[], 0xa5) 13:43:51 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_DEL(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000002d00)={0x70, 0x3, 0x7, 0x101, 0x0, 0x0, {}, [@NFACCT_FILTER={0x44, 0x7, 0x0, 0x1, [@NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x80}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0xffffffff}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0xfff}, @NFACCT_FILTER_VALUE={0x8}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x8}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x401}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0xcc2}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x8}]}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0xcd}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x70}, 0x1, 0x0, 0x0, 0x84811}, 0x20044014) 13:43:51 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000040)='=', 0x1, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000080)="85", 0x1, 0x0, 0x0, 0x0) shutdown(r0, 0x0) recvmsg(r0, &(0x7f0000001440)={0x0, 0x16, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0xf99e}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) 13:43:51 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newtaction={0x6c, 0x30, 0xffff, 0x0, 0x0, {}, [{0x58, 0x1, [@m_ife={0x54, 0x1, 0x0, 0x0, {{0x8}, {0x2c, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c}, @TCA_IFE_METALST={0xc, 0x6, [@IFE_META_PRIO={0x8, 0x2}]}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x6c}}, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) 13:43:51 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_DYING(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x6, 0x1, 0x101}, 0x14}}, 0x0) 13:43:51 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x24, 0x7, 0x6, 0x301, 0x0, 0x0, {}, [@IPSET_ATTR_FLAGS={0x8, 0x6, 0x1, 0x0, 0x7ff}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 13:43:51 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x200}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @private0, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 13:43:51 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000001680)={0x0, {0x2, 0x0, @remote}, {0x4, 0x0, @dev}, {0x2, 0x0, @local}, 0x4, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)='erspan0\x00'}) 13:43:51 executing program 2: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f00000022c0)={&(0x7f0000001ec0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000002280)={&(0x7f0000001f00)={0x14}, 0x14}}, 0x0) 13:43:51 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000040)='=', 0x1, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000080)="85", 0x1, 0x0, 0x0, 0x0) shutdown(r0, 0x0) recvmsg(r0, &(0x7f0000001440)={0x0, 0x16, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0xf99e}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) 13:43:51 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x24, 0x7, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FLAGS={0x8}]}, 0x24}}, 0x0) 13:43:51 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x200}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @private0, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 13:43:58 executing program 0: r0 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x2c, r0, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x8000}]}, 0x2c}}, 0x0) 13:43:58 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x28, 0x3, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x28}, 0x1, 0x0, 0x0, 0x24000001}, 0x44000) 13:43:58 executing program 4: syz_emit_ethernet(0xe4, &(0x7f0000000080)=ANY=[@ANYBLOB="bbbbbbbbbbbbaaaaaaaaaabb08063b0008"], 0x0) 13:43:58 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='net_prio.prioidx\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[], 0x6db6e571) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x1, 0x11, r0, 0x0) r1 = socket$l2tp(0x2, 0x2, 0x73) connect$inet(r1, &(0x7f0000000480)={0x2, 0x0, @local}, 0x10) 13:43:58 executing program 2: r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000140)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x1011, &(0x7f0000000380)=""/4113, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'veth1_vlan\x00', 0x0}) r3 = bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000000c0)={r0, r2}, 0x10) bpf$LINK_DETACH(0x1d, &(0x7f0000000080)=r3, 0x4) 13:43:58 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x200}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @private0, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 13:43:58 executing program 4: syz_emit_ethernet(0xe4, &(0x7f0000000080)=ANY=[@ANYBLOB="bbbbbbbbbbbbaaaaaaaaaabb81003b0081"], 0x0) 13:43:58 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, &(0x7f0000000000)=0x2) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'wlan1\x00'}) 13:43:58 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x200}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @private0, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 13:43:58 executing program 3: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000003700)={0x2, 0x4e21, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000440)={0x2, 0x4e21, @empty}, 0x10) 13:43:58 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)={0x2c, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x2c}}, 0x0) 13:43:58 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x200}, 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @private0, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 13:44:02 executing program 0: r0 = open(&(0x7f0000000200)='./bus\x00', 0x602c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/vmallocinfo\x00', 0x0, 0x0) timer_create(0x9, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000000180)) timer_settime(0x0, 0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x4000000000010046) 13:44:02 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000000, &(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @private0, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 13:44:02 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x29}}}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000300)={0x0, @in6={{0xa, 0x0, 0xa, @empty}}, 0x0, 0x0, 0x0, 0x0, 0xb3550aa4ba878354}, 0x9c) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001800), 0xffffffffffffffff) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$ETHTOOL_MSG_COALESCE_SET(r2, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000000)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0a000000000000000900230000000840090009000088080004000000000008000a0000000000"], 0x2c}}, 0x0) r3 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000000)={0x11, @local, 0x0, 0x1000000, 'lblcr\x00', 0x0, 0x0, 0x67}, 0x2c) accept4$inet(r3, &(0x7f0000000080)={0x2, 0x0, @remote}, &(0x7f00000001c0)=0x10, 0x0) getsockopt(r2, 0x5, 0x8001, &(0x7f0000000100)=""/148, &(0x7f0000000040)=0x94) 13:44:02 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)={0x40, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0x18, 0x7, 0x0, 0x1, [@IPSET_ATTR_IFACE={0x14, 0x17, 'pim6reg1\x00'}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x40}}, 0x0) 13:44:02 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)={0x2c, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x2c}}, 0x0) 13:44:02 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x200}, 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @private0, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 13:44:02 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)={0x2c, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x2c}}, 0x0) 13:44:02 executing program 2: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, 0x0) 13:44:02 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x800, 0x0, 0x1, 0x1}, 0x20) 13:44:02 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x200}, 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @private0, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 13:44:02 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)={0x2c, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x2c}}, 0x0) 13:44:02 executing program 2: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$sock_timeval(r0, 0x1, 0x42, &(0x7f0000000000), 0x10) [ 186.167554][ T7420] warning: checkpointing journal with EXT4_IOC_CHECKPOINT_FLAG_ZEROOUT can be slow [ 190.294154][ T23] audit: type=1400 audit(1675777442.354:237): avc: denied { create } for pid=7438 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 190.373164][ T23] audit: type=1400 audit(1675777442.384:238): avc: denied { bind } for pid=7438 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 190.392814][ T23] audit: type=1400 audit(1675777442.384:239): avc: denied { connect } for pid=7438 comm="syz-executor.1" lport=20001 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 190.413747][ T23] audit: type=1400 audit(1675777442.404:240): avc: denied { setopt } for pid=7438 comm="syz-executor.1" laddr=::ffff:172.20.20.41 lport=20001 faddr=::ffff:172.20.20.41 fport=20001 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 190.441747][ T23] audit: type=1400 audit(1675777442.474:241): avc: denied { accept } for pid=7438 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 190.462077][ T34] IPVS: starting estimator thread 0... [ 190.552548][ T7460] IPVS: using max 4080 ests per chain, 204000 per kthread 13:44:08 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet(0x2, 0xa, 0x0) dup3(r0, r1, 0x0) 13:44:08 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x1c, 0x7, 0x6, 0x301, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) 13:44:08 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @private0, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 13:44:08 executing program 2: r0 = socket(0x2, 0x1, 0x0) sendmsg$unix(r0, &(0x7f0000003680)={&(0x7f0000000000)=@abs, 0x8, &(0x7f00000034c0)=[{&(0x7f0000000040)='p', 0x1}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, &(0x7f0000003600)=[@rights], 0x10}, 0x0) 13:44:08 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) open(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 13:44:08 executing program 4: sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)={0x2c, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x2c}}, 0x0) 13:44:08 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000740), 0x0, 0x0) ioctl$EVIOCGEFFECTS(r0, 0x80044584, &(0x7f0000000b00)=""/150) 13:44:08 executing program 4: sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)={0x2c, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x2c}}, 0x0) [ 196.509259][ T23] audit: type=1400 audit(1675777448.564:242): avc: denied { wake_alarm } for pid=7463 comm="syz-executor.0" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 13:44:08 executing program 4: sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)={0x2c, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x2c}}, 0x0) 13:44:08 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x4, 0xa82) r1 = memfd_create(&(0x7f0000000480)='\x02\a\xc5(\xec[r\xe1:', 0x0) fcntl$setstatus(r1, 0x4, 0x4400) pwritev(r1, &(0x7f00000002c0)=[{&(0x7f0000000580)='?', 0x1}], 0x1, 0x81806, 0x2) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x84000008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) process_vm_readv(0x0, &(0x7f0000000340)=[{&(0x7f0000000300)=""/28, 0x1c}], 0x1, &(0x7f0000000540)=[{&(0x7f00000004c0)=""/84, 0x54}, {&(0x7f0000000400)=""/4, 0x4}, {&(0x7f0000000680)=""/118, 0x76}, {&(0x7f00000007c0)=""/195, 0xc3}], 0x4, 0x0) r5 = open(&(0x7f0000000000)='./file1\x00', 0x800, 0x108) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) sched_setscheduler(0x0, 0x3, &(0x7f00000005c0)=0x1000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000380)='ext4_discard_preallocations\x00'}, 0x10) creat(&(0x7f0000000240)='./file0\x00', 0x0) r6 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r6, 0x8923, &(0x7f0000000040)={'tunl0\x00', &(0x7f0000000280)=ANY=[@ANYRESDEC=r5]}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r6, 0x89f1, &(0x7f00000003c0)={'gre0\x00', &(0x7f00000007c0)=ANY=[]}) r7 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg$inet(r7, &(0x7f0000007580)=[{{&(0x7f0000001ec0)={0x2, 0x4e21}, 0x10, 0x0, 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="1400000000000000189ad9755aa129b6398ed1165eda1957dc6c707fb04ac6dca6fa550b4953220961145aa0aabb0b696bd56f12fefcec56f1485c80738243b3642c8ee1925fa4abff719f29054ed55e2f0bd2a057095a365eb3398b169546adcd51ae3e1aa7303c985ae1b51d8cff54b203e3d7ea972aa9ba0948c13bf335e69501b10056240c4c3126da9364389596e35428ee87c74c98d5bf6f62838a27daeeea720fa81fdb7d2c62915ca2576c9ab71744b9164b81853f61313dd3149d3d569a02cf14648d51102f4fe3ac40f78a39dbd063dda7d6c163e62b4e65e260fae6fed28d705dd5d7356a9b647893dfb8dc28ddf768eeebf853c261ab8a401306656819c929bd417f019a9545e4194f923371faee3e79fcc6cbb92a4b3d9d64021594d270f1cb980eaf4142c8ce42c9df362c0388f42cfcd5ee00000000eef27853d6fd44e1fb383923d1c72dede330acce29576560bf239b2b3693d18f4aed3bef4b5b25f2e5d8d329c35a328bc1dfaed340c30fd35ac04772d64e374fe238e125dd09e9f432f3ffeb6fee53052e22dde08a176a2495b4142017930b40711fff1c0965181c8ddbcf602ad831618d5996e43a595f8dc3b6e7fc1c92a46893fa1ceb1ae484920c8b70ed490f5a7dfc4d8be23f3e52"], 0x18}}], 0x1, 0x0) sendfile(r0, r0, 0x0, 0x24002da8) 13:44:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_mreqn(r0, 0x0, 0x28, 0x0, 0x0) 13:44:08 executing program 2: syslog(0x3, &(0x7f0000000000)=""/84, 0x54) [ 196.570369][ T23] audit: type=1400 audit(1675777448.624:243): avc: denied { read } for pid=7465 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 196.636795][ T7485] loop4: detected capacity change from 0 to 1036 [ 196.788809][ T7489] €: renamed from tunl0 (while UP) [ 202.882158][ T7495] syz-executor.0 uses obsolete (PF_INET,SOCK_PACKET) 13:44:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000140)={'sit0\x00', &(0x7f00000001c0)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x6, 0x4, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, 0x4, 0x0, @multicast2, @loopback, {[@generic={0x0, 0x2}]}}}}}) 13:44:15 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @private0, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 13:44:15 executing program 1: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x602c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/vmallocinfo\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) sendfile(r0, r1, 0x0, 0x4000000000010046) 13:44:15 executing program 4: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)={0x2c, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x2c}}, 0x0) 13:44:15 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x18, &(0x7f0000000040)={[{@noload}]}, 0x5, 0x5c3, &(0x7f0000000100)="$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") 13:44:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = signalfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8) dup3(r1, r0, 0x0) 13:44:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000140)={'tunl0\x00', &(0x7f0000000100)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @broadcast}}}}) 13:44:15 executing program 4: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)={0x2c, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x2c}}, 0x0) 13:44:15 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @private0, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 13:44:15 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x200}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @private0, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 13:44:15 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, 0x0, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8) openat$incfs(r0, &(0x7f00000012c0)='.log\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'dummy0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) [ 203.693844][ T7498] loop2: detected capacity change from 0 to 1024 [ 203.701609][ T7498] EXT4-fs (loop2): Can't support bigalloc feature without extents feature [ 203.701609][ T7498] 13:44:15 executing program 4: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)={0x2c, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x2c}}, 0x0) 13:44:22 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x18, &(0x7f0000000040)={[{@noload}]}, 0x5, 0x5c3, &(0x7f0000000100)="$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") 13:44:22 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r0, 0x0, 0x0) 13:44:22 executing program 3: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r0, 0x8040942d, 0x0) 13:44:22 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000240)={0x6, 0xc, &(0x7f0000000100)=@framed={{}, [@initr0, @generic, @btf_id, @map_val, @map_idx]}, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:44:22 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x200}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @private0, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 13:44:22 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) readv(r0, &(0x7f0000002a40)=[{&(0x7f0000002880)=""/34, 0x22}], 0x1) 13:44:22 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r0, 0x0, 0x0) 13:44:22 executing program 3: ioprio_set$pid(0x3, 0xffffffffffffffff, 0x4007) 13:44:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89b1, &(0x7f0000000180)={'gre0\x00', 0x0}) 13:44:22 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x200}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @private0, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 13:44:22 executing program 3: socket$tipc(0x1e, 0x2, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x14d842, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.effective_cpus\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.effective_cpus\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYRES8=r0], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10012, r1, 0x0) open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) r3 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$FIONREAD(r3, 0x541c, &(0x7f0000000000)) 13:44:22 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r0, 0x0, 0x0) [ 209.973752][ T7534] loop2: detected capacity change from 0 to 1024 [ 209.984464][ T7534] EXT4-fs (loop2): Can't support bigalloc feature without extents feature [ 209.984464][ T7534] 13:44:22 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x18, &(0x7f0000000040)={[{@noload}]}, 0x5, 0x5c3, &(0x7f0000000100)="$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") [ 210.069467][ T7548] loop2: detected capacity change from 0 to 1024 [ 210.074430][ T7522] I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 [ 210.085721][ T7548] EXT4-fs (loop2): Can't support bigalloc feature without extents feature [ 210.085721][ T7548] 13:44:26 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f00000001c0)={@multicast2, @private}, 0xc) 13:44:26 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/vmallocinfo\x00', 0x0, 0x0) preadv(r0, &(0x7f00000003c0)=[{&(0x7f0000000300)=""/161, 0xa1}], 0x1, 0x9, 0x0) 13:44:26 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r0, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) 13:44:26 executing program 1: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)={0x10d0, 0x12, 0x23, 0x70bd25, 0x25dfdbff, {0x22, 0x8, 0xa6, 0x9, {0x4e23, 0x4e20, [0x1, 0x5, 0x3, 0x8001], [0x81, 0x3, 0x200, 0x27d], 0x0, [0x6, 0x2]}, 0x9}, [@INET_DIAG_REQ_BYTECODE={0x7d, 0x1, "ce9a68c01445c2518d7ee8688c72ffc8b8a37a053551bd26a943d4e16b40ce30a124dac8c4d2f5c51654c671c6dbb45ae68e4ad0ee4818504773d5755e9c9b259a219bbf8a1ba965456abd16ded2c58a79be2c3d7777390b7a55278203c8345c1b604fb5d780a52dd6e8a879ddef6c330d23af02a03d5a2860"}, @INET_DIAG_REQ_BYTECODE={0x1004, 0x1, "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"}]}, 0x10d0}, 0x1, 0x0, 0x0, 0x20000000}, 0x40000) 13:44:26 executing program 5: bind$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x200}, 0x1c) listen(0xffffffffffffffff, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @private0, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 13:44:26 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x18, &(0x7f0000000040)={[{@noload}]}, 0x5, 0x5c3, &(0x7f0000000100)="$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") 13:44:26 executing program 5: bind$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x200}, 0x1c) listen(0xffffffffffffffff, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @private0, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 13:44:26 executing program 3: sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x2c, 0x0, 0x200, 0x70bd2d, 0x25dfdbfd, {}, [@GTPA_NET_NS_FD={0x8}, @GTPA_O_TEI={0x8}, @GTPA_PEER_ADDRESS={0x8, 0x4, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, 0x2c}, 0x1, 0x0, 0x0, 0x1}, 0x800) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'syztnl2\x00', 0x0, 0x10, 0x10, 0x7, 0x800, {{0x5, 0x4, 0x0, 0x2e, 0x14, 0x64, 0x0, 0x5, 0x4, 0x0, @rand_addr=0x64010100, @remote}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'gre0\x00', &(0x7f0000000100)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @remote}}}}) 13:44:26 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r0, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) 13:44:26 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000240)={0x12, 0x3, &(0x7f0000000100)=@framed, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 214.132363][ T23] audit: type=1400 audit(1675777466.184:244): avc: denied { create } for pid=7554 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 214.161559][ T7560] loop2: detected capacity change from 0 to 1024 13:44:26 executing program 5: bind$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x200}, 0x1c) listen(0xffffffffffffffff, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @private0, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 13:44:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8929, &(0x7f0000000180)={'gre0\x00', 0x0}) 13:44:26 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r0, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) [ 214.179642][ T23] audit: type=1400 audit(1675777466.214:245): avc: denied { write } for pid=7554 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 214.199548][ T7560] EXT4-fs (loop2): Can't support bigalloc feature without extents feature [ 214.199548][ T7560] [ 214.200395][ T23] audit: type=1400 audit(1675777466.214:246): avc: denied { nlmsg_read } for pid=7554 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 13:44:30 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @erspan={{0x4}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6}, @IFLA_GRE_IFLAGS={0x6}]}}}]}, 0x44}}, 0x0) 13:44:30 executing program 3: r0 = open(&(0x7f0000000200)='./bus\x00', 0x602c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/vmallocinfo\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x4000000000010046) 13:44:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_mreqn(r0, 0x0, 0x8, 0x0, 0x0) 13:44:30 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x200}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @private0, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 13:44:30 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 13:44:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$inet(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x2, 0x4e24, @private}, 0x10, 0x0, 0x0, &(0x7f0000000100)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x24, 0x0, 0x7, {[@timestamp_addr={0x44, 0x14, 0xd, 0x1, 0x0, [{@local}, {@loopback}]}]}}}], 0x40}, 0x0) 13:44:30 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 13:44:30 executing program 1: r0 = socket$tipc(0x1e, 0x2, 0x0) ppoll(&(0x7f0000000500)=[{r0}], 0x1, &(0x7f0000000540), 0x0, 0x0) 13:44:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$inet(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x2, 0x4e24, @private}, 0x10, 0x0, 0x0, &(0x7f0000000100)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x24, 0x0, 0x7, {[@timestamp_addr={0x44, 0x14, 0xd, 0x1, 0x0, [{@local}, {@loopback}]}]}}}], 0x40}, 0x0) 13:44:30 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x200}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @private0, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 13:44:30 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 13:44:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$inet(r0, &(0x7f0000000680)={&(0x7f0000000200)={0x2, 0x4e22, @broadcast}, 0x10, 0x0, 0x0, &(0x7f0000000500)=[@ip_retopts={{0x14, 0x0, 0x7, {[@rr={0x7, 0x3}]}}}], 0x18}, 0x0) 13:44:35 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x200}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @private0, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 13:44:35 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$PIO_FONTX(r0, 0x4b41, 0x0) 13:44:35 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)={0x2c, 0xb, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x2c}}, 0x0) 13:44:35 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$PIO_FONTX(r0, 0x560a, &(0x7f0000000000)={0x6f, 0x0, 0x0}) 13:44:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$inet(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x2, 0x4e24, @private}, 0x10, 0x0, 0x0, &(0x7f0000000100)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x24, 0x0, 0x7, {[@timestamp_addr={0x44, 0x14, 0xd, 0x1, 0x0, [{@local}, {@loopback}]}]}}}], 0x40}, 0x0) 13:44:35 executing program 1: perf_event_open(&(0x7f000001d000)={0x5, 0x80, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x3, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x12) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@empty}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000002c0)=ANY=[@ANYBLOB="e0000002ac1414aa0000000002"], 0x18) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000200)=""/148, 0x94}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r1, &(0x7f0000000480), 0x100000000000014c, 0x0, 0x0) 13:44:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$inet(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x2, 0x4e24, @private}, 0x10, 0x0, 0x0, &(0x7f0000000100)=[@ip_tos_int={{0x14}}, @ip_retopts={{0x24, 0x0, 0x7, {[@timestamp_addr={0x44, 0x14, 0xd, 0x1, 0x0, [{@local}, {@loopback}]}]}}}], 0x40}, 0x0) 13:44:35 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)={0x2c, 0xb, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x2c}}, 0x0) 13:44:35 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8923, &(0x7f0000000180)={'gre0\x00', 0x0}) 13:44:35 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x200}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @private0, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 13:44:35 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000240)={0x6, 0x5, &(0x7f0000000100)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x6}]}, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:44:35 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x7, &(0x7f0000000040)={[{@noload}]}, 0x5, 0x5c3, &(0x7f0000000100)="$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") 13:44:35 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)={0x2c, 0xb, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x2c}}, 0x0) [ 223.419256][ T7636] loop2: detected capacity change from 0 to 1024 [ 223.426867][ T7636] EXT4-fs (loop2): blocks per group (131072) and clusters per group (8192) inconsistent 13:44:39 executing program 0: r0 = socket$l2tp6(0xa, 0x2, 0x73) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8927, &(0x7f0000000140)={'vxcan1\x00'}) 13:44:39 executing program 1: semop(0x0, &(0x7f0000000340)=[{0x0, 0x7f}], 0x1) 13:44:39 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x200}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @private0, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 13:44:39 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x1c, 0x1, 0x4, 0x801, 0x0, 0x0, {}, [@NFULA_CFG_CMD={0x5, 0x1, 0x4}]}, 0x1c}}, 0x0) 13:44:39 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)={0x20, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x20}}, 0x0) 13:44:39 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x16}]}) 13:44:39 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x200}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @private0, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 13:44:39 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)={0x20, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x20}}, 0x0) 13:44:39 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 13:44:39 executing program 2: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) sendmsg$802154_dgram(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x24, @short}, 0x14, &(0x7f0000000080)={0x0}}, 0x0) [ 227.495023][ T23] audit: type=1326 audit(1675777479.554:247): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7648 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f994c86d0f9 code=0x0 13:44:39 executing program 1: prctl$PR_GET_THP_DISABLE(0x8) 13:44:39 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)={0x20, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x20}}, 0x0) [ 227.553807][ T23] audit: type=1400 audit(1675777479.604:248): avc: denied { read } for pid=7654 comm="syz-executor.3" name="loop-control" dev="devtmpfs" ino=99 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 227.578333][ T23] audit: type=1400 audit(1675777479.604:249): avc: denied { open } for pid=7654 comm="syz-executor.3" path="/dev/loop-control" dev="devtmpfs" ino=99 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 227.603257][ T23] audit: type=1400 audit(1675777479.604:250): avc: denied { ioctl } for pid=7654 comm="syz-executor.3" path="/dev/loop-control" dev="devtmpfs" ino=99 ioctlcmd=0x4c80 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 227.636082][ T23] audit: type=1400 audit(1675777479.644:251): avc: denied { create } for pid=7657 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 227.656407][ T23] audit: type=1400 audit(1675777479.644:252): avc: denied { write } for pid=7657 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 13:44:43 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$PIO_FONTX(r0, 0x5413, &(0x7f0000000000)={0x0, 0x0, 0x0}) 13:44:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x5, 0x80, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x3, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x12) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@empty}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000002c0)=ANY=[@ANYBLOB="e0000002ac1414aa0000000002"], 0x18) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000200)=""/148, 0x94}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000180)) preadv(r1, &(0x7f0000000480), 0x100000000000014c, 0x0, 0x0) 13:44:43 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)={0x24, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x24}}, 0x0) 13:44:43 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCSWINSZ(r0, 0x5412, &(0x7f0000000080)={0x9}) 13:44:43 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100), 0x1c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x200}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @private0, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 13:44:43 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x3, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x12) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@empty}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000002c0)=ANY=[@ANYBLOB="e0000002ac1414aa0000"], 0x18) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000200)=""/148, 0x94}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000180)) preadv(r1, &(0x7f0000000480), 0x100000000000014c, 0x0, 0x0) 13:44:43 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)={0x24, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x24}}, 0x0) 13:44:43 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000002bc0)={0x0, 0x0, &(0x7f0000002b80)={&(0x7f0000002ac0)={{0x14}, [@NFT_MSG_DELTABLE={0x20, 0x2, 0xa, 0x801, 0x0, 0x0, {0x7}, [@NFTA_TABLE_HANDLE={0xc}]}, @NFT_MSG_NEWTABLE={0x28, 0x0, 0xa, 0x801, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}, @NFTA_TABLE_FLAGS={0x8}]}], {0x14}}, 0x70}}, 0x0) 13:44:43 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100), 0x1c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x200}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @private0, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 13:44:43 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x24, 0x0, 0xb, 0x101, 0x0, 0x0, {}, [@NFTA_COMPAT_NAME={0xe, 0x1, '/dev/vmci\x00'}]}, 0x24}}, 0x0) 13:44:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x5, 0x80, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x3, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x12) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@empty}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000002c0)=ANY=[@ANYBLOB="e0000002ac1414aa0000000002"], 0x18) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000200)=""/148, 0x94}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000180)) preadv(r1, &(0x7f0000000480), 0x100000000000014c, 0x0, 0x0) 13:44:43 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)={0x24, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x24}}, 0x0) 13:44:47 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100), 0x1c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x200}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @private0, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 13:44:47 executing program 0: bpf$MAP_CREATE(0x3, &(0x7f0000000540), 0x48) 13:44:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x5, 0x80, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x3, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x12) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@empty}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000002c0)=ANY=[@ANYBLOB="e0000002ac1414aa0000000002"], 0x18) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000200)=""/148, 0x94}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000180)) preadv(r1, &(0x7f0000000480), 0x100000000000014c, 0x0, 0x0) 13:44:47 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETOBJ_RESET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)={0x20, 0x15, 0xa, 0x201, 0x0, 0x0, {}, [@NFTA_OBJ_TABLE={0x9, 0x1, 'syz1\x00'}]}, 0x20}}, 0x0) 13:44:47 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)={0x28, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) 13:44:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x5, 0x80, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x3, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x12) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@empty}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000002c0)=ANY=[@ANYBLOB="e0000002ac1414aa0000000002"], 0x18) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000200)=""/148, 0x94}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000180)) preadv(r1, &(0x7f0000000480), 0x100000000000014c, 0x0, 0x0) 13:44:47 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETOBJ_RESET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)={0x20, 0x15, 0xa, 0x201, 0x0, 0x0, {}, [@NFTA_OBJ_TABLE={0x9, 0x1, 'syz1\x00'}]}, 0x20}}, 0x0) 13:44:47 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x200}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @private0, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 13:44:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x5, 0x80, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x3, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x12) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@empty}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000002c0)=ANY=[@ANYBLOB="e0000002ac1414aa0000000002"], 0x18) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000200)=""/148, 0x94}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000180)) preadv(r1, &(0x7f0000000480), 0x100000000000014c, 0x0, 0x0) 13:44:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x5, 0x80, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x3, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x12) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@empty}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000002c0)=ANY=[@ANYBLOB="e0000002ac1414aa0000000002"], 0x18) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000200)=""/148, 0x94}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000180)) preadv(r1, &(0x7f0000000480), 0x100000000000014c, 0x0, 0x0) 13:44:47 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)={0x28, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) 13:44:48 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)={0x28, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) 13:44:48 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETOBJ_RESET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)={0x20, 0x15, 0xa, 0x201, 0x0, 0x0, {}, [@NFTA_OBJ_TABLE={0x9, 0x1, 'syz1\x00'}]}, 0x20}}, 0x0) 13:44:52 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000000)={0x0, 0x300, &(0x7f0000000080)="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"}) 13:44:52 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x200}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @private0, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 13:44:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x5, 0x80, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x3, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x12) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@empty}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000002c0)=ANY=[@ANYBLOB="e0000002ac1414aa0000000002"], 0x18) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000200)=""/148, 0x94}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000180)) preadv(r1, &(0x7f0000000480), 0x100000000000014c, 0x0, 0x0) 13:44:52 executing program 4: perf_event_open(&(0x7f0000001140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) set_mempolicy(0x2, &(0x7f0000000040)=0x80000001, 0x4) preadv(0xffffffffffffffff, 0x0, 0x0, 0x8, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000100)=@req3={0x410000, 0x8, 0x210000, 0x8}, 0x1c) 13:44:52 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETOBJ_RESET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)={0x20, 0x15, 0xa, 0x201, 0x0, 0x0, {}, [@NFTA_OBJ_TABLE={0x9, 0x1, 'syz1\x00'}]}, 0x20}}, 0x0) 13:44:52 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x1e) 13:44:52 executing program 1: sendmsg$NFT_MSG_GETOBJ_RESET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)={0x20, 0x15, 0xa, 0x201, 0x0, 0x0, {}, [@NFTA_OBJ_TABLE={0x9, 0x1, 'syz1\x00'}]}, 0x20}}, 0x0) 13:44:52 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000100)={0x2, 0x0, 0x98, &(0x7f0000000040)={0x0, 0x0, 0x10}}) 13:44:52 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x200}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @private0, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 13:44:52 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0x2) sendto$rxrpc(r0, 0x0, 0x0, 0x40045, 0x0, 0x0) [ 240.062836][ T23] audit: type=1400 audit(1675777492.124:253): avc: denied { write } for pid=7725 comm="syz-executor.2" name="rdma_cm" dev="devtmpfs" ino=226 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 13:44:52 executing program 1: sendmsg$NFT_MSG_GETOBJ_RESET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)={0x20, 0x15, 0xa, 0x201, 0x0, 0x0, {}, [@NFTA_OBJ_TABLE={0x9, 0x1, 'syz1\x00'}]}, 0x20}}, 0x0) 13:44:52 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000100)={0x2, 0x0, 0x98, &(0x7f0000000040)={0x0, 0x0, 0x10}}) [ 240.174942][ T23] audit: type=1400 audit(1675777492.194:254): avc: denied { write } for pid=7737 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 13:44:56 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$PIO_FONTX(r0, 0x5607, 0x0) 13:44:56 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) connect$inet6(r0, 0x0, 0x0) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @private0, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 13:44:56 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$PIO_FONTX(r0, 0x5602, &(0x7f0000000000)={0x0, 0x0, 0x0}) 13:44:56 executing program 1: sendmsg$NFT_MSG_GETOBJ_RESET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)={0x20, 0x15, 0xa, 0x201, 0x0, 0x0, {}, [@NFTA_OBJ_TABLE={0x9, 0x1, 'syz1\x00'}]}, 0x20}}, 0x0) 13:44:56 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000100)={0x2, 0x0, 0x98, &(0x7f0000000040)={0x0, 0x0, 0x10}}) 13:44:56 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000040)={0x0, 0x7}) 13:44:56 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETOBJ_RESET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)={0x20, 0x15, 0xa, 0x201, 0x0, 0x0, {}, [@NFTA_OBJ_TABLE={0x9, 0x1, 'syz1\x00'}]}, 0x20}}, 0x0) 13:44:56 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) connect$inet6(r0, 0x0, 0x0) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @private0, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 13:44:56 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000100)={0x2, 0x0, 0x98, &(0x7f0000000040)={0x0, 0x0, 0x10}}) 13:44:56 executing program 3: prctl$PR_GET_THP_DISABLE(0x2f) 13:44:56 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x1c, 0x1, 0x4, 0x801, 0x0, 0x0, {}, [@NFULA_CFG_CMD={0x5, 0x1, 0x2}]}, 0x1c}}, 0x0) 13:44:56 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r0, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)=[@rights={{0x10, 0x1, 0x2}}], 0x10}, 0x0) 13:45:00 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) connect$inet6(r0, 0x0, 0x0) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @private0, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 13:45:00 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20, @local}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001c40)=ANY=[@ANYBLOB="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"], &(0x7f00002bf000)='GPL\x00', 0x4, 0x436, &(0x7f0000000040)=""/183, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffc95}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000c40)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="e2", 0x1}], 0x1}}], 0x1, 0x0) 13:45:00 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETOBJ_RESET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)={0x20, 0x15, 0xa, 0x201, 0x0, 0x0, {}, [@NFTA_OBJ_TABLE={0x9, 0x1, 'syz1\x00'}]}, 0x20}}, 0x0) 13:45:00 executing program 3: semctl$SETVAL(0x0, 0x0, 0x10, &(0x7f0000000380)) 13:45:00 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETOBJ_RESET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x14, 0x15, 0xa, 0x5}, 0x14}}, 0x0) 13:45:00 executing program 2: perf_event_open(&(0x7f000001d000)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) mount$9p_fd(0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000100)=ANY=[@ANYRESHEX, @ANYBLOB="2c7704006e6f", @ANYRESHEX, @ANYBLOB]) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x3, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x12) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@empty}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000002c0)=ANY=[@ANYBLOB="e0000002ac1414aa0000000002"], 0x18) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000200)=""/148, 0x94}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r1, &(0x7f0000000480), 0x100000000000014c, 0x0, 0x0) 13:45:00 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETOBJ_RESET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)={0x20, 0x15, 0xa, 0x201, 0x0, 0x0, {}, [@NFTA_OBJ_TABLE={0x9, 0x1, 'syz1\x00'}]}, 0x20}}, 0x0) 13:45:00 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$PIO_FONTX(r0, 0x560b, 0x0) 13:45:00 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @private0, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 13:45:00 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$PIO_FONTX(r0, 0x4bfa, &(0x7f0000000000)={0x0, 0x0, 0x0}) 13:45:00 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCSWINSZ(r0, 0x5412, &(0x7f0000000080)={0x180}) 13:45:00 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_PROTOCOL(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x1c, 0xb, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 13:45:07 executing program 0: socket$inet6(0xa, 0x0, 0x0) pipe(0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) 13:45:07 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETOBJ_RESET(r0, 0x0, 0x0) 13:45:07 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @private0, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 13:45:07 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x2c, 0x0, 0xb, 0x101, 0x0, 0x0, {}, [@NFTA_COMPAT_REV={0x8}, @NFTA_COMPAT_NAME={0xe, 0x1, '/dev/vmci\x00'}]}, 0x2c}}, 0x0) 13:45:07 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCSWINSZ(r0, 0x5412, &(0x7f0000000080)={0x17f, 0x0, 0x0, 0xffff}) 13:45:07 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_NEW(r0, &(0x7f0000003e80)={0x0, 0x0, &(0x7f0000003e40)={0x0}}, 0x0) sendmsg$NFQNL_MSG_VERDICT(r0, &(0x7f00000040c0)={0x0, 0x0, &(0x7f0000004080)={&(0x7f0000004000)={0x1c, 0x1, 0x3, 0x201, 0x0, 0x0, {}, [@NFQA_VLAN={0x4}, @NFQA_PAYLOAD={0x4}]}, 0x1c}}, 0x0) 13:45:07 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$PIO_FONTX(r0, 0x560a, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)="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"}) 13:45:07 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "c29b7bd32de84b756ee532b0735c80790c30f7b4d89136d9ce6bd55720c406a2d2523e6df84d80d9caf86c59569a83ce6bc47d8a3eeea8207ab53c23bc7fe63b", "8387e1006aac13d6fc964a1ff83763a3f820fba882df432fc9dcce4e54efde28124e34ebeed9176b4ce91b2f1501a2210ad2a76cfd6e532a77fcda3c086ac530", "64a89515022b186fec7a7797322bdc36b95bb7ff4439c9ff5cf02f710fa773d1"}) 13:45:07 executing program 2: socketpair(0x28, 0x2, 0x0, &(0x7f0000000bc0)) 13:45:07 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @private0, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 13:45:07 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETOBJ_RESET(r0, 0x0, 0x0) 13:45:07 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$PIO_FONTX(r0, 0x4b46, &(0x7f0000000000)={0x0, 0x0, 0x0}) 13:45:13 executing program 0: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) 13:45:13 executing program 2: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000900)={0x0, 0x62, 0x1e0000}, 0x20) 13:45:13 executing program 3: renameat2(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) 13:45:13 executing program 4: openat$sndtimer(0xffffffffffffff9c, &(0x7f0000001580), 0x0) 13:45:13 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETOBJ_RESET(r0, 0x0, 0x0) 13:45:13 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x200}, 0x1c) listen(0xffffffffffffffff, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @private0, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 261.884937][ T23] audit: type=1400 audit(1675777513.944:255): avc: denied { read } for pid=7828 comm="syz-executor.0" name="nvram" dev="devtmpfs" ino=98 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nvram_device_t tclass=chr_file permissive=1 13:45:14 executing program 4: chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 13:45:14 executing program 3: mount$9p_tcp(&(0x7f0000002700), 0x0, &(0x7f0000002780), 0x0, &(0x7f00000027c0)) 13:45:14 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x6, 0x1, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}], &(0x7f0000000580)='GPL\x00', 0x5, 0x94, &(0x7f00000005c0)=""/148, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:45:14 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x200}, 0x1c) listen(0xffffffffffffffff, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @private0, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 13:45:14 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETOBJ_RESET(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) 13:45:14 executing program 4: perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 261.939062][ T23] audit: type=1400 audit(1675777513.944:256): avc: denied { open } for pid=7828 comm="syz-executor.0" path="/dev/nvram" dev="devtmpfs" ino=98 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nvram_device_t tclass=chr_file permissive=1 13:45:18 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) close(r0) 13:45:18 executing program 2: syz_clone(0x40240000, &(0x7f00000003c0)="381f20ef467a3aeb3f339e49a8461455fc4911a98f066cc41df86a8879fa70a04fb6c1cbe3ca1ac12e014903d87b898cb8f604f42a8d9b07b3d8ac1610906a70a86429180428cc5ef4d7728923051d0d076a37e9455f2aaf15c0b0a2bd2dad783971c28dc520a19ce37f24e0abc58277910c52bfa51100d9cef4a368d7178a7fee71cb2fbc28328b0e", 0x89, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000200)="23c0049731dbc70631d9b9d60c72f27d8fe06c14f8bda7c0fdf56a86aaea67e2b4913bdf32120c4441178f44be539bd959") r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000280)={0x0, r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0xd, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, r1, 0x0, 0x5, &(0x7f0000000340)='\xd9{++\x00'}, 0x30) 13:45:18 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETOBJ_RESET(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) 13:45:18 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x200}, 0x1c) listen(0xffffffffffffffff, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @private0, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 13:45:18 executing program 4: perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:45:18 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f00000039c0)={0x0, 0x0, 0x0, 0x4, &(0x7f00000038c0)=[@ip_ttl={{0x14}}], 0x18}, 0x0) 13:45:18 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETOBJ_RESET(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) 13:45:18 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x200}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) [ 266.105064][ T23] audit: type=1400 audit(1675777518.164:257): avc: denied { read } for pid=7843 comm="syz-executor.0" name="vga_arbiter" dev="devtmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 13:45:18 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="c4", 0x1}, {&(0x7f0000000140)="d8", 0x1}], 0x2}, 0x8844) 13:45:18 executing program 3: syz_clone(0x40000000, &(0x7f0000000080), 0x0, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="aaeaa5fe8073d9c181b8658938bcd3a0a4d5490ba2914c80eac18cc4984491ba7c9904b36d8d7ca2275dcd9d3640d3b0bbfaf8f7c823572a2bca88739f3332770c3a7f81b7") bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000480)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000440)='\xe6}^()[&:\x00'}, 0x30) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000340), 0x10) r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}, 0x0, 0x5c86fffffc, 0x0, 0x5, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:45:18 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETOBJ_RESET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) 13:45:18 executing program 4: perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xf3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000180)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) perf_event_open(&(0x7f0000000580)={0x0, 0x80, 0x3f, 0x8, 0x4, 0x13, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x10000, 0x6, 0x0, 0x0, 0x6, 0xfffffffa, 0x6, 0x0, 0x7}, 0x0, 0x0, r2, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB, @ANYBLOB, @ANYBLOB="506eebaac5fd54a0642c50850180000000000000f701ffffffffffffffe85a676bd8e2b97cbe276bf534"], 0xda00) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0x23000) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x78, 0x7f, 0x3f, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3ff, 0x4, @perf_config_ext={0x6}, 0x1200, 0x5167, 0x0, 0x0, 0x1, 0x40, 0x6}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x81, 0x60, 0x4, 0x0, 0x480000, 0x80280, 0xc, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0)}, 0x0, 0xdfa6, 0x0, 0x7, 0x0, 0x10001, 0x200, 0x0, 0x1, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0xa) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x4b, 0x9, 0x1, 0x9, 0x0, 0x0, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x7fffffff, 0x0, @perf_config_ext={0x10f, 0x3}, 0x1405, 0x3ffc000000000000, 0x0, 0x6, 0x0, 0x10001, 0x20, 0x0, 0x6}, 0xffffffffffffffff, 0x2, r4, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x80, 0x86, 0x80, 0x8, 0x4, 0x0, 0x9, 0x4000, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_config_ext={0x3ff, 0x80}, 0xc01, 0xd, 0x4, 0x4, 0xffffffff, 0x1000, 0xfff, 0x0, 0x5, 0x0, 0x6}, 0xffffffffffffffff, 0xe, r0, 0x0) 13:45:28 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000001180)={&(0x7f0000000080)=@id, 0x10, 0x0}, 0x850) 13:45:28 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x200}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 13:45:28 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETOBJ_RESET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) 13:45:28 executing program 2: r0 = socket$kcm(0x2, 0x1, 0x84) sendmsg$inet(r0, &(0x7f0000000200)={&(0x7f0000000100)={0x2, 0x0, @private=0xa010100}, 0x10, &(0x7f0000000140)=[{&(0x7f00000005c0)='0', 0x1}], 0x1}, 0x40489d5) 13:45:28 executing program 3: r0 = syz_clone(0x40240000, &(0x7f00000003c0)="381f20ef467a3aeb3f339e49a8461455fc4911a98f066cc41df86a8879fa70a04fb6c1cbe3ca1ac12e014903d87b898cb8f604f42a8d9b07b3d8ac1610906a70a86429180428cc5ef4d7728923051d0d076a37e9455f2aaf15c0b0a2bd2dad783971c28dc520a19ce37f24e0abc58277910c52bfa51100d9cef4a368d7178a7fee71cb2fbc28328b0e933394a91f", 0x8e, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000200)="23c0049731dbc70631d9b9d60c72f27d8fe06c14f8bda7c0fdf56a86aaea67e2b4913bdf32120c4441178f44be539bd9596a59227ccdee77fe08f3d7d4e2ac627b164f2e7ed0ab5935909aee42b20ca89136f0ccc7417dbfb8c2d81782832cc013") r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETCARRIER(r1, 0x400454e2, &(0x7f0000004140)) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000280)={0x0, r1}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r0, r2, 0x0, 0x1, &(0x7f0000000040)='\x00'}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xd, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, r2, 0x0, 0x5, &(0x7f0000000340)='\xd9{++\x00'}, 0x30) 13:45:28 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000001040)=@base={0x9, 0x5, 0x4, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x48) 13:45:28 executing program 4: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_clone(0x50aa8000, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000100), 0x0) syz_open_procfs$namespace(r0, 0x0) 13:45:28 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETOBJ_RESET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) 13:45:28 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x200}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 13:45:28 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000001040)=@base={0x9, 0x0, 0x0, 0x0, 0x20}, 0x48) 13:45:28 executing program 2: bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000180)={@cgroup, 0xffffffffffffffff, 0x18}, 0x10) [ 276.523655][ T23] audit: type=1400 audit(1675777528.584:258): avc: denied { write } for pid=7891 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 276.543391][ T23] audit: type=1400 audit(1675777528.584:259): avc: denied { name_connect } for pid=7891 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 13:45:28 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETOBJ_RESET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)={0x20, 0x15, 0xa, 0x0, 0x0, 0x0, {}, [@NFTA_OBJ_TABLE={0x9, 0x1, 'syz1\x00'}]}, 0x20}}, 0x0) 13:45:32 executing program 0: syz_io_uring_setup(0x33da, &(0x7f0000000000)={0x0, 0x1817, 0x8}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) 13:45:32 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x200}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @private0, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 13:45:32 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000d80)={&(0x7f0000000c00)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x5}]}]}}, 0x0, 0x32}, 0x20) 13:45:32 executing program 3: r0 = getpid() syz_clone(0x40000000, &(0x7f0000000080), 0x0, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="aaeaa5fe8073d9c181b8658938bcd3a0a4d5490ba2914c80eac18cc4984491ba7c9904b36d8d7ca2275dcd9d3640d3b0bbfaf8f7c823572a2bca88739f3332770c3a7f81b76689efc6fd73083583111d1c7ed506964c5e0ea1c9ee6eb111c9058ce5ed5baecfe70a8bf8140f7a6dba2f45e88a21396434ee6b412c1c049d1c4b57ac9946ec6921faa224") bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000480)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000440)='\xe6}^()[&:\x00'}, 0x30) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000340), 0x10) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000340)={'rose0\x00'}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r1, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}, 0x0, 0x5c86fffffc, 0x0, 0x5, 0xffffffffffffffff}, r0, 0x0, 0xffffffffffffffff, 0x0) 13:45:32 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETOBJ_RESET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)={0x20, 0x15, 0xa, 0x0, 0x0, 0x0, {}, [@NFTA_OBJ_TABLE={0x9, 0x1, 'syz1\x00'}]}, 0x20}}, 0x0) 13:45:32 executing program 4: syz_io_uring_setup(0x21, &(0x7f0000001000), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000001080), &(0x7f00000010c0)) 13:45:32 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x5108000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x14, 0x0, 0x1}, 0x14}}, 0x0) 13:45:32 executing program 4: r0 = socket(0x2a, 0x2, 0x0) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 13:45:32 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETOBJ_RESET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)={0x20, 0x15, 0xa, 0x0, 0x0, 0x0, {}, [@NFTA_OBJ_TABLE={0x9, 0x1, 'syz1\x00'}]}, 0x20}}, 0x0) 13:45:32 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x200}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @private0, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 13:45:32 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETOBJ_RESET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)={0x14, 0x15, 0xa, 0x201}, 0x14}}, 0x0) 13:45:32 executing program 2: pselect6(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080)={0xffffffffffffffff}, &(0x7f00000000c0), &(0x7f0000000140)={&(0x7f0000000100)={[0x81]}, 0x8}) [ 280.743112][ T23] audit: type=1400 audit(1675777532.804:260): avc: denied { write } for pid=7931 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 13:45:36 executing program 0: r0 = socket$isdn_base(0x22, 0x3, 0x0) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, 0x0) 13:45:36 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x200}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @private0, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 13:45:36 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00'}) 13:45:36 executing program 2: syz_io_uring_setup(0x797b, &(0x7f0000000200)={0x0, 0xfffffffc, 0x8}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000280), &(0x7f00000002c0)) 13:45:36 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETOBJ_RESET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)={0x14, 0x15, 0xa, 0x201}, 0x14}}, 0x0) 13:45:36 executing program 3: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000002c0)={0x0, 0x0, 0x1000}, 0x20) 13:45:36 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) bind$l2tp(r0, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10) 13:45:36 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETOBJ_RESET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)={0x14, 0x15, 0xa, 0x201}, 0x14}}, 0x0) 13:45:36 executing program 3: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) recvmsg(0xffffffffffffffff, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=""/16, 0x10}, 0x2103) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) write(r0, &(0x7f0000000000)="05", 0x35a63c) 13:45:36 executing program 2: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000040)=0x200000, 0x4) 13:45:36 executing program 4: syz_emit_ethernet(0x97, &(0x7f0000000340)={@local, @broadcast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "1370f2", 0x61, 0x2f, 0x0, @dev={0xfe, 0x80, '\x00', 0x3c}, @private1, {[@fragment={0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0xa, 0x0, [0x0], "369fdd0c4570591ef71f"}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [0x0]}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86dd, [0x0, 0x0], "c5ec05"}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x2}}}, {0x8, 0x22eb, 0x0, {{0x6, 0x2, 0x0, 0x0, 0x0, 0x2}, 0x2, {0x0, 0xb717, 0x0, 0x9, 0x0, 0x1, 0x0, 0x1}}}}}}}}}, 0x0) 13:45:36 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[], 0x6c}}, 0x0) [ 284.849064][ T23] audit: type=1400 audit(1675777536.904:261): avc: denied { create } for pid=7952 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 284.928842][ T23] audit: type=1400 audit(1675777536.934:262): avc: denied { setopt } for pid=7952 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 13:45:43 executing program 0: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000000)=0x8000, 0x4) 13:45:43 executing program 4: r0 = epoll_create1(0x0) epoll_pwait2(r0, &(0x7f0000000040)=[{}], 0x1, &(0x7f0000000080), 0x0, 0x0) 13:45:43 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000340), 0x602, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f00000003c0)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) 13:45:43 executing program 5: getgid() syz_io_uring_setup(0x2020, &(0x7f0000000200)={0x0, 0x2ef6, 0xac8}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000280), &(0x7f00000002c0)) 13:45:43 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000002c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 13:45:43 executing program 3: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) recvmsg(0xffffffffffffffff, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=""/16, 0x10}, 0x2103) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) write(r0, &(0x7f0000000000)="05", 0x35a63c) 13:45:43 executing program 1: pselect6(0x40, &(0x7f0000000000), &(0x7f0000000040), 0x0, &(0x7f00000000c0), 0x0) 13:45:43 executing program 4: mq_open(&(0x7f0000000140)='.:)#\x00', 0x0, 0x0, &(0x7f0000000180)) 13:45:43 executing program 5: syz_io_uring_setup(0x2797b, &(0x7f0000000200), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000280), &(0x7f00000002c0)) 13:45:43 executing program 2: clock_getres(0x0, &(0x7f0000000240)) 13:45:43 executing program 1: getsockname$l2tp(0xffffffffffffffff, 0x0, 0x0) 13:45:44 executing program 2: r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000200), 0x1, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, 0x0) 13:45:50 executing program 0: r0 = socket$l2tp(0x2, 0x2, 0x73) bind$l2tp(r0, &(0x7f0000000000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) 13:45:50 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000002c0)={0x0, 0x1000000, 0x1000}, 0x20) 13:45:50 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000008800), 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) 13:45:50 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockname$l2tp(r0, 0x0, 0x0) 13:45:50 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000008800), 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000080)={0x12, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, r1}}, 0x18) 13:45:50 executing program 3: setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e0c0000000000000e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0xa000000, &(0x7f0000000100)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 13:45:50 executing program 5: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000002c0)={0x0}, 0x20) 13:45:50 executing program 2: mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000013c0)) 13:45:50 executing program 1: clock_gettime(0x0, &(0x7f0000000100)={0x0}) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={r0}) 13:45:50 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000640)={'batadv_slave_0\x00'}) [ 298.131479][ T7999] netlink: 'syz-executor.3': attribute type 10 has an invalid length. [ 298.156045][ T7999] netlink: 'syz-executor.3': attribute type 10 has an invalid length. [ 298.164330][ T7999] batman_adv: batadv0: Removing interface: team0 13:45:50 executing program 2: socket(0xa, 0x0, 0x100) 13:45:50 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @remote}}) [ 298.181796][ T7999] bridge0: port 3(team0) entered blocking state [ 298.188231][ T7999] bridge0: port 3(team0) entered disabled state [ 298.216960][ T7999] device team0 entered promiscuous mode [ 298.222581][ T7999] device team_slave_0 entered promiscuous mode [ 298.228777][ T7999] device team_slave_1 entered promiscuous mode [ 298.236859][ T7999] bridge0: port 3(team0) entered blocking state [ 298.243164][ T7999] bridge0: port 3(team0) entered forwarding state [ 298.249726][ T7999] 8021q: adding VLAN 0 to HW filter on device team0 13:45:58 executing program 2: syz_clone(0x40080000, &(0x7f00000001c0)="c31acc5fd439014c3147b7c18ba6be9bfc0c1d3d2145b4e9494a05783218c5f385cfe1d2bbcf0fc028d17dfeb2999b13822e6c4c43edb0620799c9774d4f", 0x3e, 0x0, &(0x7f0000000080), 0x0) bpf$BPF_PROG_QUERY(0x21, 0x0, 0x0) 13:45:58 executing program 0: r0 = socket$isdn_base(0x22, 0x3, 0x0) ioctl$IMGETVERSION(r0, 0x80044942, &(0x7f0000000100)) 13:45:58 executing program 4: r0 = syz_io_uring_setup(0x797e, &(0x7f0000000200), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000000), &(0x7f00000002c0)) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x8000000) 13:45:58 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) connect$l2tp(r0, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) 13:45:58 executing program 3: setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e0c0000000000000e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0xa000000, &(0x7f0000000100)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 13:45:58 executing program 1: setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e0c0000000000000e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0xa000000, &(0x7f0000000100)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 13:45:58 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_INTERFACE(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x14, 0x0, 0x4}, 0x14}}, 0x0) 13:45:58 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_JOIN_IBSS(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB='\'\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000002b00000008000300", @ANYRES32=r3, @ANYBLOB="050034"], 0x2c}}, 0x0) [ 306.449799][ T8032] netlink: 'syz-executor.3': attribute type 10 has an invalid length. [ 306.459959][ T8032] device team0 left promiscuous mode [ 306.465383][ T8032] device team_slave_0 left promiscuous mode [ 306.471378][ T8032] device team_slave_1 left promiscuous mode [ 306.477433][ T8032] bridge0: port 3(team0) entered disabled state [ 306.486062][ T8032] batman_adv: batadv0: Adding interface: team0 13:45:58 executing program 5: r0 = socket$igmp6(0xa, 0x3, 0x2) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, 0x0) [ 306.492345][ T8032] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 306.527961][ T8032] batman_adv: batadv0: Interface activated: team0 [ 306.537002][ T8039] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.4'. 13:45:58 executing program 5: syz_io_uring_setup(0x721e, &(0x7f0000000140), &(0x7f0000001000/0x2000)=nil, &(0x7f0000000000/0x3000)=nil, &(0x7f00000001c0), &(0x7f0000000200)) 13:45:58 executing program 5: syz_io_uring_setup(0x320f, &(0x7f0000000040)={0x0, 0x0, 0x20}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0), &(0x7f0000000100)) 13:45:58 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000140), 0x2000c1, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000008f80), r0) [ 306.537704][ T8032] batman_adv: batadv0: Interface deactivated: team0 [ 306.566273][ T8034] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 306.574993][ T8034] batman_adv: batadv0: Adding interface: team0 [ 306.581166][ T8034] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 306.611798][ T8034] batman_adv: batadv0: Interface activated: team0 [ 306.623724][ T8034] batman_adv: batadv0: Interface deactivated: team0 [ 306.646636][ T8042] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 306.654856][ T8042] batman_adv: batadv0: Removing interface: team0 [ 306.661689][ T8042] bridge0: port 3(team0) entered blocking state [ 306.668009][ T8042] bridge0: port 3(team0) entered disabled state [ 306.675565][ T8042] device team0 entered promiscuous mode [ 306.681160][ T8042] device team_slave_0 entered promiscuous mode [ 306.687495][ T8042] device team_slave_1 entered promiscuous mode [ 306.694719][ T8042] bridge0: port 3(team0) entered blocking state [ 306.701079][ T8042] bridge0: port 3(team0) entered forwarding state [ 306.707616][ T8042] 8021q: adding VLAN 0 to HW filter on device team0 [ 306.714449][ T8045] netlink: 'syz-executor.3': attribute type 10 has an invalid length. [ 306.722681][ T8045] batman_adv: batadv0: Removing interface: team0 [ 306.731515][ T8045] bridge0: port 3(team0) entered blocking state [ 306.737818][ T8045] bridge0: port 3(team0) entered disabled state [ 306.744860][ T8045] device team0 entered promiscuous mode 13:45:58 executing program 2: r0 = socket$l2tp(0x2, 0x2, 0x73) sendto$l2tp(r0, &(0x7f0000000400)="16", 0x1, 0x0, &(0x7f00000004c0)={0x2, 0x0, @remote}, 0x10) [ 306.750422][ T8045] device team_slave_0 entered promiscuous mode [ 306.756668][ T8045] device team_slave_1 entered promiscuous mode [ 306.764021][ T8045] bridge0: port 3(team0) entered blocking state [ 306.770343][ T8045] bridge0: port 3(team0) entered forwarding state [ 306.776886][ T8045] 8021q: adding VLAN 0 to HW filter on device team0 13:46:02 executing program 0: openat$null(0xffffffffffffff9c, &(0x7f0000000100), 0x44000, 0x0) 13:46:02 executing program 5: r0 = epoll_create1(0x0) epoll_pwait2(r0, &(0x7f0000000040)=[{}], 0x1, &(0x7f0000000080), &(0x7f00000000c0), 0x8) 13:46:02 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000008800), 0x0, 0x0) epoll_wait(r0, &(0x7f0000001500)=[{}], 0x1, 0x0) 13:46:02 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x25, &(0x7f0000000080)=0x1000000, 0x4) 13:46:02 executing program 3: r0 = socket(0x18, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000040)={'syztnl1\x00', 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @loopback}}) 13:46:02 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000000)={'syztnl2\x00', 0x0}) [ 310.591061][ T23] audit: type=1400 audit(1675777562.644:263): avc: denied { ioctl } for pid=8057 comm="syz-executor.0" path="socket:[31271]" dev="sockfs" ino=31271 ioctlcmd=0x4942 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 13:46:02 executing program 1: r0 = epoll_create1(0x0) epoll_wait(r0, &(0x7f0000000080)=[{}], 0x1, 0x1000) 13:46:02 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000008800), 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x200000c, 0x9011, r0, 0x0) 13:46:02 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) sendto$l2tp(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x2, 0x0, @broadcast}, 0x10) 13:46:02 executing program 4: epoll_wait(0xffffffffffffffff, &(0x7f0000000200)=[{}], 0x1, 0x1ff) [ 310.637987][ T8067] TCP: TCP_TX_DELAY enabled 13:46:02 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000440)={0x1, 0x10, 0xfa00, {0x0}}, 0x18) 13:46:02 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000008800), 0x0, 0x0) getpeername$packet(r0, 0x0, 0x0) [ 310.692572][ T23] audit: type=1400 audit(1675777562.754:264): avc: denied { map } for pid=8075 comm="syz-executor.5" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:null_device_t tclass=chr_file permissive=1 [ 310.724245][ T23] audit: type=1400 audit(1675777562.754:265): avc: denied { execute } for pid=8075 comm="syz-executor.5" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:null_device_t tclass=chr_file permissive=1 13:46:06 executing program 0: r0 = socket$xdp(0x2c, 0x3, 0x0) sendmsg$xdp(r0, &(0x7f0000001740)={0x0, 0x0, &(0x7f0000001680)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 13:46:06 executing program 5: pselect6(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x0, &(0x7f0000000140)={&(0x7f0000000100), 0x8}) 13:46:06 executing program 4: openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x107280, 0x0) 13:46:06 executing program 3: syz_io_uring_setup(0x1935, &(0x7f0000000140)={0x0, 0x0, 0x800}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f00000001c0), &(0x7f0000000200)) 13:46:06 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000000340), 0x602, 0x0) 13:46:06 executing program 1: pselect6(0x0, 0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000140)={&(0x7f0000000100)={[0x81]}, 0x8}) 13:46:06 executing program 2: pselect6(0x40, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)={0xffffffffffffffff}, &(0x7f00000000c0), &(0x7f0000000140)={&(0x7f0000000100)={[0x81]}, 0x8}) 13:46:06 executing program 5: syz_clone3(&(0x7f0000003240)={0x11000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 13:46:06 executing program 3: syz_io_uring_setup(0x2020, &(0x7f0000000200)={0x0, 0x2ef6, 0xac8}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000280), &(0x7f00000002c0)) 13:46:06 executing program 1: syz_io_uring_setup(0x4976, &(0x7f0000000140)={0x0, 0x0, 0x2, 0x3, 0x1f0}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000200)) 13:46:06 executing program 4: mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x30, 0xffffffffffffffff, 0x0) 13:46:06 executing program 2: r0 = epoll_create1(0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, 0x0) 13:46:11 executing program 0: r0 = epoll_create1(0x0) r1 = socket$l2tp(0x2, 0x2, 0x73) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) 13:46:11 executing program 4: syz_io_uring_setup(0x7d33, &(0x7f0000000000), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000000080), 0x0) syz_io_uring_setup(0x3aec, &(0x7f0000000140), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000300)) 13:46:11 executing program 5: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000040)=0x202014, 0x4) 13:46:11 executing program 2: r0 = epoll_create1(0x0) r1 = socket$l2tp(0x2, 0x2, 0x73) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000300)) 13:46:11 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) sendto$l2tp(r0, &(0x7f0000000000)="92", 0x1, 0x0, &(0x7f0000000080)={0x2, 0x0, @broadcast}, 0x10) 13:46:11 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'ip6_vti0\x00', 0x0}) 13:46:11 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x4000001) 13:46:11 executing program 1: r0 = epoll_create1(0x0) epoll_pwait2(r0, &(0x7f0000000040)=[{}], 0x1, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x8) [ 318.985398][ T23] audit: type=1400 audit(1675777571.044:266): avc: denied { write } for pid=8100 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 13:46:11 executing program 2: r0 = io_uring_setup(0x4d0e, &(0x7f0000000200)) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x8000000) 13:46:11 executing program 5: clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) select(0x40, &(0x7f0000000040), 0x0, &(0x7f00000000c0)={0x400000}, &(0x7f0000000140)={0x0, r0/1000+10000}) 13:46:11 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000002c0)={&(0x7f0000000240)=""/58, 0x0, 0x1000}, 0x20) 13:46:11 executing program 3: r0 = syz_io_uring_setup(0x1a38, &(0x7f0000000000), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) mmap$IORING_OFF_CQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x40010, r0, 0x8000000) 13:46:15 executing program 2: pipe2(&(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) recvfrom$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 13:46:15 executing program 5: mknodat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) 13:46:15 executing program 0: ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000080)) r0 = socket$isdn_base(0x22, 0x3, 0x0) ioctl$IMGETVERSION(r0, 0x80044942, &(0x7f0000000100)) 13:46:15 executing program 3: mknod(&(0x7f0000001f00)='./file0\x00', 0x8020, 0x0) 13:46:15 executing program 1: faccessat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) 13:46:15 executing program 4: open$dir(&(0x7f0000001b80)='./file0\x00', 0x210, 0x0) mknod(&(0x7f0000001f00)='./file0\x00', 0x0, 0x0) 13:46:15 executing program 4: pselect6(0x40, &(0x7f0000000b40), 0x0, 0x0, 0x0, 0x0) 13:46:15 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@ptr={0x0, 0x0, 0x0, 0x2, 0x1000000}, @datasec={0x0, 0x0, 0x0, 0xf, 0x1, [], 'R'}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "292604"}]}}, &(0x7f0000001dc0)=""/4096, 0x42, 0x1000, 0x1}, 0x20) 13:46:15 executing program 2: r0 = syz_clone(0x80000, 0x0, 0x0, &(0x7f00000004c0), 0x0, 0x0) tgkill(r0, r0, 0x81a) 13:46:15 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)={0x14}, 0x14}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000004c0)={0x14}, 0x14}}, 0x0) 13:46:15 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x849ad) 13:46:15 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0) ioctl$MON_IOCH_MFLUSH(r0, 0x9208, 0x8) 13:46:15 executing program 3: r0 = msgget(0x1, 0x210) msgctl$IPC_RMID(r0, 0x0) [ 323.312827][ T23] audit: type=1400 audit(1675777575.374:267): avc: denied { read } for pid=8164 comm="syz-executor.5" name="usbmon0" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 323.351790][ T23] audit: type=1400 audit(1675777575.404:268): avc: denied { open } for pid=8164 comm="syz-executor.5" path="/dev/usbmon0" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 323.375948][ T23] audit: type=1400 audit(1675777575.404:269): avc: denied { ioctl } for pid=8164 comm="syz-executor.5" path="/dev/usbmon0" dev="devtmpfs" ino=117 ioctlcmd=0x9204 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 13:46:19 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$FOU_CMD_GET(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000500)={0x14, 0x0, 0x4}, 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000640), r0) syz_genetlink_get_family_id$batadv(&(0x7f0000000980), r0) 13:46:19 executing program 3: r0 = socket(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000540)={&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f00000003c0)=[@pktinfo={{0x24, 0x29, 0x32, {@ipv4}}}], 0x28}, 0x0) 13:46:19 executing program 1: bpf$MAP_CREATE(0x7, &(0x7f0000001180)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 13:46:19 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg\x00', 0x2}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{}]}) 13:46:19 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) read$usbmon(r0, 0x0, 0x0) 13:46:19 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_STOP_NAN(r0, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000d00)={&(0x7f0000000d80)=ANY=[@ANYBLOB="13"], 0x20}}, 0x0) 13:46:19 executing program 4: r0 = socket$inet(0x2, 0x3, 0x7) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 13:46:19 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000280), 0x4) 13:46:19 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8922, &(0x7f0000000000)={'batadv_slave_1\x00'}) 13:46:19 executing program 3: r0 = socket(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@pktinfo={{0x24, 0x29, 0x32, {@ipv4}}}], 0x28}, 0x0) 13:46:19 executing program 4: r0 = socket(0xa, 0x2, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x30, 0x0, &(0x7f0000000040)) 13:46:19 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(0x0, r0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000340)='/sys/power/pm_test', 0x0, 0x0) [ 327.477525][ T8196] batadv_slave_1: mtu less than device minimum 13:46:23 executing program 0: unshare(0x80) unshare(0x0) unshare(0x8020000) unshare(0x0) socket$inet6_tcp(0xa, 0x1, 0x0) unshare(0x40000000) 13:46:23 executing program 5: r0 = socket(0xa, 0x2, 0x3a) getsockopt$inet_mreqn(r0, 0x0, 0x0, 0x0, 0x0) 13:46:23 executing program 3: syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2000000, &(0x7f0000000540)=ANY=[], 0x1, 0x1a9, &(0x7f0000000440)="$eJzs3TFrE2EcBvCnNmpwSQYncThwcQpNP0GLVBADgnKDToptQXqhYCGgg3Xz+/khnO3WQTixJ0lbzsGhnvR+vyUPvHngfZd7p/vf6/vzg93Do/2Tk28ZDtcy2MpWTtcyzo2sp/E5AMB1clrX+V43ut4LAPBvuP8BoH/c/wDQP+5/AOifFy9fPd2ezXaeF8UwmX9ZlIuy+W3Wt/fzLlX2spFRfiT1UpMfP5ntbBRnxinnx7/7x4ty/WJ/mlHG7f1p0y8u9m/mzvn+Zka5297fbO3fysMH5/qTjPL1bQ5TZTe/uqv+p2lRPHo2u9S/ffY/AAAAAAAAAAAAAAAAAAAAAAC4CpNiqXV+z2Typ/Wm/xfzgS7N1xnk3qDbswMAAAAAAAAAAAAAAAAAAMD/4ujDx4M3VbX3XhAEYRm6fjIBAAAAAAAAAAAAAAAAAED/rF767XonAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAANCd1ff/ry50fUYAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPgZAAD//yusq24=") creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$BTRFS_IOC_ADD_DEV(0xffffffffffffffff, 0x5000940a, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write(r1, &(0x7f0000000100)="be", 0x1) sendfile(r1, r0, 0x0, 0x1ffff) sendfile(r1, r0, 0x0, 0x1554) 13:46:23 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:46:23 executing program 1: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder1\x00', 0x0, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, 0x0) 13:46:23 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000003b00)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000003ac0)={&(0x7f0000000340)=@newchain={0x2084, 0x64, 0x0, 0x0, 0x0, {}, [@filter_kind_options=@f_fw={{0x7}, {0x2058, 0x2, [@TCA_FW_ACT={0x2054, 0x4, [@m_police={0x2050, 0x0, 0x0, 0x0, {{0xb}, {0x2024, 0x2, 0x0, 0x1, [[@TCA_POLICE_RATE={0x404}, @TCA_POLICE_RATE={0x404}, @TCA_POLICE_PEAKRATE={0x404}, @TCA_POLICE_PEAKRATE={0x404}], [@TCA_POLICE_PEAKRATE={0x404}], [@TCA_POLICE_RATE={0x404}, @TCA_POLICE_RATE={0x404}], [@TCA_POLICE_RATE={0x404}]]}, {0x4}, {0xc}, {0xc}}}]}]}}]}, 0x2084}}, 0x0) 13:46:23 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(0x0, r0) syz_clone(0x54080000, &(0x7f0000000280)="76fb58c7932a6fa13ab801993f9e72fb2b5ccce2f169f62cff83c245f635fac2d39e810b62a5bedb3adaa1edaab9f39f82a6760a3a72834b05d9002f58f897906da3304a7446275055eea5d62f2a2a25e0aea47857ae35fc19862a", 0x5b, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000540)="53d0a9e2fc99bdb9638bb9e278871a46ec92d035e988c5686c247ed24977c8afcaa26040c4ed8268589194745ac0716f24a795c32504cfa3d1afe9e0ab4ad6badb4f556bdbd24e489708b61483399aaa36d19bd9de6d0d882afab4cf856fb281440b5601dfdbac15e29c2bc88a3c5ed1ca7ca6a7cf1502cbeb1b33abb8e2789edff0460da8445a9d06aa75f485bb35fef8a29a7f4c723bf50c5ea8579f0db57f7c0e9526ee4f891be2059fd473f39a1995199fd04a6270a484a105dfae5986966a816c11c4c0ba9652d06c2a258213b1b892d11d658791bd20a39fd231bfeb63218db63d26c39feafd77d83b5934de6ea16ccc") syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) syz_clone(0x20000, &(0x7f0000000280)="76fb58c7932a6fa13ab8", 0xa, &(0x7f0000000340), 0x0, &(0x7f0000000540)) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 13:46:23 executing program 4: syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x810, &(0x7f0000000080)={[{@discard}, {}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x80}}, {@noacl}, {@grpquota}]}, 0x3, 0x4bd, &(0x7f0000000500)="$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") 13:46:23 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000001c0)={@in={{0x2, 0x0, @private}}, 0x0, 0x0, 0x1032, 0x0, "9742f63fa2dc7a028a5936f0e2da1fdf383f192d8bb1425af44913221cd588032b9946121c6a0ac7f4b1693578d7bb2112833686b297b4868cbd584149fe7de8d86244549c1fa78f87f086e58182ae52"}, 0xd8) 13:46:23 executing program 2: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_ADD_MFC(r0, 0x0, 0xcc, &(0x7f0000000000)={@multicast2, @dev, 0x0, "93d1d1843f5f7f9cce102c0d97f56fbdcca2f35ce3b70c7b33d68a1331d26bbf"}, 0x3c) [ 331.577311][ T8213] loop3: detected capacity change from 0 to 256 [ 331.586059][ T23] audit: type=1400 audit(1675777583.644:270): avc: denied { create } for pid=8204 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 331.625822][ T8218] loop4: detected capacity change from 0 to 512 13:46:23 executing program 5: r0 = socket(0xa, 0x2, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x29, 0x0, &(0x7f0000000040)) 13:46:23 executing program 2: pselect6(0x40, &(0x7f0000001400), 0x0, &(0x7f0000001480)={0x6}, &(0x7f00000014c0)={0x77359400}, 0x0) [ 331.647816][ T23] audit: type=1400 audit(1675777583.674:271): avc: denied { getopt } for pid=8204 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 331.658155][ T8218] ext4: Unknown parameter 'noacl' [ 331.667717][ T23] audit: type=1400 audit(1675777583.694:272): avc: denied { mount } for pid=8206 comm="syz-executor.3" name="/" dev="loop3" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dosfs_t tclass=filesystem permissive=1 [ 332.449871][ T23] audit: type=1400 audit(1675777584.504:273): avc: denied { unmount } for pid=3139 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dosfs_t tclass=filesystem permissive=1 13:46:28 executing program 1: r0 = socket$inet(0x2, 0x3, 0x7) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8914, &(0x7f0000000180)={'wlan0\x00'}) 13:46:28 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8914, &(0x7f0000000000)={'batadv_slave_1\x00'}) 13:46:28 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_SCHED_SCAN(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f00000004c0)={0x44, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_IE={0x1b, 0x2a, [@rann={0x7e, 0x15}]}]}, 0x44}}, 0x0) 13:46:28 executing program 3: syz_open_dev$usbmon(&(0x7f0000000040), 0xffffffffffffffff, 0x40) 13:46:28 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x6, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000100)=""/205, 0x36, 0xcd, 0x1}, 0x20) 13:46:28 executing program 2: r0 = socket$inet(0x2, 0x3, 0x6) getsockopt$inet_mreqn(r0, 0x0, 0x20, 0x0, &(0x7f0000001380)) 13:46:28 executing program 2: r0 = socket$inet(0x2, 0x3, 0x7) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8929, &(0x7f0000000180)={'wlan0\x00'}) 13:46:28 executing program 3: r0 = socket(0xa, 0x2, 0x0) getsockopt$inet_mreqn(r0, 0x88, 0x0, 0x0, 0x0) 13:46:28 executing program 4: syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4, &(0x7f0000000140)={[{@grpjquota}, {}, {@sb={'sb', 0x3d, 0x5}}, {@noacl}, {@init_itable_val={'init_itable', 0x3d, 0x4}}]}, 0x3, 0x4bd, &(0x7f0000000500)="$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") 13:46:28 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000200)) [ 336.561760][ T8240] batman_adv: batadv0: Interface deactivated: batadv_slave_1 13:46:28 executing program 3: unshare(0x0) syz_open_pts(0xffffffffffffffff, 0x0) unshare(0x40000000) 13:46:28 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000480)={0x10, 0x0, 0x25dfdbff, 0xe0}, 0xc) 13:46:28 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x5}]}]}}, &(0x7f0000000100)=""/205, 0x32, 0xcd, 0x1}, 0x20) [ 336.628256][ T8253] loop4: detected capacity change from 0 to 512 [ 336.659281][ T8253] ext4: Unknown parameter 'noacl' 13:46:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x4, &(0x7f0000000200)={[{@nobarrier}, {@noblock_validity}, {@nolazytime}, {@barrier_val={'barrier', 0x3d, 0x7fff0038}}, {@data_err_abort}, {@resgid}, {@resuid={'resuid', 0x3d, 0xee00}}, {@resgid={'resgid', 0x3d, 0xee01}}, {@resgid={'resgid', 0x3d, 0xee00}, 0x32}]}, 0x1, 0x4bc, &(0x7f0000000a00)="$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") 13:46:28 executing program 2: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000e80)='/sys/kernel/config', 0x0, 0x0) 13:46:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x4, &(0x7f0000000200)={[{@nobarrier}, {@noblock_validity}, {@nolazytime}, {@barrier_val={'barrier', 0x3d, 0x7fff0038}}, {@data_err_abort}, {@resgid}, {@resuid={'resuid', 0x3d, 0xee00}}, {@resgid={'resgid', 0x3d, 0xee01}}, {@resgid={'resgid', 0x3d, 0xee00}, 0x32}]}, 0x1, 0x4bc, &(0x7f0000000a00)="$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") [ 336.682037][ T23] audit: type=1400 audit(1675777588.734:274): avc: denied { bind } for pid=8260 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 336.719700][ T8267] loop1: detected capacity change from 0 to 512 [ 336.727468][ T23] audit: type=1400 audit(1675777588.774:275): avc: denied { read } for pid=8264 comm="syz-executor.2" name="/" dev="configfs" ino=5080 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 336.749886][ T23] audit: type=1400 audit(1675777588.774:276): avc: denied { open } for pid=8264 comm="syz-executor.2" path="/sys/kernel/config" dev="configfs" ino=5080 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 336.771865][ T8269] loop5: detected capacity change from 0 to 512 [ 336.796427][ T8267] EXT4-fs error (device loop1): ext4_mb_mark_diskspace_used:3789: comm syz-executor.1: Allocating blocks 41-42 which overlap fs metadata [ 336.805636][ T8269] EXT4-fs error (device loop5): ext4_mb_mark_diskspace_used:3789: comm syz-executor.5: Allocating blocks 41-42 which overlap fs metadata [ 336.810858][ T8267] Quota error (device loop1): write_blk: dquota write failed [ 336.826329][ T8269] Quota error (device loop5): write_blk: dquota write failed [ 336.831839][ T8267] Quota error (device loop1): qtree_write_dquot: Error -117 occurred while creating quota [ 336.839254][ T8269] Quota error (device loop5): qtree_write_dquot: Error -117 occurred while creating quota [ 336.851587][ T8267] EXT4-fs (loop1): 1 truncate cleaned up [ 336.859545][ T8269] EXT4-fs (loop5): 1 truncate cleaned up [ 336.864765][ T8267] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. [ 336.870358][ T8269] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. [ 336.882789][ T8267] ext4 filesystem being mounted at /root/syzkaller-testdir1690522065/syzkaller.73eBCX/335/file0 supports timestamps until 2038 (0x7fffffff) [ 336.896591][ T8269] ext4 filesystem being mounted at /root/syzkaller-testdir1919362859/syzkaller.1O3Hzf/88/file0 supports timestamps until 2038 (0x7fffffff) [ 336.926658][ T3133] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 336.945028][ T6667] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. 13:46:35 executing program 0: r0 = socket(0xa, 0x2, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x19, 0x0, &(0x7f0000000040)) 13:46:35 executing program 2: syz_open_dev$usbmon(&(0x7f0000000000), 0x9, 0x0) 13:46:35 executing program 4: epoll_pwait2(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0) 13:46:35 executing program 3: r0 = socket(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000540)={&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty, 0x7}, 0x1c, 0x0, 0x0, &(0x7f00000003c0)=[@dontfrag={{0x14}}], 0x18}, 0x0) 13:46:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x4, &(0x7f0000000200)={[{@nobarrier}, {@noblock_validity}, {@nolazytime}, {@barrier_val={'barrier', 0x3d, 0x7fff0038}}, {@data_err_abort}, {@resgid}, {@resuid={'resuid', 0x3d, 0xee00}}, {@resgid={'resgid', 0x3d, 0xee01}}, {@resgid={'resgid', 0x3d, 0xee00}, 0x32}]}, 0x1, 0x4bc, &(0x7f0000000a00)="$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") 13:46:35 executing program 5: syz_clone(0x91248500, 0x0, 0x0, 0x0, 0x0, 0x0) 13:46:35 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$FOU_CMD_GET(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000500)={0x2c, 0x0, 0x4, 0x70bd25, 0x0, {}, [@FOU_ATTR_AF={0x5}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e20}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x62d540c940bac746}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000640), r0) syz_genetlink_get_family_id$batadv(&(0x7f0000000980), r0) 13:46:35 executing program 4: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_ADD_VIF(r0, 0x0, 0xca, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, @vifc_lcl_ifindex, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) 13:46:35 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x9205) 13:46:35 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x39, 0x0, 0x20) 13:46:35 executing program 3: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, 0x0) 13:46:35 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@enum={0x5}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f00000002c0)=""/231, 0x2a, 0xe7, 0x1}, 0x20) [ 343.681334][ T8282] loop1: detected capacity change from 0 to 512 [ 343.770226][ T8282] EXT4-fs error (device loop1): ext4_mb_mark_diskspace_used:3789: comm syz-executor.1: Allocating blocks 41-42 which overlap fs metadata [ 343.785388][ T8282] Quota error (device loop1): write_blk: dquota write failed [ 343.792830][ T8282] Quota error (device loop1): qtree_write_dquot: Error -117 occurred while creating quota [ 343.803707][ T8282] EXT4-fs (loop1): 1 truncate cleaned up [ 343.809395][ T8282] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. [ 343.821638][ T8282] ext4 filesystem being mounted at /root/syzkaller-testdir1690522065/syzkaller.73eBCX/336/file0 supports timestamps until 2038 (0x7fffffff) [ 343.848983][ T3133] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 13:46:39 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_LEAVE_MESH(r0, 0x0, 0x0) 13:46:39 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400}, 0xc) 13:46:39 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8917, &(0x7f0000000000)={'batadv_slave_1\x00'}) 13:46:39 executing program 4: inotify_add_watch(0xffffffffffffffff, 0x0, 0x27710d3b77435289) 13:46:39 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_LEAVE_MESH(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)={0x1c, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000004c0), 0xffffffffffffffff) 13:46:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x4, &(0x7f0000000200)={[{@nobarrier}, {@noblock_validity}, {@nolazytime}, {@barrier_val={'barrier', 0x3d, 0x7fff0038}}, {@data_err_abort}, {@resgid}, {@resuid={'resuid', 0x3d, 0xee00}}, {@resgid={'resgid', 0x3d, 0xee01}}, {@resgid={'resgid', 0x3d, 0xee00}, 0x32}]}, 0x1, 0x4bc, &(0x7f0000000a00)="$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") 13:46:39 executing program 3: syz_genetlink_get_family_id$nl80211(&(0x7f0000000340), 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) 13:46:39 executing program 2: r0 = socket$inet6(0x18, 0x3, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) dup2(r1, r0) 13:46:39 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f00000001c0)={'syztnl1\x00', 0x0}) 13:46:39 executing program 4: syz_clone(0x1f005480, 0x0, 0xfffffffffffffe4b, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 13:46:39 executing program 5: syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2000000, &(0x7f0000000540)=ANY=[], 0x1, 0x1a9, &(0x7f0000000440)="$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") creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write(r1, &(0x7f0000000100)="beb12a01000100a2babe2cfe3f8cd6657ce2", 0x12) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x8, 0x11, r2, 0x93d57000) sendfile(r1, r0, 0x0, 0x1ffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendfile(r1, r0, 0x0, 0x1554) [ 347.831162][ T8314] loop1: detected capacity change from 0 to 512 13:46:39 executing program 3: socketpair(0x0, 0x0, 0x0, &(0x7f0000000d40)) [ 347.872677][ T8327] loop5: detected capacity change from 0 to 256 [ 347.875729][ T8314] EXT4-fs error (device loop1): ext4_mb_mark_diskspace_used:3789: comm syz-executor.1: Allocating blocks 41-42 which overlap fs metadata [ 347.898876][ T23] audit: type=1400 audit(1675777599.954:277): avc: denied { map } for pid=8326 comm="syz-executor.5" path="socket:[31675]" dev="sockfs" ino=31675 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 347.926421][ T8314] Quota error (device loop1): write_blk: dquota write failed [ 347.933990][ T8314] Quota error (device loop1): qtree_write_dquot: Error -117 occurred while creating quota [ 347.947677][ T8314] EXT4-fs (loop1): 1 truncate cleaned up [ 347.953413][ T8314] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. [ 347.973899][ T8314] ext4 filesystem being mounted at /root/syzkaller-testdir1690522065/syzkaller.73eBCX/337/file0 supports timestamps until 2038 (0x7fffffff) [ 348.009239][ T3133] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 13:46:44 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x4010) syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) 13:46:44 executing program 4: syz_genetlink_get_family_id$tipc(&(0x7f0000000f40), 0xffffffffffffffff) 13:46:44 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) symlinkat(&(0x7f00000000c0)='./file1\x00', r0, &(0x7f0000000100)='./file0\x00') mknodat(r1, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) 13:46:44 executing program 0: syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2000000, &(0x7f0000000540)=ANY=[], 0x1, 0x1a9, &(0x7f0000000440)="$eJzs3TFrE2EcBvCnNmpwSQYncThwcQpNP0GLVBADgnKDToptQXqhYCGgg3Xz+/khnO3WQTixJ0lbzsGhnvR+vyUPvHngfZd7p/vf6/vzg93Do/2Tk28ZDtcy2MpWTtcyzo2sp/E5AMB1clrX+V43ut4LAPBvuP8BoH/c/wDQP+5/AOifFy9fPd2ezXaeF8UwmX9ZlIuy+W3Wt/fzLlX2spFRfiT1UpMfP5ntbBRnxinnx7/7x4ty/WJ/mlHG7f1p0y8u9m/mzvn+Zka5297fbO3fysMH5/qTjPL1bQ5TZTe/uqv+p2lRPHo2u9S/ffY/AAAAAAAAAAAAAAAAAAAAAAC4CpNiqXV+z2Typ/Wm/xfzgS7N1xnk3qDbswMAAAAAAAAAAAAAAAAAAMD/4ujDx4M3VbX3XhAEYRm6fjIBAAAAAAAAAAAAAAAAAED/rF767XonAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAANCd1ff/ry50fUYAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPgZAAD//yusq24=") creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write(r1, &(0x7f0000000100)="beb12a01000100a2babe2cfe3f8cd6657ce2", 0x12) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x8, 0x11, r2, 0x93d57000) sendfile(r1, r0, 0x0, 0x1ffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendfile(r1, r0, 0x0, 0x1554) 13:46:44 executing program 5: syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2000000, &(0x7f0000000540)=ANY=[], 0x1, 0x1a9, &(0x7f0000000440)="$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") creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write(r1, &(0x7f0000000100)="beb12a01000100a2babe2cfe3f8cd6657ce2", 0x12) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x8, 0x11, r2, 0x93d57000) sendfile(r1, r0, 0x0, 0x1ffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendfile(r1, r0, 0x0, 0x1554) 13:46:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x4, &(0x7f0000000200)={[{@nobarrier}, {@noblock_validity}, {@nolazytime}, {@barrier_val={'barrier', 0x3d, 0x7fff0038}}, {@data_err_abort}, {@resgid}, {@resuid={'resuid', 0x3d, 0xee00}}, {@resgid={'resgid', 0x3d, 0xee01}}, {@resgid={'resgid', 0x3d, 0xee00}, 0x32}]}, 0x1, 0x4bc, &(0x7f0000000a00)="$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") 13:46:44 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) recvmmsg(r0, &(0x7f0000001d80)=[{{0x0, 0x3f1, &(0x7f0000000740)=[{&(0x7f0000000300)=""/228, 0xfffffc9d}], 0x1, 0x0, 0x600, 0x3}}], 0x10002, 0x0, 0x0) 13:46:44 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_LEAVE_MESH(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) 13:46:44 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_LEAVE_MESH(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)={0x1c, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) [ 351.968804][ T8349] loop1: detected capacity change from 0 to 512 [ 351.980336][ T8351] loop5: detected capacity change from 0 to 256 13:46:44 executing program 4: syz_emit_ethernet(0x6a, &(0x7f0000000000)={@link_local, @dev, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @rand_addr=0x64010104, @local}, @source_quench={0x4, 0x4, 0x0, 0x0, {0x10, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote, {[@cipso={0x86, 0x6}, @timestamp_addr={0x44, 0x24, 0x0, 0x3, 0x0, [{@private}, {@local}, {@empty}, {@multicast1=0xe000c800}]}]}}}}}}}, 0x0) 13:46:44 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_LEAVE_MESH(r0, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x1c, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) [ 351.997970][ T23] audit: type=1400 audit(1675777604.054:278): avc: denied { read } for pid=8352 comm="syz-executor.3" laddr=::1 lport=20003 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 13:46:44 executing program 4: syz_clone(0x10a264000, 0x0, 0x0, 0x0, 0x0, 0x0) 13:46:44 executing program 2: mkdir(&(0x7f00000004c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000100)='./file0/file0\x00'}, 0x10) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) dup(0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x39}}}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000300)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0xb3550aa4ba878394}, 0x9c) [ 352.060578][ T8349] EXT4-fs error (device loop1): ext4_mb_mark_diskspace_used:3789: comm syz-executor.1: Allocating blocks 41-42 which overlap fs metadata 13:46:44 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_devices(r0, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) write$cgroup_devices(r1, &(0x7f0000000200)={'c', ' *:* ', 'rwm\x00'}, 0xa) [ 352.118215][ T8349] Quota error (device loop1): write_blk: dquota write failed [ 352.125817][ T8349] Quota error (device loop1): qtree_write_dquot: Error -117 occurred while creating quota 13:46:44 executing program 4: syz_emit_ethernet(0x14, &(0x7f0000000180)={@link_local, @dev, @val={@void}, {@mpls_uc={0x8847, {[], @generic="e747"}}}}, 0x0) [ 352.229677][ T8349] EXT4-fs (loop1): 1 truncate cleaned up [ 352.235461][ T8349] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. [ 352.268605][ T8349] ext4 filesystem being mounted at /root/syzkaller-testdir1690522065/syzkaller.73eBCX/338/file0 supports timestamps until 2038 (0x7fffffff) [ 352.323371][ T3133] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 358.192802][ T8377] loop0: detected capacity change from 0 to 256 13:46:51 executing program 0: syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2000000, &(0x7f0000000540)=ANY=[], 0x1, 0x1a9, &(0x7f0000000440)="$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") creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write(r1, &(0x7f0000000100)="beb12a01000100a2babe2cfe3f8cd6657ce2", 0x12) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x8, 0x11, r2, 0x93d57000) sendfile(r1, r0, 0x0, 0x1ffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendfile(r1, r0, 0x0, 0x1554) 13:46:51 executing program 2: socket$rxrpc(0x21, 0x2, 0xa) socket$rxrpc(0x21, 0x2, 0xa) 13:46:51 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) symlinkat(&(0x7f00000000c0)='./file1\x00', r0, &(0x7f0000000100)='./file0\x00') unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x0) 13:46:51 executing program 3: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$PTP_ENABLE_PPS(r0, 0x40043d04, 0x0) 13:46:51 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) recvmmsg(r0, &(0x7f0000001d80)=[{{0x0, 0x3f1, &(0x7f0000000740)=[{&(0x7f0000000300)=""/228, 0xfffffc9d}], 0x1, 0x0, 0x600, 0x3}}], 0x10002, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, 0xffffffffffffffff, 0x0) 13:46:51 executing program 5: syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2000000, &(0x7f0000000540)=ANY=[], 0x1, 0x1a9, &(0x7f0000000440)="$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") creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write(r1, &(0x7f0000000100)="beb12a01000100a2babe2cfe3f8cd6657ce2", 0x12) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x8, 0x11, r2, 0x93d57000) sendfile(r1, r0, 0x0, 0x1ffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendfile(r1, r0, 0x0, 0x1554) 13:46:51 executing program 3: mknodat(0xffffffffffffffff, &(0x7f0000000e80)='./file0\x00', 0x0, 0x0) 13:46:51 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, 0x0) 13:46:51 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="00f502000700000007d10800ff000000183300000500000095000000c9cebe284724e8000000001811000101", @ANYRES32, @ANYBLOB="00000000000000008520"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0xba, &(0x7f00000000c0)=""/186, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:46:51 executing program 4: select(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)={0x77359400}) [ 359.127144][ T8384] loop5: detected capacity change from 0 to 256 [ 359.137547][ T23] audit: type=1400 audit(1675777611.194:279): avc: denied { read } for pid=8380 comm="syz-executor.3" name="ptp0" dev="devtmpfs" ino=220 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 13:46:51 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$USBDEVFS_SETINTERFACE(r0, 0x8901, 0x0) 13:46:51 executing program 3: clock_gettime(0x0, 0x0) futimesat(0xffffffffffffff9c, 0x0, 0x0) connect$vsock_stream(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x6) [ 359.160812][ T23] audit: type=1400 audit(1675777611.194:280): avc: denied { open } for pid=8380 comm="syz-executor.3" path="/dev/ptp0" dev="devtmpfs" ino=220 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 359.184529][ T23] audit: type=1400 audit(1675777611.194:281): avc: denied { ioctl } for pid=8380 comm="syz-executor.3" path="/dev/ptp0" dev="devtmpfs" ino=220 ioctlcmd=0x3d04 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 13:47:00 executing program 0: syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2000000, &(0x7f0000000540)=ANY=[], 0x1, 0x1a9, &(0x7f0000000440)="$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") creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write(r1, &(0x7f0000000100)="beb12a01000100a2babe2cfe3f8cd6657ce2", 0x12) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x8, 0x11, r2, 0x93d57000) sendfile(r1, r0, 0x0, 0x1ffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendfile(r1, r0, 0x0, 0x1554) 13:47:00 executing program 2: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) 13:47:00 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f00000004c0)={'mangle\x00', 0x2, [{}, {}]}, 0x48) 13:47:00 executing program 4: r0 = add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)={0x0, "745c8ac31004e453232592ff6750510c5596da29b5b456c02056c091815980db0e2f55f86d91b2e6b7daf0a806869d5b55fa7ae864a8f4194735ece27507d882"}, 0x48, 0xfffffffffffffffd) keyctl$search(0xa, r1, &(0x7f00000007c0)='encrypted\x00', &(0x7f0000000800)={'syz', 0x2}, r0) 13:47:00 executing program 3: unlinkat(0xffffffffffffffff, &(0x7f0000007300)='./file0\x00', 0x200) 13:47:00 executing program 5: syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2000000, &(0x7f0000000540)=ANY=[], 0x1, 0x1a9, &(0x7f0000000440)="$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") creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write(r1, &(0x7f0000000100)="beb12a01000100a2babe2cfe3f8cd6657ce2", 0x12) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x8, 0x11, r2, 0x93d57000) sendfile(r1, r0, 0x0, 0x1ffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendfile(r1, r0, 0x0, 0x1554) 13:47:00 executing program 4: renameat2(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000f80)='./file0\x00', 0x4) 13:47:00 executing program 3: unshare(0x6c060000) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x8979) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000000)={'nat\x00'}, &(0x7f0000000080)=0x78) 13:47:00 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000700)=@bpf_lsm={0x1d, 0x5, &(0x7f0000000180)=@raw=[@jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0x104}, @generic, @ldst, @initr0], &(0x7f0000000200)='GPL\x00', 0x7, 0xe6, &(0x7f0000000240)=""/230, 0x0, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:47:00 executing program 2: select(0x0, 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100)={0x77359400}) 13:47:00 executing program 4: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f00000000c0)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast1}}, 0x24) setsockopt$RXRPC_SECURITY_KEYRING(r0, 0x110, 0x2, 0x0, 0x0) [ 368.483217][ T8414] loop5: detected capacity change from 0 to 256 [ 368.503698][ T23] audit: type=1400 audit(1675777620.564:282): avc: denied { bind } for pid=8407 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 13:47:00 executing program 4: syz_emit_ethernet(0x12, &(0x7f0000000180)={@link_local, @dev, @val={@void}, {@mpls_uc}}, 0x0) [ 368.575867][ T23] audit: type=1400 audit(1675777620.624:283): avc: denied { setopt } for pid=8421 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 380.906671][ T8436] loop0: detected capacity change from 0 to 256 13:47:13 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) bind$802154_raw(r0, &(0x7f0000000000)={0x24, @short}, 0x14) 13:47:13 executing program 1: openat$autofs(0xffffffffffffff9c, &(0x7f0000000b00), 0xff00, 0x0) 13:47:13 executing program 4: readlinkat(0xffffffffffffffff, 0x0, &(0x7f0000000f00)=""/109, 0x6d) 13:47:13 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000240)=0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r0, 0x8, &(0x7f00000002c0)=0x81) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0xc) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000540)=ANY=[@ANYBLOB="18000000000000000000000000000000950000000000000029671ad45a2753b448ffdbaa232a9f05a37ed42b76bf3e303de7f828d42919794b05ac054c34f5fbb9c4027731200bcad1b565dc155af5d40ee0cf4ff81cb9218e3068c1611dba2b6163c5695627a3ef80e80aa5a680aaffb90be7a0a1286552b2b8983e7f6fdae658c3f29f4b56ec4c974d0a95431e4c464c187a6ed0029589959b602c48bcd3aed558d1439ba2940a2643c17367fffe46ceb00e3b1ab784d5d42f527001e8b24d9146bb47073e"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) ppoll(&(0x7f00000000c0)=[{0xffffffffffffffff, 0x20c2}], 0x1, &(0x7f0000000180), &(0x7f00000001c0)={[0x8]}, 0x8) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000) write(r1, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, 0x0) r3 = openat$loop_ctrl(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'ip6gre0\x00'}) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x4e1e, 0xffff, @local, 0x10000}, 0x1c) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@loopback={0x0, 0x3fc}}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) 13:47:13 executing program 5: syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2000000, &(0x7f0000000540)=ANY=[], 0x1, 0x1a9, &(0x7f0000000440)="$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") creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write(r1, &(0x7f0000000100)="beb12a01000100a2babe2cfe3f8cd6657ce2", 0x12) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x8, 0x11, r2, 0x93d57000) sendfile(r1, r0, 0x0, 0x1ffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) sendfile(r1, r0, 0x0, 0x1554) 13:47:13 executing program 2: socketpair$nbd(0xa, 0x1, 0x0, &(0x7f0000000200)) 13:47:14 executing program 4: add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "42ba5e2593b4677fa11c4bed314fcc70f6c547323d4d15e8817b179dd49bdcb8244a8fc91e680c8bf089d502e25ed52691e1ef9fd111edf4134d5ae3181e7cf7"}, 0x48, 0xfffffffffffffffd) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "42ba5e2593b4677fa11c4bed314fcc70f6c547323d4d15e8817b179dd49bdcb8244a8fc91e680c8bf089d502e25ed52691e1ef9fd111edf4134d5ae3181e7cf7"}, 0x48, 0xfffffffffffffffd) keyctl$KEYCTL_WATCH_KEY(0x20, r1, r0, 0x0) 13:47:14 executing program 2: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)='S0H', 0x3}}, 0x0) 13:47:14 executing program 1: sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) [ 381.932887][ T23] audit: type=1400 audit(1675777633.994:284): avc: denied { append } for pid=8440 comm="syz-executor.1" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 381.945790][ T8448] loop5: detected capacity change from 0 to 256 13:47:14 executing program 4: add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0xffffffffffffffff) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "42ba5e2593b4677fa11c4bed314fcc70f6c547323d4d15e8817b179dd49bdcb8244a8fc91e680c8bf089d502e25ed52691e1ef9fd111edf4134d5ae3181e7cf7"}, 0x48, 0xfffffffffffffffd) keyctl$KEYCTL_WATCH_KEY(0x20, r1, r0, 0x0) 13:47:14 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x0, {0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}, 0x7ffffffff000) 13:47:14 executing program 4: ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f00000012c0)={0x0}) clock_gettime(0x0, &(0x7f0000001500)) [ 381.989881][ T8451] ieee802154 phy0 wpan0: encryption failed: -22 13:47:22 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x48) 13:47:22 executing program 2: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000040)={0x24, @short}, 0x14) 13:47:22 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f00000004c0)={'mangle\x00', 0x2, [{}, {}]}, 0x48) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, 0x0, 0x0) 13:47:22 executing program 1: select(0x40, &(0x7f0000000040)={0x4}, 0x0, &(0x7f00000000c0)={0x2}, 0x0) 13:47:22 executing program 5: syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2000000, &(0x7f0000000540)=ANY=[], 0x1, 0x1a9, &(0x7f0000000440)="$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") creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write(r1, &(0x7f0000000100)="beb12a01000100a2babe2cfe3f8cd6657ce2", 0x12) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x8, 0x11, r2, 0x93d57000) sendfile(r1, r0, 0x0, 0x1ffff) sendfile(r1, r0, 0x0, 0x1554) 13:47:22 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000240)=0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r0, 0x8, &(0x7f00000002c0)=0x81) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0xc) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000540)=ANY=[@ANYBLOB="18000000000000000000000000000000950000000000000029671ad45a2753b448ffdbaa232a9f05a37ed42b76bf3e303de7f828d42919794b05ac054c34f5fbb9c4027731200bcad1b565dc155af5d40ee0cf4ff81cb9218e3068c1611dba2b6163c5695627a3ef80e80aa5a680aaffb90be7a0a1286552b2b8983e7f6fdae658c3f29f4b56ec4c974d0a95431e4c464c187a6ed0029589959b602c48bcd3aed558d1439ba2940a2643c17367fffe46ceb00e3b1ab784d5d42f527001e8b24d9146bb47073e"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) ppoll(&(0x7f00000000c0)=[{0xffffffffffffffff, 0x20c2}], 0x1, &(0x7f0000000180), &(0x7f00000001c0)={[0x8]}, 0x8) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000) write(r1, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, 0x0) r3 = openat$loop_ctrl(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'ip6gre0\x00'}) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x4e1e, 0xffff, @local, 0x10000}, 0x1c) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@loopback={0x0, 0x3fc}}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) 13:47:22 executing program 2: syz_open_dev$loop(&(0x7f0000008380), 0x0, 0x103400) 13:47:22 executing program 4: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)="8e7f5be527f90acaa0f141b4769ee97a78bd97b8e0d137e6f8fd477deecd7b0c436a753bdbfddc9e8b7bc99c898e744c36533c3945fde29e4dd66636544bac7c1a0b1108a7b51315210cdd535c026708ee8c6ba106ea7471c558388b1f6b792f9bab27aa18ced471a172ab099ed10d7bc0dc126947cb07d84d9924682253b79f", 0x80}}, 0x0) [ 390.197754][ T8468] loop5: detected capacity change from 0 to 256 [ 390.209728][ T23] audit: type=1400 audit(1675777642.264:285): avc: denied { bind } for pid=8467 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 13:47:22 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x1}, {0x0, 0x0, 0x8}, {0x16}]}) 13:47:22 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:47:22 executing program 2: perf_event_open$cgroup(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 390.246217][ T23] audit: type=1400 audit(1675777642.304:286): avc: denied { append } for pid=8476 comm="syz-executor.2" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 390.275788][ T23] audit: type=1326 audit(1675777642.334:287): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8480 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f02d0cf20f9 code=0x0 [ 390.315255][ T23] audit: type=1400 audit(1675777642.374:288): avc: denied { open } for pid=8486 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 13:47:22 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000008c0)={&(0x7f0000000700)={{0xeb9f, 0x1, 0x0, 0x18, 0x600, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f0000000800)=""/186, 0x26, 0xba, 0x1}, 0x20) [ 390.335037][ T23] audit: type=1400 audit(1675777642.374:289): avc: denied { kernel } for pid=8486 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 390.354911][ T23] audit: type=1400 audit(1675777642.374:290): avc: denied { cpu } for pid=8486 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 13:47:28 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000008c0)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x7, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x4}]}]}, {0x0, [0x0, 0x0, 0x0, 0x5f, 0x2e]}}, &(0x7f0000000800)=""/186, 0x37, 0xba, 0x1}, 0x20) 13:47:28 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f00000014c0)={0x0, 0x0, &(0x7f00000012c0)=[{&(0x7f0000000780)="c936056087a4a03fcfbe01507ef8df74b5413a885e7d5604494dd4cef30cc48b0f4f1c883b49653152da97a0fa91beb81bf5ed0ea7280c1afa5688f0c101cbdfb8472d7ad434166002c46b9b4714acd9643a7440d52d0c6a3d6127b3bb4b164938762a24f8ac8cad9d3c0ac346014fdbc7ef9ad0a2e4403888c59245deb4a44df2b2102fa2952e8bfa98d462511e4db10b2ea98107cb39ee70699ea130db72cc145a0764ac46c0972380f4657a0acc464ce9894780a0d0786b43e4c005d39280000000", 0xc3}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x100000000000005b}, 0x0) 13:47:28 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000480)={&(0x7f0000000040)={0x2, 0x0, @local}, 0x10, 0x0}, 0x0) 13:47:28 executing program 5: syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2000000, &(0x7f0000000540)=ANY=[], 0x1, 0x1a9, &(0x7f0000000440)="$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") creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write(r1, &(0x7f0000000100)="beb12a01000100a2babe2cfe3f8cd6657ce2", 0x12) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x8, 0x11, r2, 0x93d57000) sendfile(r1, r0, 0x0, 0x1554) 13:47:28 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef]}}, &(0x7f00000004c0)=""/167, 0x26, 0xa7, 0x1}, 0x20) 13:47:28 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000240)=0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r0, 0x8, &(0x7f00000002c0)=0x81) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0xc) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000540)=ANY=[@ANYBLOB="18000000000000000000000000000000950000000000000029671ad45a2753b448ffdbaa232a9f05a37ed42b76bf3e303de7f828d42919794b05ac054c34f5fbb9c4027731200bcad1b565dc155af5d40ee0cf4ff81cb9218e3068c1611dba2b6163c5695627a3ef80e80aa5a680aaffb90be7a0a1286552b2b8983e7f6fdae658c3f29f4b56ec4c974d0a95431e4c464c187a6ed0029589959b602c48bcd3aed558d1439ba2940a2643c17367fffe46ceb00e3b1ab784d5d42f527001e8b24d9146bb47073e"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) ppoll(&(0x7f00000000c0)=[{0xffffffffffffffff, 0x20c2}], 0x1, &(0x7f0000000180), &(0x7f00000001c0)={[0x8]}, 0x8) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000) write(r1, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, 0x0) r3 = openat$loop_ctrl(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'ip6gre0\x00'}) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x4e1e, 0xffff, @local, 0x10000}, 0x1c) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@loopback={0x0, 0x3fc}}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) 13:47:28 executing program 1: socketpair(0xa, 0x2, 0x0, &(0x7f0000000280)) 13:47:28 executing program 2: r0 = semget$private(0x0, 0x4, 0x0) semop(r0, &(0x7f0000000000)=[{0x3}, {}], 0x1f4) 13:47:28 executing program 4: bpf$MAP_CREATE(0x5, &(0x7f0000000180), 0x48) 13:47:28 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$packet(r0, 0x0, &(0x7f0000000100)) 13:47:28 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmsg$inet(0xffffffffffffffff, 0x0, 0xc000) socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f00000006c0)=ANY=[@ANYBLOB="2c771ac628f7bb670b72e7b0360000070600000305000100070000000800"], 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x24000001) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shutdown(r0, 0x2) r1 = socket$packet(0x11, 0x3, 0x300) pipe2$watch_queue(0x0, 0x80) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000040), 0x4) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f0000000280)=@req3={0x8000, 0x6, 0x0, 0x6}, 0x1c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={0x0, 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x80) 13:47:28 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c47, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace(0xffffffffffffffff, 0x0) getpid() tkill(0x0, 0x12) r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1f, 0x9, 0x9, 0x1, 0x0, 0x1007, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040)}, 0x40080, 0x3, 0x3, 0x9, 0x0, 0x2, 0x0, 0x0, 0x6, 0x0, 0x2}, 0x0, 0xfffffffffffffffd, r0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) sched_setscheduler(r1, 0x3, 0x0) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x2000480, &(0x7f0000000000)=ANY=[], 0x1, 0x76a, &(0x7f0000000fc0)="$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") open(&(0x7f0000000080)='./bus\x00', 0x6fe44da629969272, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write$binfmt_misc(r3, &(0x7f0000000180)={'syz0'}, 0x4) accept$unix(r3, &(0x7f0000000280)=@abs, &(0x7f00000000c0)=0x6e) sendfile(r3, r2, 0x0, 0x1ffff) copy_file_range(r0, &(0x7f0000000300)=0x9, r0, &(0x7f0000000340), 0xb3, 0x0) socket$key(0xf, 0x3, 0x2) ptrace(0x11, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, 0x0, 0xe}, 0x0) [ 396.445185][ T8498] loop5: detected capacity change from 0 to 256 [ 396.558824][ T23] audit: type=1400 audit(1675777648.614:291): avc: denied { shutdown } for pid=8515 comm="syz-executor.4" laddr=::1 lport=20003 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 396.574984][ T8516] loop2: detected capacity change from 0 to 2048 [ 396.625356][ T8516] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 396.640816][ T23] audit: type=1400 audit(1675777648.694:292): avc: denied { write } for pid=8513 comm="syz-executor.2" path="/root/syzkaller-testdir2391035347/syzkaller.dfbHy2/374/file0/bus" dev="loop2" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 396.651201][ T8516] EXT4-fs error (device loop2): ext4_mb_generate_buddy:1098: group 0, block bitmap and bg descriptor inconsistent: 25 vs 150994969 free clusters [ 396.683446][ T8516] EXT4-fs (loop2): Delayed block allocation failed for inode 18 at logical offset 0 with max blocks 1 with error 28 [ 396.696579][ T8516] EXT4-fs (loop2): This should not happen!! Data will be lost [ 396.696579][ T8516] [ 396.706348][ T8516] EXT4-fs (loop2): Total free blocks count 0 [ 396.712350][ T8516] EXT4-fs (loop2): Free/Dirty block details [ 396.718416][ T8516] EXT4-fs (loop2): free_blocks=2415919104 [ 396.719754][ T23] audit: type=1400 audit(1675777648.774:293): avc: denied { create } for pid=8513 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 396.724201][ T8516] EXT4-fs (loop2): dirty_blocks=16 [ 396.724227][ T8516] EXT4-fs (loop2): Block reservation details [ 396.724246][ T8516] EXT4-fs (loop2): i_reserved_data_blocks=1 [ 396.761699][ T8516] syz-executor.2 (8516) used greatest stack depth: 9768 bytes left [ 396.771954][ T3137] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. 13:47:34 executing program 0: socketpair(0x1, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$X25_QBITINCL(r0, 0x106, 0x1, 0x0, 0x0) 13:47:34 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c47, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace(0xffffffffffffffff, 0x0) getpid() tkill(0x0, 0x12) r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1f, 0x9, 0x9, 0x1, 0x0, 0x1007, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040)}, 0x40080, 0x0, 0x3, 0x9, 0x0, 0x2, 0x0, 0x0, 0x6, 0x0, 0x2}, 0x0, 0xfffffffffffffffd, r0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) sched_setscheduler(r1, 0x3, 0x0) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x2000480, &(0x7f0000000000)=ANY=[], 0x1, 0x76a, &(0x7f0000000fc0)="$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") open(&(0x7f0000000080)='./bus\x00', 0x6fe44da629969272, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write$binfmt_misc(r3, &(0x7f0000000180)={'syz0'}, 0x4) accept$unix(r3, &(0x7f0000000280)=@abs, &(0x7f00000000c0)=0x6e) sendfile(r3, r2, 0x0, 0x1ffff) copy_file_range(r0, &(0x7f0000000300)=0x9, r0, &(0x7f0000000340), 0xb3, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x9, 0x0) ptrace(0x11, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, 0x0, 0xe}, 0x0) 13:47:34 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000540), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CCA_ED_LEVEL(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x20, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}]}, 0x20}}, 0x0) 13:47:34 executing program 5: syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2000000, &(0x7f0000000540)=ANY=[], 0x1, 0x1a9, &(0x7f0000000440)="$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") creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write(r1, &(0x7f0000000100)="beb12a01000100a2babe2cfe3f8cd6657ce2", 0x12) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x8, 0x11, r2, 0x93d57000) sendfile(r1, r0, 0x0, 0x1554) 13:47:34 executing program 2: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff}) ioctl$SIOCX25GSUBSCRIP(r0, 0x8982, &(0x7f0000000000)={'pim6reg0\x00'}) 13:47:34 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000240)=0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r0, 0x8, &(0x7f00000002c0)=0x81) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0xc) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000540)=ANY=[@ANYBLOB="18000000000000000000000000000000950000000000000029671ad45a2753b448ffdbaa232a9f05a37ed42b76bf3e303de7f828d42919794b05ac054c34f5fbb9c4027731200bcad1b565dc155af5d40ee0cf4ff81cb9218e3068c1611dba2b6163c5695627a3ef80e80aa5a680aaffb90be7a0a1286552b2b8983e7f6fdae658c3f29f4b56ec4c974d0a95431e4c464c187a6ed0029589959b602c48bcd3aed558d1439ba2940a2643c17367fffe46ceb00e3b1ab784d5d42f527001e8b24d9146bb47073e"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) ppoll(&(0x7f00000000c0)=[{0xffffffffffffffff, 0x20c2}], 0x1, &(0x7f0000000180), &(0x7f00000001c0)={[0x8]}, 0x8) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000) write(r1, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, 0x0) r3 = openat$loop_ctrl(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'ip6gre0\x00'}) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x4e1e, 0xffff, @local, 0x10000}, 0x1c) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@loopback={0x0, 0x3fc}}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) 13:47:34 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c47, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace(0xffffffffffffffff, 0x0) getpid() tkill(0x0, 0x12) r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1f, 0x0, 0x0, 0x1, 0x0, 0x1007, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040)}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x2, 0x0, 0x0, 0x6, 0x0, 0x2}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) sched_setscheduler(r1, 0x3, 0x0) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x2000480, &(0x7f0000000000)=ANY=[], 0x1, 0x76a, &(0x7f0000000fc0)="$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") open(&(0x7f0000000080)='./bus\x00', 0x6fe44da629969272, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write$binfmt_misc(r3, &(0x7f0000000180)={'syz0'}, 0x4) accept$unix(r3, 0x0, 0x0) sendfile(r3, r2, 0x0, 0x1ffff) copy_file_range(r0, 0x0, 0xffffffffffffffff, &(0x7f0000000340), 0xb3, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x9, 0x0) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, 0x0, 0xe}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, 0x0, 0xe}, 0x0) [ 402.705021][ T23] audit: type=1400 audit(1675777654.764:294): avc: denied { read } for pid=8531 comm="syz-executor.4" dev="nsfs" ino=4026532769 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 402.726571][ T23] audit: type=1400 audit(1675777654.764:295): avc: denied { open } for pid=8531 comm="syz-executor.4" path="net:[4026532769]" dev="nsfs" ino=4026532769 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 13:47:34 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmsg$inet(0xffffffffffffffff, 0x0, 0xc000) socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0}, 0x10) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f00000006c0)=ANY=[@ANYBLOB="2c771ac628f7bb670b72e7b0360000070600000305000100070000000800"], 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x24000001) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.current\x00', 0x0, 0x0) shutdown(r0, 0x2) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000040)={0x3}, 0x4) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f0000000280)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={0x0, 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x0) 13:47:34 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmsg$inet(0xffffffffffffffff, 0x0, 0xc000) socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0}, 0x10) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f00000006c0)=ANY=[@ANYBLOB="2c771ac628f7bb670b72e7b0360000070600000305000100070000000800"], 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x24000001) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.current\x00', 0x0, 0x0) shutdown(r0, 0x2) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000040)={0x3}, 0x4) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f0000000280)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={0x0, 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x0) [ 402.734548][ T8529] loop1: detected capacity change from 0 to 2048 [ 402.755506][ T8534] loop5: detected capacity change from 0 to 256 [ 402.791501][ T8529] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 402.841358][ T8529] EXT4-fs error (device loop1): ext4_mb_generate_buddy:1098: group 0, block bitmap and bg descriptor inconsistent: 25 vs 150994969 free clusters [ 402.863712][ T8529] EXT4-fs (loop1): Delayed block allocation failed for inode 18 at logical offset 0 with max blocks 1 with error 28 [ 402.867144][ T8542] loop4: detected capacity change from 0 to 2048 [ 402.876060][ T8529] EXT4-fs (loop1): This should not happen!! Data will be lost [ 402.876060][ T8529] [ 402.876102][ T8529] EXT4-fs (loop1): Total free blocks count 0 [ 402.876133][ T8529] EXT4-fs (loop1): Free/Dirty block details [ 402.904342][ T8529] EXT4-fs (loop1): free_blocks=2415919104 [ 402.905321][ T8542] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 402.910160][ T8529] EXT4-fs (loop1): dirty_blocks=16 [ 402.927101][ T8529] EXT4-fs (loop1): Block reservation details [ 402.933227][ T8529] EXT4-fs (loop1): i_reserved_data_blocks=1 [ 402.936684][ T8542] EXT4-fs error (device loop4): ext4_mb_generate_buddy:1098: group 0, block bitmap and bg descriptor inconsistent: 25 vs 150994969 free clusters [ 402.954759][ T8542] EXT4-fs (loop4): Delayed block allocation failed for inode 18 at logical offset 0 with max blocks 1 with error 28 [ 402.967106][ T8542] EXT4-fs (loop4): This should not happen!! Data will be lost [ 402.967106][ T8542] [ 402.976967][ T8542] EXT4-fs (loop4): Total free blocks count 0 [ 402.983164][ T8542] EXT4-fs (loop4): Free/Dirty block details 13:47:35 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c47, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace(0xffffffffffffffff, 0x0) getpid() tkill(0x0, 0x12) r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1f, 0x9, 0x9, 0x1, 0x0, 0x1007, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040)}, 0x40080, 0x0, 0x3, 0x9, 0x0, 0x2, 0x0, 0x0, 0x6, 0x0, 0x2}, 0x0, 0xfffffffffffffffd, r0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) sched_setscheduler(r1, 0x3, 0x0) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x2000480, &(0x7f0000000000)=ANY=[], 0x1, 0x76a, &(0x7f0000000fc0)="$eJzs3d9rW1UcAPDvTdt17aatIOh8KghaGEvtrJuCDxMfRHAw0Ge3kGZlNm1Gk461FNwQwRdBxQdBX/bsj/nmqz9e9b/wQTamdsOJD1K5adJla9KlW5MI+XzgNOfce9Nzvjn3nnuSe0kC6FsT6Z9MxKGI+CiJGKstTyJiqJobjDixud3t9bV8mpLY2Hjzj6S6za31tXw0PCd1oFZ4MiJ+fD/icGZ7veWV1flcsVhYqpWnKgvnp8orq0fOLeTmCnOFxWPTMzNHj79w/NjexfrXL6sHr3/82rPfnPjnvSeufvhTEifiYG1dYxx7ZSImaq/JUPoS3uXVva6sx5JeN4AHkh6aA5tHeRyKsRio5loY6WbLAIBOeTciNgCAPpM4/wNAn6l/DnBrfS1fT739RKK7brwSEfs3469f39xcM1i7Zre/eh109FZy15WRJCLG96D+iYj44ru3v0pTdOg6JEAzly5HxJnxie3jf7LtnoXdeq6NbSbuKRv/oHu+T+c/Lzab/2W25j/RZP4z3OTYfRD3P/4z1/agmpbS+d/LDfe23W6Iv2Z8oFZ6pDrnG0rOnisW0rHt0YiYjKHhtDy9Qx2TN/+92Wpd4/zvz0/e+TKtP328s0Xm2uDw3c+ZzVVyDxNzoxuXI54abBZ/stX/SYv576k263j9pQ8+b7UujT+Nt562x99ZG1cinmna/3fuaEt2vD9xqro7TNV3iia+/fWz0Vb1N/Z/mtL66+8FuiHt/9Gd4x9PGu/XLO++jp+vjP3Qat3942++/+9L3qrm99WWXcxVKkvTEfuSN7YvP3rnufVyffs0/smnmx//O+3/6XvCM23GP3j9968fPP7OSuOf3VX/7z5z9fb8QKv62+v/mWpusraknfGv3QY+zGsHAAAAAAAAAAAAAAAAAAAAAAAAAO3KRMTBSDLZrXwmk81u/ob34zGaKZbKlcNnS8uLs1H9rezxGMrUv+pyrOH7UKdr34dfLx+9p/x8RDwWEZ8Oj1TL2XypONvr4AEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACg5kCL3/9P/Tbc69YBAB2zv9cNAAC6zvkfAPrP7s7/Ix1rBwDQPd7/A0D/cf4HgP7j/A8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAECHnTp5Mk0bf6+v5dPy7IWV5fnShSOzhfJ8dmE5n82Xls5n50qluWIhmy8ttPxHlzYfiqXS+ZlYXL44VSmUK1PlldXTC6Xlxcrpcwu5ucLpwlDXIgMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACA9pVXVudzxWJhSUZGRmYr0zhKjPRugAIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD4n/svAAD//9EyKso=") open(&(0x7f0000000080)='./bus\x00', 0x6fe44da629969272, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write$binfmt_misc(r3, &(0x7f0000000180)={'syz0'}, 0x4) accept$unix(r3, &(0x7f0000000280)=@abs, &(0x7f00000000c0)=0x6e) sendfile(r3, r2, 0x0, 0x1ffff) copy_file_range(r0, &(0x7f0000000300)=0x9, r0, &(0x7f0000000340), 0xb3, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x9, 0x0) ptrace(0x11, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, 0x0, 0xe}, 0x0) 13:47:35 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmsg$inet(0xffffffffffffffff, 0x0, 0xc000) socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0}, 0x10) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f00000006c0)=ANY=[@ANYBLOB="2c771ac628f7bb670b72e7b0360000070600000305000100070000000800"], 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x24000001) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.current\x00', 0x0, 0x0) shutdown(r0, 0x2) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000040)={0x3}, 0x4) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f0000000280)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={0x0, 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x0) 13:47:35 executing program 5: syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2000000, &(0x7f0000000540)=ANY=[], 0x1, 0x1a9, &(0x7f0000000440)="$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") creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write(r1, &(0x7f0000000100)="beb12a01000100a2babe2cfe3f8cd6657ce2", 0x12) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x8, 0x11, r2, 0x93d57000) sendfile(r1, r0, 0x0, 0x1554) [ 402.989112][ T8542] EXT4-fs (loop4): free_blocks=2415919104 [ 402.994910][ T8542] EXT4-fs (loop4): dirty_blocks=16 [ 403.000112][ T8542] EXT4-fs (loop4): Block reservation details [ 403.006188][ T8542] EXT4-fs (loop4): i_reserved_data_blocks=1 [ 403.014024][ T3133] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 403.082233][ T3140] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 403.095496][ T8557] loop1: detected capacity change from 0 to 2048 [ 403.101812][ T8559] loop5: detected capacity change from 0 to 256 [ 403.125209][ T8557] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 403.155811][ T8557] EXT4-fs error (device loop1): ext4_mb_generate_buddy:1098: group 0, block bitmap and bg descriptor inconsistent: 25 vs 150994969 free clusters [ 403.170996][ T8557] EXT4-fs (loop1): Delayed block allocation failed for inode 18 at logical offset 0 with max blocks 1 with error 28 [ 403.183399][ T8557] EXT4-fs (loop1): This should not happen!! Data will be lost [ 403.183399][ T8557] [ 403.193187][ T8557] EXT4-fs (loop1): Total free blocks count 0 [ 403.199235][ T8557] EXT4-fs (loop1): Free/Dirty block details [ 403.205206][ T8557] EXT4-fs (loop1): free_blocks=2415919104 [ 403.211019][ T8557] EXT4-fs (loop1): dirty_blocks=16 [ 403.216237][ T8557] EXT4-fs (loop1): Block reservation details [ 403.222268][ T8557] EXT4-fs (loop1): i_reserved_data_blocks=1 [ 403.236761][ T8557] syz-executor.1 (8557) used greatest stack depth: 9752 bytes left [ 403.247339][ T3133] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 13:47:40 executing program 0: bpf$MAP_CREATE(0xf, &(0x7f0000000180), 0x48) 13:47:40 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c47, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace(0xffffffffffffffff, 0x0) getpid() tkill(0x0, 0x12) r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1f, 0x0, 0x0, 0x1, 0x0, 0x1007, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040)}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x2, 0x0, 0x0, 0x6, 0x0, 0x2}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) sched_setscheduler(r1, 0x3, 0x0) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x2000480, &(0x7f0000000000)=ANY=[], 0x1, 0x76a, &(0x7f0000000fc0)="$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") open(&(0x7f0000000080)='./bus\x00', 0x6fe44da629969272, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write$binfmt_misc(r3, &(0x7f0000000180)={'syz0'}, 0x4) accept$unix(r3, 0x0, 0x0) sendfile(r3, r2, 0x0, 0x1ffff) copy_file_range(r0, 0x0, 0xffffffffffffffff, &(0x7f0000000340), 0xb3, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x9, 0x0) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, 0x0, 0xe}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, 0x0, 0xe}, 0x0) 13:47:40 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmsg$inet(0xffffffffffffffff, 0x0, 0xc000) socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0}, 0x10) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f00000006c0)=ANY=[@ANYBLOB="2c771ac628f7bb670b72e7b0360000070600000305000100070000000800"], 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x24000001) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.current\x00', 0x0, 0x0) shutdown(r0, 0x2) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000040)={0x3}, 0x4) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f0000000280)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={0x0, 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x0) 13:47:40 executing program 5: syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2000000, &(0x7f0000000540)=ANY=[], 0x1, 0x1a9, &(0x7f0000000440)="$eJzs3TFrE2EcBvCnNmpwSQYncThwcQpNP0GLVBADgnKDToptQXqhYCGgg3Xz+/khnO3WQTixJ0lbzsGhnvR+vyUPvHngfZd7p/vf6/vzg93Do/2Tk28ZDtcy2MpWTtcyzo2sp/E5AMB1clrX+V43ut4LAPBvuP8BoH/c/wDQP+5/AOifFy9fPd2ezXaeF8UwmX9ZlIuy+W3Wt/fzLlX2spFRfiT1UpMfP5ntbBRnxinnx7/7x4ty/WJ/mlHG7f1p0y8u9m/mzvn+Zka5297fbO3fysMH5/qTjPL1bQ5TZTe/uqv+p2lRPHo2u9S/ffY/AAAAAAAAAAAAAAAAAAAAAAC4CpNiqXV+z2Typ/Wm/xfzgS7N1xnk3qDbswMAAAAAAAAAAAAAAAAAAMD/4ujDx4M3VbX3XhAEYRm6fjIBAAAAAAAAAAAAAAAAAED/rF767XonAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAANCd1ff/ry50fUYAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPgZAAD//yusq24=") creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write(r1, &(0x7f0000000100)="beb12a01000100a2babe2cfe3f8cd6657ce2", 0x12) socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x1ffff) sendfile(r1, r0, 0x0, 0x1554) 13:47:40 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c47, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace(0xffffffffffffffff, 0x0) getpid() tkill(0x0, 0x12) r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1f, 0x9, 0x9, 0x1, 0x0, 0x1007, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040)}, 0x40080, 0x0, 0x3, 0x9, 0x0, 0x2, 0x0, 0x0, 0x6, 0x0, 0x2}, 0x0, 0xfffffffffffffffd, r0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) sched_setscheduler(r1, 0x3, 0x0) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x2000480, &(0x7f0000000000)=ANY=[], 0x1, 0x76a, &(0x7f0000000fc0)="$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") open(&(0x7f0000000080)='./bus\x00', 0x6fe44da629969272, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write$binfmt_misc(r3, &(0x7f0000000180)={'syz0'}, 0x4) accept$unix(r3, &(0x7f0000000280)=@abs, &(0x7f00000000c0)=0x6e) sendfile(r3, r2, 0x0, 0x1ffff) copy_file_range(r0, &(0x7f0000000300)=0x9, r0, &(0x7f0000000340), 0xb3, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x9, 0x0) ptrace(0x11, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, 0x0, 0xe}, 0x0) 13:47:40 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000280)=0x5d, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f00000001c0)={0x1, &(0x7f0000f07000)=[{0x6}]}, 0x10) 13:47:41 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmsg$inet(0xffffffffffffffff, 0x0, 0xc000) socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f00000006c0)=ANY=[@ANYBLOB="2c771ac628f7bb670b72e7b0360000070600000305000100070000000800"], 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x24000001) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.current\x00', 0x0, 0x0) shutdown(r0, 0x2) r1 = socket$packet(0x11, 0x3, 0x300) pipe2$watch_queue(0x0, 0x80) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000040), 0x4) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f0000000280)=@req3={0x8000, 0x6, 0x0, 0x6}, 0x1c) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={0x0, 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x80) [ 408.925119][ T8573] loop5: detected capacity change from 0 to 256 13:47:41 executing program 2: syz_mount_image$msdos(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000000c0)={[{@nodots}, {@nodots}, {@nodots}, {@nodots}, {@nodots}, {@nodots}, {@nodots}, {@fat=@dos1xfloppy}, {@nodots}, {@fat=@discard}, {@nodots}, {@dots}, {@nodots}, {@nodots}, {@dots}, {@fat=@nocase}, {@fat=@flush}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0x6}}, {@fat=@usefree}, {@dots}]}, 0x1, 0x183, &(0x7f00000005c0)="$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") perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xe000000, 0x0, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) [ 408.978157][ T8572] loop1: detected capacity change from 0 to 2048 [ 408.983657][ T8570] loop4: detected capacity change from 0 to 2048 13:47:41 executing program 3: r0 = semget$private(0x0, 0x4, 0x0) semop(r0, &(0x7f0000000000)=[{0x0, 0x1}, {}], 0x2) semop(r0, &(0x7f0000000040)=[{0x0, 0x6, 0x1800}], 0x1) [ 409.024386][ T8582] loop2: detected capacity change from 0 to 256 [ 409.026362][ T8572] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 409.034091][ T8582] ======================================================= [ 409.034091][ T8582] WARNING: The mand mount option has been deprecated and [ 409.034091][ T8582] and is ignored by this kernel. Remove the mand [ 409.034091][ T8582] option from the mount to silence this warning. [ 409.034091][ T8582] ======================================================= [ 409.097790][ T8572] EXT4-fs error (device loop1): ext4_mb_generate_buddy:1098: group 0, block bitmap and bg descriptor inconsistent: 25 vs 150994969 free clusters [ 409.114928][ T8570] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 409.115987][ T8572] EXT4-fs (loop1): Delayed block allocation failed for inode 18 at logical offset 0 with max blocks 1 with error 28 [ 409.139040][ T8572] EXT4-fs (loop1): This should not happen!! Data will be lost 13:47:41 executing program 2: syz_mount_image$msdos(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000000c0)={[{@nodots}, {@nodots}, {@nodots}, {@nodots}, {@nodots}, {@nodots}, {@nodots}, {@fat=@dos1xfloppy}, {@nodots}, {@fat=@discard}, {@nodots}, {@dots}, {@nodots}, {@nodots}, {@dots}, {@fat=@nocase}, {@fat=@flush}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0x6}}, {@fat=@usefree}, {@dots}]}, 0x1, 0x183, &(0x7f00000005c0)="$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") perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xe000000, 0x0, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) [ 409.139040][ T8572] [ 409.148758][ T8572] EXT4-fs (loop1): Total free blocks count 0 [ 409.154810][ T8572] EXT4-fs (loop1): Free/Dirty block details [ 409.159120][ T8570] EXT4-fs error (device loop4): ext4_mb_generate_buddy:1098: group 0, [ 409.160719][ T8572] EXT4-fs (loop1): free_blocks=2415919104 [ 409.160745][ T8572] EXT4-fs (loop1): dirty_blocks=16 [ 409.169010][ T8570] block bitmap and bg descriptor inconsistent: 25 vs 150994969 free clusters [ 409.174730][ T8572] EXT4-fs (loop1): Block reservation details [ 409.174755][ T8572] EXT4-fs (loop1): i_reserved_data_blocks=1 [ 409.202809][ T8570] EXT4-fs (loop4): Delayed block allocation failed for inode 18 at logical offset 0 with max blocks 1 with error 28 [ 409.215146][ T8570] EXT4-fs (loop4): This should not happen!! Data will be lost [ 409.215146][ T8570] [ 409.224957][ T8570] EXT4-fs (loop4): Total free blocks count 0 [ 409.231036][ T8570] EXT4-fs (loop4): Free/Dirty block details [ 409.237100][ T8570] EXT4-fs (loop4): free_blocks=2415919104 [ 409.242872][ T8570] EXT4-fs (loop4): dirty_blocks=16 13:47:41 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c47, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace(0xffffffffffffffff, 0x0) getpid() tkill(0x0, 0x12) r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1f, 0x9, 0x9, 0x1, 0x0, 0x1007, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040)}, 0x40080, 0x0, 0x3, 0x9, 0x0, 0x2, 0x0, 0x0, 0x6, 0x0, 0x2}, 0x0, 0xfffffffffffffffd, r0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) sched_setscheduler(r1, 0x3, 0x0) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x2000480, &(0x7f0000000000)=ANY=[], 0x1, 0x76a, &(0x7f0000000fc0)="$eJzs3d9rW1UcAPDvTdt17aatIOh8KghaGEvtrJuCDxMfRHAw0Ge3kGZlNm1Gk461FNwQwRdBxQdBX/bsj/nmqz9e9b/wQTamdsOJD1K5adJla9KlW5MI+XzgNOfce9Nzvjn3nnuSe0kC6FsT6Z9MxKGI+CiJGKstTyJiqJobjDixud3t9bV8mpLY2Hjzj6S6za31tXw0PCd1oFZ4MiJ+fD/icGZ7veWV1flcsVhYqpWnKgvnp8orq0fOLeTmCnOFxWPTMzNHj79w/NjexfrXL6sHr3/82rPfnPjnvSeufvhTEifiYG1dYxx7ZSImaq/JUPoS3uXVva6sx5JeN4AHkh6aA5tHeRyKsRio5loY6WbLAIBOeTciNgCAPpM4/wNAn6l/DnBrfS1fT739RKK7brwSEfs3469f39xcM1i7Zre/eh109FZy15WRJCLG96D+iYj44ru3v0pTdOg6JEAzly5HxJnxie3jf7LtnoXdeq6NbSbuKRv/oHu+T+c/Lzab/2W25j/RZP4z3OTYfRD3P/4z1/agmpbS+d/LDfe23W6Iv2Z8oFZ6pDrnG0rOnisW0rHt0YiYjKHhtDy9Qx2TN/+92Wpd4/zvz0/e+TKtP328s0Xm2uDw3c+ZzVVyDxNzoxuXI54abBZ/stX/SYv576k263j9pQ8+b7UujT+Nt562x99ZG1cinmna/3fuaEt2vD9xqro7TNV3iia+/fWz0Vb1N/Z/mtL66+8FuiHt/9Gd4x9PGu/XLO++jp+vjP3Qat3942++/+9L3qrm99WWXcxVKkvTEfuSN7YvP3rnufVyffs0/smnmx//O+3/6XvCM23GP3j9968fPP7OSuOf3VX/7z5z9fb8QKv62+v/mWpusraknfGv3QY+zGsHAAAAAAAAAAAAAAAAAAAAAAAAAO3KRMTBSDLZrXwmk81u/ob34zGaKZbKlcNnS8uLs1H9rezxGMrUv+pyrOH7UKdr34dfLx+9p/x8RDwWEZ8Oj1TL2XypONvr4AEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACg5kCL3/9P/Tbc69YBAB2zv9cNAAC6zvkfAPrP7s7/Ix1rBwDQPd7/A0D/cf4HgP7j/A8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAECHnTp5Mk0bf6+v5dPy7IWV5fnShSOzhfJ8dmE5n82Xls5n50qluWIhmy8ttPxHlzYfiqXS+ZlYXL44VSmUK1PlldXTC6Xlxcrpcwu5ucLpwlDXIgMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACA9pVXVudzxWJhSUZGRmYr0zhKjPRugAIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD4n/svAAD//9EyKso=") open(&(0x7f0000000080)='./bus\x00', 0x6fe44da629969272, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write$binfmt_misc(r3, &(0x7f0000000180)={'syz0'}, 0x4) accept$unix(r3, &(0x7f0000000280)=@abs, &(0x7f00000000c0)=0x6e) sendfile(r3, r2, 0x0, 0x1ffff) copy_file_range(r0, &(0x7f0000000300)=0x9, r0, &(0x7f0000000340), 0xb3, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x9, 0x0) ptrace(0x11, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, 0x0, 0xe}, 0x0) 13:47:41 executing program 2: syz_mount_image$msdos(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000000c0)={[{@nodots}, {@nodots}, {@nodots}, {@nodots}, {@nodots}, {@nodots}, {@nodots}, {@fat=@dos1xfloppy}, {@nodots}, {@fat=@discard}, {@nodots}, {@dots}, {@nodots}, {@nodots}, {@dots}, {@fat=@nocase}, {@fat=@flush}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0x6}}, {@fat=@usefree}, {@dots}]}, 0x1, 0x183, &(0x7f00000005c0)="$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") perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xe000000, 0x0, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) [ 409.248210][ T8570] EXT4-fs (loop4): Block reservation details [ 409.254341][ T8570] EXT4-fs (loop4): i_reserved_data_blocks=1 [ 409.261835][ T8593] loop2: detected capacity change from 0 to 256 [ 409.290587][ T3133] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 409.297716][ T8595] loop2: detected capacity change from 0 to 256 [ 409.326166][ T3140] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 409.381189][ T8597] loop1: detected capacity change from 0 to 2048 [ 409.395902][ T8597] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 409.426043][ T8597] EXT4-fs error (device loop1): ext4_mb_generate_buddy:1098: group 0, block bitmap and bg descriptor inconsistent: 25 vs 150994969 free clusters [ 409.441142][ T8597] EXT4-fs (loop1): Delayed block allocation failed for inode 18 at logical offset 0 with max blocks 1 with error 28 [ 409.453576][ T8597] EXT4-fs (loop1): This should not happen!! Data will be lost [ 409.453576][ T8597] [ 409.463404][ T8597] EXT4-fs (loop1): Total free blocks count 0 [ 409.469452][ T8597] EXT4-fs (loop1): Free/Dirty block details [ 409.475458][ T8597] EXT4-fs (loop1): free_blocks=2415919104 [ 409.481336][ T8597] EXT4-fs (loop1): dirty_blocks=16 [ 409.486695][ T8597] EXT4-fs (loop1): Block reservation details [ 409.492821][ T8597] EXT4-fs (loop1): i_reserved_data_blocks=1 [ 409.515146][ T3133] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 13:47:45 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f00000001c0)={0x1, &(0x7f0000f07000)=[{0x6}]}, 0x10) 13:47:45 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c47, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace(0xffffffffffffffff, 0x0) getpid() tkill(0x0, 0x12) r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1f, 0x0, 0x0, 0x1, 0x0, 0x1007, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040)}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x2, 0x0, 0x0, 0x6, 0x0, 0x2}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) sched_setscheduler(r1, 0x3, 0x0) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x2000480, &(0x7f0000000000)=ANY=[], 0x1, 0x76a, &(0x7f0000000fc0)="$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") open(&(0x7f0000000080)='./bus\x00', 0x6fe44da629969272, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write$binfmt_misc(r3, &(0x7f0000000180)={'syz0'}, 0x4) accept$unix(r3, 0x0, 0x0) sendfile(r3, r2, 0x0, 0x1ffff) copy_file_range(r0, 0x0, 0xffffffffffffffff, &(0x7f0000000340), 0xb3, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x9, 0x0) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, 0x0, 0xe}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, 0x0, 0xe}, 0x0) 13:47:45 executing program 2: syz_mount_image$msdos(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000000c0)={[{@nodots}, {@nodots}, {@nodots}, {@nodots}, {@nodots}, {@nodots}, {@nodots}, {@fat=@dos1xfloppy}, {@nodots}, {@fat=@discard}, {@nodots}, {@dots}, {@nodots}, {@nodots}, {@dots}, {@fat=@nocase}, {@fat=@flush}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0x6}}, {@fat=@usefree}, {@dots}]}, 0x1, 0x183, &(0x7f00000005c0)="$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") perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xe000000, 0x0, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 13:47:45 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff}) ioctl$SIOCX25GSUBSCRIP(r0, 0x8940, &(0x7f0000000000)={'pim6reg0\x00'}) 13:47:45 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={0x1c, 0x1, 0x4, 0x101, 0x0, 0x0, {}, [@NFULA_CFG_CMD={0x5, 0x1, 0x1}]}, 0x1c}}, 0x0) close(r0) 13:47:45 executing program 5: syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2000000, &(0x7f0000000540)=ANY=[], 0x1, 0x1a9, &(0x7f0000000440)="$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") creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write(r1, &(0x7f0000000100)="beb12a01000100a2babe2cfe3f8cd6657ce2", 0x12) sendfile(r1, r0, 0x0, 0x1ffff) sendfile(r1, r0, 0x0, 0x1554) 13:47:45 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3d, &(0x7f0000009000), 0x4) 13:47:45 executing program 1: syz_mount_image$msdos(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000000c0)={[{@nodots}, {@nodots}, {@nodots}, {@nodots}, {@nodots}, {@nodots}, {@nodots}, {@fat=@dos1xfloppy}, {@nodots}, {@fat=@discard}, {@nodots}, {@dots}, {@nodots}, {@nodots}, {@dots}, {@fat=@nocase}, {@fat=@flush}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0x6}}, {@fat=@usefree}, {@dots}]}, 0x1, 0x183, &(0x7f00000005c0)="$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") openat$incfs(0xffffffffffffff9c, &(0x7f0000000380)='.pending_reads\x00', 0x0, 0x0) 13:47:45 executing program 3: bpf$MAP_CREATE(0x3, &(0x7f0000000180), 0x48) [ 413.086247][ T8608] loop2: detected capacity change from 0 to 256 [ 413.086650][ T8613] loop5: detected capacity change from 0 to 256 13:47:45 executing program 2: socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) 13:47:45 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x14, 0x0, 0x4}, 0x48) [ 413.176938][ T8611] loop4: detected capacity change from 0 to 2048 [ 413.189056][ T8621] loop1: detected capacity change from 0 to 256 13:47:45 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000ac0), 0xffffffffffffffff) sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r1, 0x501}, 0x14}}, 0x0) [ 413.222781][ T8611] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 413.293254][ T8611] EXT4-fs error (device loop4): ext4_mb_generate_buddy:1098: group 0, block bitmap and bg descriptor inconsistent: 25 vs 150994969 free clusters [ 413.308320][ T8611] EXT4-fs (loop4): Delayed block allocation failed for inode 18 at logical offset 0 with max blocks 1 with error 28 [ 413.320688][ T8611] EXT4-fs (loop4): This should not happen!! Data will be lost [ 413.320688][ T8611] [ 413.330435][ T8611] EXT4-fs (loop4): Total free blocks count 0 [ 413.336582][ T8611] EXT4-fs (loop4): Free/Dirty block details [ 413.342532][ T8611] EXT4-fs (loop4): free_blocks=2415919104 [ 413.348457][ T8611] EXT4-fs (loop4): dirty_blocks=16 [ 413.353675][ T8611] EXT4-fs (loop4): Block reservation details [ 413.359802][ T8611] EXT4-fs (loop4): i_reserved_data_blocks=1 [ 413.380393][ T3140] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. 13:47:49 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter, 0x62) 13:47:49 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c47, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() tkill(0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x2000480, &(0x7f0000000000)=ANY=[], 0x1, 0x76a, &(0x7f0000000fc0)="$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") open(&(0x7f0000000080)='./bus\x00', 0x6fe44da629969272, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write$binfmt_misc(r3, &(0x7f0000000180)={'syz0'}, 0x4) accept$unix(r3, &(0x7f0000000280)=@abs, &(0x7f00000000c0)=0x6e) sendfile(r3, r2, 0x0, 0x1ffff) copy_file_range(r0, &(0x7f0000000300)=0x9, 0xffffffffffffffff, &(0x7f0000000340), 0xb3, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x9, 0x0) socket$key(0xf, 0x3, 0x2) ptrace(0x11, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, 0x0, 0xe}, 0x0) 13:47:49 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1, 0x0, 0x0, 0x0, 0x200}, 0x48) 13:47:49 executing program 3: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff}) getsockopt$X25_QBITINCL(r0, 0x106, 0x1, 0x0, 0x0) 13:47:49 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c47, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace(0xffffffffffffffff, 0x0) getpid() tkill(0x0, 0x12) r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1f, 0x0, 0x0, 0x1, 0x0, 0x1007, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040)}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x2, 0x0, 0x0, 0x6, 0x0, 0x2}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) sched_setscheduler(r1, 0x3, 0x0) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x2000480, &(0x7f0000000000)=ANY=[], 0x1, 0x76a, &(0x7f0000000fc0)="$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") open(&(0x7f0000000080)='./bus\x00', 0x6fe44da629969272, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write$binfmt_misc(r3, &(0x7f0000000180)={'syz0'}, 0x4) accept$unix(r3, 0x0, 0x0) sendfile(r3, r2, 0x0, 0x1ffff) copy_file_range(r0, 0x0, 0xffffffffffffffff, &(0x7f0000000340), 0xb3, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x9, 0x0) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, 0x0, 0xe}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, 0x0, 0xe}, 0x0) 13:47:49 executing program 5: syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2000000, &(0x7f0000000540)=ANY=[], 0x1, 0x1a9, &(0x7f0000000440)="$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") creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) sendfile(r1, r0, 0x0, 0x1ffff) sendfile(r1, r0, 0x0, 0x1554) 13:47:49 executing program 2: r0 = semget$private(0x0, 0x4, 0x0) semop(r0, &(0x7f0000000000)=[{0x3, 0x1}, {0x0, 0x9, 0x1000}], 0x2) 13:47:49 executing program 3: syz_mount_image$msdos(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f00000002c0)={[{@nodots}, {@nodots}, {@nodots}, {@nodots}, {@nodots}, {@nodots}, {@nodots}, {@fat=@dos1xfloppy}, {@nodots}, {@fat=@errors_continue}, {@nodots}, {@dots}, {@fat=@check_strict}, {@nodots}, {@dots}, {@fat=@nocase}, {@fat=@flush}, {@dots}, {@fat=@dmask={'dmask', 0x3d, 0x6}}, {@fat=@usefree}, {@dots}]}, 0x1, 0x183, &(0x7f00000005c0)="$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") syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) [ 417.326634][ T8641] loop5: detected capacity change from 0 to 256 [ 417.335712][ T23] audit: type=1400 audit(1675777669.394:296): avc: denied { getopt } for pid=8638 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 13:47:49 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c47, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() tkill(0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1f, 0x9, 0x0, 0x1, 0x0, 0x1007, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040)}, 0x0, 0x0, 0x3, 0x9, 0x0, 0x2, 0x0, 0x0, 0x6, 0x0, 0x2}, 0x0, 0xfffffffffffffffd, r0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x2000480, &(0x7f0000000000)=ANY=[], 0x1, 0x76a, &(0x7f0000000fc0)="$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") open(&(0x7f0000000080)='./bus\x00', 0x6fe44da629969272, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write$binfmt_misc(r3, &(0x7f0000000180)={'syz0'}, 0x4) accept$unix(r3, 0x0, &(0x7f00000000c0)) sendfile(r3, r2, 0x0, 0x1ffff) copy_file_range(r0, &(0x7f0000000300), r0, &(0x7f0000000340), 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x9, 0x0) socket$key(0xf, 0x3, 0x2) ptrace(0x11, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, 0x0, 0xe}, 0x0) 13:47:49 executing program 3: socketpair(0x1, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$RDMA_NLDEV_CMD_SYS_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x10}, 0x10}}, 0x0) 13:47:49 executing program 5: syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2000000, &(0x7f0000000540)=ANY=[], 0x1, 0x1a9, &(0x7f0000000440)="$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") creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) sendfile(r1, r0, 0x0, 0x1ffff) sendfile(r1, r0, 0x0, 0x1554) [ 417.387306][ T8648] loop3: detected capacity change from 0 to 256 [ 417.389544][ T8642] loop1: detected capacity change from 0 to 2048 [ 417.422788][ T8645] loop4: detected capacity change from 0 to 2048 13:47:49 executing program 3: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff}) ioctl$SIOCX25GSUBSCRIP(r0, 0x8903, &(0x7f0000000000)={'pim6reg0\x00'}) [ 417.447129][ T8652] loop2: detected capacity change from 0 to 2048 [ 417.461807][ T8642] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 417.484962][ T8645] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 417.487094][ T8660] loop5: detected capacity change from 0 to 256 [ 417.528083][ T8652] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 417.557101][ T8642] EXT4-fs error (device loop1): ext4_mb_generate_buddy:1098: group 0, block bitmap and bg descriptor inconsistent: 25 vs 150994969 free clusters [ 417.559116][ T8645] EXT4-fs error (device loop4): ext4_mb_generate_buddy:1098: group 0, block bitmap and bg descriptor inconsistent: 25 vs 150994969 free clusters [ 417.579970][ T8652] EXT4-fs error (device loop2): ext4_mb_generate_buddy:1098: group 0, block bitmap and bg descriptor inconsistent: 25 vs 150994969 free clusters [ 417.588169][ T8645] EXT4-fs (loop4): Delayed block allocation failed for inode 18 at logical offset 0 with max blocks 1 with error 28 [ 417.603019][ T8652] EXT4-fs (loop2): Delayed block allocation failed for inode 18 at logical offset 0 with max blocks 1 with error 28 [ 417.613922][ T8645] EXT4-fs (loop4): This should not happen!! Data will be lost [ 417.613922][ T8645] [ 417.625995][ T8652] EXT4-fs (loop2): This should not happen!! Data will be lost [ 417.625995][ T8652] [ 417.626021][ T8652] EXT4-fs (loop2): Total free blocks count 0 [ 417.626072][ T8652] EXT4-fs (loop2): Free/Dirty block details [ 417.626092][ T8652] EXT4-fs (loop2): free_blocks=2415919104 [ 417.635758][ T8645] EXT4-fs (loop4): Total free blocks count 0 [ 417.645391][ T8652] EXT4-fs (loop2): dirty_blocks=16 [ 417.651371][ T8645] EXT4-fs (loop4): Free/Dirty block details [ 417.651403][ T8645] EXT4-fs (loop4): free_blocks=2415919104 [ 417.657273][ T8652] EXT4-fs (loop2): Block reservation details [ 417.663013][ T8645] EXT4-fs (loop4): dirty_blocks=16 [ 417.663039][ T8645] EXT4-fs (loop4): Block reservation details [ 417.663071][ T8645] EXT4-fs (loop4): i_reserved_data_blocks=1 [ 417.669030][ T8652] EXT4-fs (loop2): i_reserved_data_blocks=1 [ 417.693035][ T8642] EXT4-fs (loop1): Delayed block allocation failed for inode 18 at logical offset 0 with max blocks 1 with error 28 [ 417.727939][ T8642] EXT4-fs (loop1): This should not happen!! Data will be lost [ 417.727939][ T8642] [ 417.737663][ T8642] EXT4-fs (loop1): Total free blocks count 0 [ 417.743711][ T8642] EXT4-fs (loop1): Free/Dirty block details [ 417.749678][ T8642] EXT4-fs (loop1): free_blocks=2415919104 [ 417.755444][ T8642] EXT4-fs (loop1): dirty_blocks=16 [ 417.760565][ T8642] EXT4-fs (loop1): Block reservation details [ 417.766614][ T8642] EXT4-fs (loop1): i_reserved_data_blocks=1 [ 417.784677][ T3140] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 417.789754][ T3137] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 417.804687][ T3133] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 13:47:53 executing program 0: semop(0x0, &(0x7f0000000000)=[{}, {}, {}, {}, {}], 0x2aaaaaaaaaaaab14) 13:47:53 executing program 5: syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2000000, &(0x7f0000000540)=ANY=[], 0x1, 0x1a9, &(0x7f0000000440)="$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") creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) sendfile(r1, r0, 0x0, 0x1ffff) sendfile(r1, r0, 0x0, 0x1554) 13:47:53 executing program 3: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff}) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={0x0, 0x101d0}}, 0x0) 13:47:53 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=@allocspi={0xf8, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast1, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in=@remote, 0x0, 0xff}, @in=@multicast2}}}, 0xf8}}, 0x0) 13:47:53 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c47, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() tkill(0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x2000480, &(0x7f0000000000)=ANY=[], 0x1, 0x76a, &(0x7f0000000fc0)="$eJzs3d9rW1UcAPDvTdt17aatIOh8KghaGEvtrJuCDxMfRHAw0Ge3kGZlNm1Gk461FNwQwRdBxQdBX/bsj/nmqz9e9b/wQTamdsOJD1K5adJla9KlW5MI+XzgNOfce9Nzvjn3nnuSe0kC6FsT6Z9MxKGI+CiJGKstTyJiqJobjDixud3t9bV8mpLY2Hjzj6S6za31tXw0PCd1oFZ4MiJ+fD/icGZ7veWV1flcsVhYqpWnKgvnp8orq0fOLeTmCnOFxWPTMzNHj79w/NjexfrXL6sHr3/82rPfnPjnvSeufvhTEifiYG1dYxx7ZSImaq/JUPoS3uXVva6sx5JeN4AHkh6aA5tHeRyKsRio5loY6WbLAIBOeTciNgCAPpM4/wNAn6l/DnBrfS1fT739RKK7brwSEfs3469f39xcM1i7Zre/eh109FZy15WRJCLG96D+iYj44ru3v0pTdOg6JEAzly5HxJnxie3jf7LtnoXdeq6NbSbuKRv/oHu+T+c/Lzab/2W25j/RZP4z3OTYfRD3P/4z1/agmpbS+d/LDfe23W6Iv2Z8oFZ6pDrnG0rOnisW0rHt0YiYjKHhtDy9Qx2TN/+92Wpd4/zvz0/e+TKtP328s0Xm2uDw3c+ZzVVyDxNzoxuXI54abBZ/stX/SYv576k263j9pQ8+b7UujT+Nt562x99ZG1cinmna/3fuaEt2vD9xqro7TNV3iia+/fWz0Vb1N/Z/mtL66+8FuiHt/9Gd4x9PGu/XLO++jp+vjP3Qat3942++/+9L3qrm99WWXcxVKkvTEfuSN7YvP3rnufVyffs0/smnmx//O+3/6XvCM23GP3j9968fPP7OSuOf3VX/7z5z9fb8QKv62+v/mWpusraknfGv3QY+zGsHAAAAAAAAAAAAAAAAAAAAAAAAAO3KRMTBSDLZrXwmk81u/ob34zGaKZbKlcNnS8uLs1H9rezxGMrUv+pyrOH7UKdr34dfLx+9p/x8RDwWEZ8Oj1TL2XypONvr4AEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACg5kCL3/9P/Tbc69YBAB2zv9cNAAC6zvkfAPrP7s7/Ix1rBwDQPd7/A0D/cf4HgP7j/A8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAECHnTp5Mk0bf6+v5dPy7IWV5fnShSOzhfJ8dmE5n82Xls5n50qluWIhmy8ttPxHlzYfiqXS+ZlYXL44VSmUK1PlldXTC6Xlxcrpcwu5ucLpwlDXIgMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACA9pVXVudzxWJhSUZGRmYr0zhKjPRugAIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD4n/svAAD//9EyKso=") open(&(0x7f0000000080)='./bus\x00', 0x6fe44da629969272, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write$binfmt_misc(r3, &(0x7f0000000180)={'syz0'}, 0x4) accept$unix(r3, &(0x7f0000000280)=@abs, &(0x7f00000000c0)=0x6e) sendfile(r3, r2, 0x0, 0x1ffff) copy_file_range(r0, &(0x7f0000000300)=0x9, 0xffffffffffffffff, &(0x7f0000000340), 0xb3, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x9, 0x0) socket$key(0xf, 0x3, 0x2) ptrace(0x11, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, 0x0, 0xe}, 0x0) 13:47:53 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_ADD_NAN_FUNCTION(r0, &(0x7f0000004080)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x22000}, 0xc, &(0x7f0000004040)={&(0x7f00000000c0)={0xec4, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_NAN_FUNC={0x4}, @NL80211_ATTR_NAN_FUNC={0xc, 0xf0, 0x0, 0x1, [@NL80211_NAN_FUNC_TTL={0x8}]}, @NL80211_ATTR_NAN_FUNC={0x8, 0xf0, 0x0, 0x1, [@NL80211_NAN_FUNC_PUBLISH_BCAST={0x4}]}, @NL80211_ATTR_NAN_FUNC={0x2c, 0xf0, 0x0, 0x1, [@NL80211_NAN_FUNC_PUBLISH_TYPE={0x5}, @NL80211_NAN_FUNC_PUBLISH_TYPE={0x5}, @NL80211_NAN_FUNC_TTL={0x8}, @NL80211_NAN_FUNC_FOLLOW_UP_ID={0x5}, @NL80211_NAN_FUNC_PUBLISH_TYPE={0x5}]}, @NL80211_ATTR_NAN_FUNC={0xe64, 0xf0, 0x0, 0x1, [@NL80211_NAN_FUNC_FOLLOW_UP_REQ_ID={0x5}, @NL80211_NAN_FUNC_TX_MATCH_FILTER={0xb8, 0xe, 0x0, 0x1, [{0xb1, 0x0, "04887ddc3ed76c9618411ebe85c6a94c118074f382490cefdbb4337ef7f97349928c5018542e587de336569170e49bbcc365913281700cc0fed73b86307e1388e7392872a2cc59e2d529803a67f0961d94f8353fcc8d1790ead11042fbba6062df223b4dd733ed70047451f2010bb38b0a53e0c6d2d80e7674651693c7cc2e68feb4dbb1f4a30cfa0890422554c2d8ea823cbdaf90c1c87f52f2e0de8eabae2a32b3dc20b4cd64917c5738e5d3"}]}, @NL80211_NAN_FUNC_FOLLOW_UP_DEST={0xa}, @NL80211_NAN_FUNC_TX_MATCH_FILTER={0xd94, 0xe, 0x0, 0x1, [{0x79, 0x0, "a0afe2b55cdd7443ce04a8f4027e66d55d88304b6d225ef15c0583abb189fb0b2316b96088c3310ca4e37443832289dace091cb08ed4ff58eb12bee96bb717c425f4113fbd6f16f07db244cf3ce2f57b3d08d16f666a7a79ccf204f8b8b517f109c8f397baa06745c3d309bcb504182ad61d4f8ee5"}, {0xe1, 0x0, "71935c5d7669c689c0fc91501b9f411ca969c047f0ea5ff04afdba53cd36d4c5685aaa1dc473b70ffae3c6be00f8f1a4f8787125553878fd4fb7961344df10e88a6b544b1e3dbaa597c736cbe0b5777fa5f9c84acd25d02edb4752d6c1b024bf53ec45a92f43f5d376eee45c78534de03e635d27a7582c2d56c234d776f48e7a9c169f3ae361ddd9e1cbdf14af70f23c6dad4657955bf052fdb12dc0f7a686a6aa907888e0cacd651cc5b3cbb8b1fd9c22a98c1fc8d4ee51f8a158e555d6f20ebcda72364cfbaf20e9ecb0cc14181fc1d42496c422bf61c342a8f63006"}, {0x2d, 0x0, "d2eed71a48a15154225319cedf9f447fef5a34301c6aa93997e7720a9944dc1904c0066323f087b080"}, {0xbfd, 0x0, "4d24167c4476b3fc66a7615e1de76552cdafe36ce20df4d27a9692a4a36adeaa7969a38a1d03217b57ba414905e180acacef1d4eacc290dc08af6872388dccc0c2e5bc03d87669fc58684d50c1387e7d344f7b4c3958151570c4798d0906957d6d7f1120d913686f242329066bddca0f74a02262b98f0c78fd82afa9e1fe7e1168913bef1569e334aba5e7887f68b0d3c4da1e62895951b28cdeb59bb381ae3bd29ddca2a2b7e75982625b7a797cef158a6aad74831984ab7d7999223a848b131257097711a54f73bd4a1fc4d23c3ecb7c0c64d2a2161f1f1d3aff0a3fb7101f91a74b604a940e74b314af1e518b51ce7bfa7d4aea7cf36d6ba48c567eddc7ffa2df8e107fd37e5cafd82b1ef2be3b0a17114a0b8e83342313562514a3ed24484848edeb3d52745f4df36285a89c2393c26a736b7eb4bec2e29c7d1452c19684c5d7c53b9e3aa7121e37e19450a921281e384f828c9973fb4c74088e6d6ba23ec42439da3c8355cf683dfb4d5372603f9b31f3c82fd4f62f2e241c1bab63563c35c9d89a5f0846a38c4261c0926b6ad25c87cef694ac301a008c5a5f072561791d92ffef9065a0a3894d8fd95b066df4e501e0d27619a6cbb6fbb6a85ab8e04c3c31c3daa1d9dbb983f36e289dd79b2a4ef5b9e750f2702e876cbb110140ea852212685524a0c84de015e185b0ea4888a7717118c56759c23f6cc5adbb7335dded43cf6c9ce21e4b53c07b7f653bb73935efda3e3169c02e28c3f04be0c7e2d2cf3ad1abced02c2b5419ede8214418f6372062368c8fa796b366c24225ec1b12edf69b8fd628ee56a955a616582fda9b45cb3ae92b26eb27522a6bb564a4a96e4c35b494f94095d9a2aed22676d2be6feea7911be73156d066fbe19eb8311dd9a93ebc10cb514f4ee96f6e21fc2b10032c5318855defe54f52f4b59a4e5e2c2cb8188aa76cfda889834ddd1c9786a296c999df3847a67a106702db98dff084da74f622bae5de88caeee001228625c755ec5e937c69ae51d93b329d50271be904bc8ae5ce5034271cd46ff43b7ab213af5f4174f2ae7652552c95b194065f251a25841414d0acc1dc249ae63f2aaa88bf479bb85285218d9bc4ede3b604f04ec9903f66ebe480dc7d794888c3881e925fdf340c73c1eef04a6553232d9f3263aa9e8380adca9b035aaa638513cd76ba960d6b41850cc9955afb36ab25f3202f7d7bd3dcb9bdaa829b007e485e74a0afc180964042182e63a830c7c276139a1b06b7db93ce6e5b91a4c4c980893adbc5df441caa3bc58a1332ea6784c1e393b0d5daf18eb6bf05010486338806436f874a64089b1740e0f8f5fd8bdc4a8839c466bb03741bbc9d76e34d634f2f0b40301f0c67be528fdc0db6ef0bfbad86dd61fd1fc5f9f385b051de1b9df32fbb92ee458b8b80797b804f27a92fcefc60dc2c31415f3005574f19dba3bb6e0c9b74530b1c06568b2d777777d8db4341f70bf7c5f00b75592b61da108f3316818d9f1b9dbf4a26b7de54af64ea35598a0472a3b471478931138a3bd05f46d8d418e7ba0b1c109c4614245d42c76f1041870254a8dadcd8de682a15e91b76b51060ab59656d56120d227ed8ab5ff1c9292557727efc51410e134459b7c21eafe4bb2c9052271911205d15f2440a860ba57656edb3d6e0ab8063b4e0bc87917dddf0be2ff5a114dbb9ddab2d542ef2e9edaaedded37f199c9457d6ba9ba4d0b2521d46a8b20e4c1f5c4d136edcde2e010861281ad95dc9778aa3de2af6265d2cf8d896e08d50374a56e26bffa3d2d137418ee8bea65e1632ed772409d375864b66820273f5cb209878acd25f81dd7f544dfd1f4ec7013ec03c69b6416657dafdca66be60e3238487df077d3a15432c833e9d76a4d727a41876ec057183d3de70d43c182203f5e63938a866df676511dbde343e02e08f31246cf3d50082ddadae3beb10c29c43922e5efff5c6d9d6ff2cb901af75eaa4d341f68efffb52f3e7b45147b7b652b208c503fd038fbf0be64c4f161fd62fd6a8c7dcbb60709ca88f9ad91c30edfb1f1766b84af80edbf332b771fd203caac97dce98645f462dd376515d8e59af5e6abf5cb4c3bb7fea626646c5ec384d5f8ea21b8db8dfb732a65fb83ce326085ff507043d14b611155eab1e108b886cbb7fdeee0a5be46f86d65bd77bb0153223aef92d73cd701a075f52d0d49f46692ef83f3c551522b5ade42dae5f8d2d3e5b2fc0905018766d3171538783a7c8bc7fa81c770c8f585b56b3365b3ed08bbc3062a81e94f73c2d1ab2a2dbd0b06949636326eb9187c1428223d31d765288491ee6e6bc52e36b4dd85e21efa646e2d5b2a7b9ec5abfd905550cec80b9591c4d3434cb8b1f4a3d63e5874d72b9c4eb6c28993c3ad98d39d4ee06e3ba6437d12af23f72eedb0019a3370cb8d022dc70d9c7d7f7f6cee35fe12a51a943181c5685a900db8bf1163d0aa51e9d9f76b401d7abb0acce6ff91d734109124b02f17d8b74799fc278a2aa23c2b9b1042e92d1dade3fa18867f1f57398a7dc880fcfbb7e0ed05a98cbb588399d79bf4982688fe9b13d4b8e8549880bbed711a4ee1b47f9777b179b8a6883ff94dce6351088a7079c24a74a332e436d938e9e4b5f1a88550cb6f37359778ffc2e28eb78e9278e311a46959695b8010fa3a0fe085dd3235e1584fb9e9763e743200177211a95a14f4a5da722250825d1a5b35beb5565a6c6f9372e98f4d8faef49828f2a1d30fdf375d94d417825bcc136c4f821afd1e6ef620ed374e23f6da13900e1c2eea23ab2b92363dee2b1019c81e5bbf4bc329e0c1c5a0655f5c4a939b8297d6344c892412a7d42d119f0128ffe8dd3eee72e6b538ab475b0cc7388dd7e2755626221c8ac611d407c7ed91247cc52538b215e7fccf9f6a65ad26000d066cb5f4d852f0b66478b9ff3fc2bfbb50c14ca1dd7db18ed537199ff5140c9726e251ed7902769a7871996a4546920b6a6f3942219379007fda328e45fe94058cb3eadafd6e88743d5eaa5fdce3ee716d28aff6629ff59b2e01474096405d2086ef571d3a7a43c525754c150b4ba1894284eb0d7ae48d4fd7f0aeef73b9c755643f83adf931d21256f15ae3b284c3450a380ddcefaa8ed2d561ef7e139b452d674d8a0c8d2181b4a5288fa64fca482efc40d1d581576eb59989fdfb5c24dffdafaa2d4613a9f0851b4d6466015cecaff45a4aa37bc6115c675f508621c5653f8174bff8cb3d39a93ecc6ee4f3d054777e361e1ba9a334bbaebd30b1c7c987c495485237567913847a4f0ec753d31422a220f0f776adcb5b4662216900a3936a1d4a9b441d1d8b3c39e004009f86fb30a7c817020c90eb3de2127dc0f47fe8de26f57f8c2b5eb116f469e2c90d6545cd800a7c7bc7e91679514308270b25777849092d381cfb8e80bef2ba2f952ec1090e07f995feeef9db4ce6ff04bb937baac710e83c15f564f7021265521267e0a09e5e2439afa1b732ddc628908b3b74962788ef8c7f689da0774ebb48d993bc3f57772e0fe9cf67630cf4d2692c7e3e7a2f13b2e38eeb7c635b640c205bee81ea48d568d2ac6e0660188e26e3a390fbe1381d5cfc868ba558ba0c2378187d8178abd0f6caf5d9ac2fda2c03ad08eaaa68177c523d05cd4e505de4fb2edce7e34fe2f0f79dfa8069e54a1aa46e139e66afa54a0725440fc1ddf31a9f430811cc8342fa7989b6f3d2c3e7714b00c7d804c3131d2e3d24291ba14fb62a35be859465935c3e3192135b70a66edf8fef0d625c3a45ff54deb89f7ae21b3237f9cae0c83985ab0ab5de7a63b7c892bf43a1b5f7fb5fe562a86579725ce641344b5daee60a005319df8f05d4c144a0bb40b66d7d54892911a83815f4818825f57469ace1bec78f421c64f3cbb1be9f518926c4331eae84688a2d849ce85909eda4ce0780ff0a212dd80c2b44540a438fda2333e629dc7352147e706d517371e96876d6061935fa4ca7155e8aba998a37035daaf8b635dd83ec779e414859c243675119a6a8f941d3947482d7ea5be05753bce582ea00371b37fb057522ae80b5cb003e5b09effd82fb556c393d43a0c1086d515e07f2f334b6e0ad119046563ed11c5f72f93138c7d068d4ca6e8077e20f365a39ade58394aab597c5cfb52623630320047d3b3d6602aa13e5ed137442eb8d24fe12d4c9c818411aa443bbc922363ee26db00261f1f383936b84caa745b4342bd5db898c8e6880960a4eb40dae108683fd77d0f4e0facea1673799bf211aebd1e5eaec0fac4d9ae5a2ce6bee34704a3fc24b084483478408d173d75dc5812078de91e74"}]}]}]}, 0xec4}}, 0x0) 13:47:53 executing program 3: r0 = semget$private(0x0, 0x4, 0x0) semop(r0, &(0x7f0000000000)=[{0x3, 0x1}, {0x0, 0x0, 0x1000}], 0x2) 13:47:53 executing program 2: socketpair(0x1, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff}) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={0x0}}, 0x0) 13:47:53 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) poll(&(0x7f0000000080)=[{r0, 0x18202}], 0x1, 0x0) 13:47:53 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.current\x00', 0x0, 0x0) shutdown(r0, 0x2) socket$packet(0x11, 0x0, 0x300) pipe2$watch_queue(0x0, 0x80) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000040), 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000280)=@req3={0x0, 0x6, 0x0, 0x6}, 0x1c) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, 0x0, 0x80) 13:47:53 executing program 2: r0 = semget$private(0x0, 0x4, 0x0) semop(r0, &(0x7f0000000000)=[{}, {0x0, 0x2}], 0x1f4) 13:47:53 executing program 5: syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2000000, &(0x7f0000000540)=ANY=[], 0x1, 0x1a9, &(0x7f0000000440)="$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") creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000100)="beb12a01000100a2babe2cfe3f8cd6657ce2", 0x12) sendfile(0xffffffffffffffff, r0, 0x0, 0x1ffff) sendfile(0xffffffffffffffff, r0, 0x0, 0x1554) [ 421.483823][ T8681] loop5: detected capacity change from 0 to 256 [ 421.541967][ T8679] loop1: detected capacity change from 0 to 2048 [ 421.570411][ T8695] loop5: detected capacity change from 0 to 256 [ 421.601881][ T8679] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 421.625364][ T8679] EXT4-fs error (device loop1): ext4_mb_generate_buddy:1098: group 0, block bitmap and bg descriptor inconsistent: 25 vs 150994969 free clusters [ 421.640492][ T8679] EXT4-fs (loop1): Delayed block allocation failed for inode 18 at logical offset 0 with max blocks 1 with error 28 [ 421.652847][ T8679] EXT4-fs (loop1): This should not happen!! Data will be lost [ 421.652847][ T8679] [ 421.662577][ T8679] EXT4-fs (loop1): Total free blocks count 0 [ 421.668686][ T8679] EXT4-fs (loop1): Free/Dirty block details [ 421.674719][ T8679] EXT4-fs (loop1): free_blocks=2415919104 [ 421.680460][ T8679] EXT4-fs (loop1): dirty_blocks=16 [ 421.685629][ T8679] EXT4-fs (loop1): Block reservation details [ 421.691718][ T8679] EXT4-fs (loop1): i_reserved_data_blocks=1 [ 421.707304][ T3133] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 13:47:57 executing program 0: r0 = semget$private(0x0, 0x4, 0x0) semop(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x1000}], 0x1) r1 = semget$private(0x0, 0x4, 0x0) semtimedop(r1, &(0x7f0000000480)=[{0x0, 0x0, 0x1000}], 0x1, 0x0) 13:47:57 executing program 3: r0 = semget$private(0x0, 0x4, 0x0) semop(r0, &(0x7f0000000000)=[{0x0, 0xfffe}, {}], 0x2) 13:47:57 executing program 4: socketpair(0x1, 0x2, 0x0, &(0x7f0000000680)) 13:47:57 executing program 5: syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2000000, &(0x7f0000000540)=ANY=[], 0x1, 0x1a9, &(0x7f0000000440)="$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") creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000100)="beb12a01000100a2babe2cfe3f8cd6657ce2", 0x12) sendfile(0xffffffffffffffff, r0, 0x0, 0x1ffff) sendfile(0xffffffffffffffff, r0, 0x0, 0x1554) 13:47:57 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c47, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() tkill(0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x2000480, &(0x7f0000000000)=ANY=[], 0x1, 0x76a, &(0x7f0000000fc0)="$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") open(&(0x7f0000000080)='./bus\x00', 0x6fe44da629969272, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write$binfmt_misc(r3, &(0x7f0000000180)={'syz0'}, 0x4) accept$unix(r3, &(0x7f0000000280)=@abs, &(0x7f00000000c0)=0x6e) sendfile(r3, r2, 0x0, 0x1ffff) copy_file_range(r0, &(0x7f0000000300)=0x9, 0xffffffffffffffff, &(0x7f0000000340), 0xb3, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x9, 0x0) socket$key(0xf, 0x3, 0x2) ptrace(0x11, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, 0x0, 0xe}, 0x0) 13:47:57 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)=ANY=[@ANYBLOB="68010000040a0102"], 0x168}}, 0x0) 13:47:57 executing program 4: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff}) ioctl$SIOCX25GSUBSCRIP(r0, 0x5452, &(0x7f0000000000)={'pim6reg0\x00'}) 13:47:57 executing program 5: syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2000000, &(0x7f0000000540)=ANY=[], 0x1, 0x1a9, &(0x7f0000000440)="$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") creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000100)="beb12a01000100a2babe2cfe3f8cd6657ce2", 0x12) sendfile(0xffffffffffffffff, r0, 0x0, 0x1ffff) sendfile(0xffffffffffffffff, r0, 0x0, 0x1554) 13:47:57 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=@allocspi={0xf8, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast1, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in=@remote}, @in=@multicast2}}}, 0xf8}}, 0x0) 13:47:57 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmsg$inet(0xffffffffffffffff, 0x0, 0xc000) socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0}, 0x10) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f00000006c0)=ANY=[@ANYBLOB="2c771ac628f7bb670b72e7b03600000706000003050001"], 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x24000001) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.current\x00', 0x0, 0x0) shutdown(r0, 0x2) r1 = socket$packet(0x11, 0x3, 0x300) pipe2$watch_queue(&(0x7f0000000100), 0x80) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000040), 0x4) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f0000000280)=@req3={0x8000, 0x0, 0x8000, 0x6}, 0x1c) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x58002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={0x0, 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x80) [ 425.650435][ T8712] loop5: detected capacity change from 0 to 256 [ 425.657102][ T8711] netlink: 340 bytes leftover after parsing attributes in process `syz-executor.2'. 13:47:57 executing program 2: socketpair(0x10, 0x3, 0x7, &(0x7f0000000040)) 13:47:57 executing program 5: syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2000000, &(0x7f0000000540)=ANY=[], 0x1, 0x1a9, &(0x7f0000000440)="$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") creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write(r0, &(0x7f0000000100)="beb12a01000100a2babe2cfe3f8cd6657ce2", 0x12) sendfile(r0, 0xffffffffffffffff, 0x0, 0x1ffff) sendfile(r0, 0xffffffffffffffff, 0x0, 0x1554) [ 425.705424][ T8713] loop1: detected capacity change from 0 to 2048 [ 425.724503][ T8721] loop5: detected capacity change from 0 to 256 [ 425.757860][ T8713] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 425.768048][ T8729] loop5: detected capacity change from 0 to 256 [ 425.810466][ T8713] EXT4-fs error (device loop1): ext4_mb_generate_buddy:1098: group 0, block bitmap and bg descriptor inconsistent: 25 vs 150994969 free clusters [ 425.825537][ T8713] EXT4-fs (loop1): Delayed block allocation failed for inode 18 at logical offset 0 with max blocks 1 with error 28 [ 425.837846][ T8713] EXT4-fs (loop1): This should not happen!! Data will be lost [ 425.837846][ T8713] [ 425.847508][ T8713] EXT4-fs (loop1): Total free blocks count 0 [ 425.853601][ T8713] EXT4-fs (loop1): Free/Dirty block details [ 425.859541][ T8713] EXT4-fs (loop1): free_blocks=2415919104 [ 425.865347][ T8713] EXT4-fs (loop1): dirty_blocks=16 [ 425.870472][ T8713] EXT4-fs (loop1): Block reservation details [ 425.876580][ T8713] EXT4-fs (loop1): i_reserved_data_blocks=1 [ 425.891437][ T3133] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 13:48:01 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_ADD_NAN_FUNCTION(r0, &(0x7f0000004080)={&(0x7f0000000040)={0x10, 0x0, 0x2, 0x22000}, 0xc, &(0x7f0000004040)={0x0}}, 0x0) 13:48:01 executing program 2: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={0x0}}, 0x0) 13:48:01 executing program 4: socketpair(0x1, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff}) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={0x0, 0x101d0}}, 0x0) 13:48:01 executing program 5: syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2000000, &(0x7f0000000540)=ANY=[], 0x1, 0x1a9, &(0x7f0000000440)="$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") creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write(r0, &(0x7f0000000100)="beb12a01000100a2babe2cfe3f8cd6657ce2", 0x12) sendfile(r0, 0xffffffffffffffff, 0x0, 0x1ffff) sendfile(r0, 0xffffffffffffffff, 0x0, 0x1554) 13:48:01 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c47, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() tkill(0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x2000480, &(0x7f0000000000)=ANY=[], 0x1, 0x76a, &(0x7f0000000fc0)="$eJzs3d9rW1UcAPDvTdt17aatIOh8KghaGEvtrJuCDxMfRHAw0Ge3kGZlNm1Gk461FNwQwRdBxQdBX/bsj/nmqz9e9b/wQTamdsOJD1K5adJla9KlW5MI+XzgNOfce9Nzvjn3nnuSe0kC6FsT6Z9MxKGI+CiJGKstTyJiqJobjDixud3t9bV8mpLY2Hjzj6S6za31tXw0PCd1oFZ4MiJ+fD/icGZ7veWV1flcsVhYqpWnKgvnp8orq0fOLeTmCnOFxWPTMzNHj79w/NjexfrXL6sHr3/82rPfnPjnvSeufvhTEifiYG1dYxx7ZSImaq/JUPoS3uXVva6sx5JeN4AHkh6aA5tHeRyKsRio5loY6WbLAIBOeTciNgCAPpM4/wNAn6l/DnBrfS1fT739RKK7brwSEfs3469f39xcM1i7Zre/eh109FZy15WRJCLG96D+iYj44ru3v0pTdOg6JEAzly5HxJnxie3jf7LtnoXdeq6NbSbuKRv/oHu+T+c/Lzab/2W25j/RZP4z3OTYfRD3P/4z1/agmpbS+d/LDfe23W6Iv2Z8oFZ6pDrnG0rOnisW0rHt0YiYjKHhtDy9Qx2TN/+92Wpd4/zvz0/e+TKtP328s0Xm2uDw3c+ZzVVyDxNzoxuXI54abBZ/stX/SYv576k263j9pQ8+b7UujT+Nt562x99ZG1cinmna/3fuaEt2vD9xqro7TNV3iia+/fWz0Vb1N/Z/mtL66+8FuiHt/9Gd4x9PGu/XLO++jp+vjP3Qat3942++/+9L3qrm99WWXcxVKkvTEfuSN7YvP3rnufVyffs0/smnmx//O+3/6XvCM23GP3j9968fPP7OSuOf3VX/7z5z9fb8QKv62+v/mWpusraknfGv3QY+zGsHAAAAAAAAAAAAAAAAAAAAAAAAAO3KRMTBSDLZrXwmk81u/ob34zGaKZbKlcNnS8uLs1H9rezxGMrUv+pyrOH7UKdr34dfLx+9p/x8RDwWEZ8Oj1TL2XypONvr4AEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACg5kCL3/9P/Tbc69YBAB2zv9cNAAC6zvkfAPrP7s7/Ix1rBwDQPd7/A0D/cf4HgP7j/A8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAECHnTp5Mk0bf6+v5dPy7IWV5fnShSOzhfJ8dmE5n82Xls5n50qluWIhmy8ttPxHlzYfiqXS+ZlYXL44VSmUK1PlldXTC6Xlxcrpcwu5ucLpwlDXIgMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACA9pVXVudzxWJhSUZGRmYr0zhKjPRugAIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD4n/svAAD//9EyKso=") open(&(0x7f0000000080)='./bus\x00', 0x6fe44da629969272, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write$binfmt_misc(r3, &(0x7f0000000180)={'syz0'}, 0x4) accept$unix(r3, &(0x7f0000000280)=@abs, &(0x7f00000000c0)=0x6e) sendfile(r3, r2, 0x0, 0x1ffff) copy_file_range(r0, &(0x7f0000000300)=0x9, 0xffffffffffffffff, &(0x7f0000000340), 0xb3, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x9, 0x0) socket$key(0xf, 0x3, 0x2) ptrace(0x11, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, 0x0, 0xe}, 0x0) 13:48:01 executing program 3: syz_mount_image$msdos(&(0x7f00000001c0), &(0x7f0000000080)='./file0\x00', 0x200040, &(0x7f0000000200)={[{@nodots}, {@nodots}, {@nodots}, {@nodots}, {@nodots}, {@nodots}, {@fat=@check_strict}, {@fat=@dos1xfloppy}, {@nodots}, {@fat=@discard}, {@nodots}, {@dots}, {@nodots}, {@nodots}, {@dots}, {@fat=@nocase}, {@fat=@flush}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0x6}}, {@fat=@usefree}, {@dots}]}, 0x1, 0x183, &(0x7f00000005c0)="$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") openat$incfs(0xffffffffffffff9c, &(0x7f0000000380)='.pending_reads\x00', 0x0, 0x0) 13:48:01 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000001400000008000300", @ANYBLOB='\b'], 0x38}}, 0x0) 13:48:01 executing program 2: socketpair(0x1, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$packet(r0, 0x0, &(0x7f00000000c0)) [ 429.809491][ T8743] loop3: detected capacity change from 0 to 256 [ 429.812695][ T8740] loop5: detected capacity change from 0 to 256 13:48:01 executing program 5: syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2000000, &(0x7f0000000540)=ANY=[], 0x1, 0x1a9, &(0x7f0000000440)="$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") creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write(r0, &(0x7f0000000100)="beb12a01000100a2babe2cfe3f8cd6657ce2", 0x12) sendfile(r0, 0xffffffffffffffff, 0x0, 0x1ffff) sendfile(r0, 0xffffffffffffffff, 0x0, 0x1554) 13:48:01 executing program 3: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x2000480, &(0x7f0000000000)=ANY=[], 0x1, 0x76a, &(0x7f0000000fc0)="$eJzs3d9rW1UcAPDvTdt17aatIOh8KghaGEvtrJuCDxMfRHAw0Ge3kGZlNm1Gk461FNwQwRdBxQdBX/bsj/nmqz9e9b/wQTamdsOJD1K5adJla9KlW5MI+XzgNOfce9Nzvjn3nnuSe0kC6FsT6Z9MxKGI+CiJGKstTyJiqJobjDixud3t9bV8mpLY2Hjzj6S6za31tXw0PCd1oFZ4MiJ+fD/icGZ7veWV1flcsVhYqpWnKgvnp8orq0fOLeTmCnOFxWPTMzNHj79w/NjexfrXL6sHr3/82rPfnPjnvSeufvhTEifiYG1dYxx7ZSImaq/JUPoS3uXVva6sx5JeN4AHkh6aA5tHeRyKsRio5loY6WbLAIBOeTciNgCAPpM4/wNAn6l/DnBrfS1fT739RKK7brwSEfs3469f39xcM1i7Zre/eh109FZy15WRJCLG96D+iYj44ru3v0pTdOg6JEAzly5HxJnxie3jf7LtnoXdeq6NbSbuKRv/oHu+T+c/Lzab/2W25j/RZP4z3OTYfRD3P/4z1/agmpbS+d/LDfe23W6Iv2Z8oFZ6pDrnG0rOnisW0rHt0YiYjKHhtDy9Qx2TN/+92Wpd4/zvz0/e+TKtP328s0Xm2uDw3c+ZzVVyDxNzoxuXI54abBZ/stX/SYv576k263j9pQ8+b7UujT+Nt562x99ZG1cinmna/3fuaEt2vD9xqro7TNV3iia+/fWz0Vb1N/Z/mtL66+8FuiHt/9Gd4x9PGu/XLO++jp+vjP3Qat3942++/+9L3qrm99WWXcxVKkvTEfuSN7YvP3rnufVyffs0/smnmx//O+3/6XvCM23GP3j9968fPP7OSuOf3VX/7z5z9fb8QKv62+v/mWpusraknfGv3QY+zGsHAAAAAAAAAAAAAAAAAAAAAAAAAO3KRMTBSDLZrXwmk81u/ob34zGaKZbKlcNnS8uLs1H9rezxGMrUv+pyrOH7UKdr34dfLx+9p/x8RDwWEZ8Oj1TL2XypONvr4AEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACg5kCL3/9P/Tbc69YBAB2zv9cNAAC6zvkfAPrP7s7/Ix1rBwDQPd7/A0D/cf4HgP7j/A8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAECHnTp5Mk0bf6+v5dPy7IWV5fnShSOzhfJ8dmE5n82Xls5n50qluWIhmy8ttPxHlzYfiqXS+ZlYXL44VSmUK1PlldXTC6Xlxcrpcwu5ucLpwlDXIgMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACA9pVXVudzxWJhSUZGRmYr0zhKjPRugAIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD4n/svAAD//9EyKso=") open(&(0x7f0000000080)='./bus\x00', 0x6fe44da629969272, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write$binfmt_misc(r1, &(0x7f0000000180)={'syz0'}, 0x4) sendfile(r1, r0, 0x0, 0x1ffff) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) 13:48:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x1, &(0x7f0000001180)=[{0x0, 0x0, 0x0, 0x24d}], 0x0) 13:48:01 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000080), 0x0, 0x4200) [ 429.853597][ T8745] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 429.862689][ T8739] loop1: detected capacity change from 0 to 2048 [ 429.911837][ T23] audit: type=1400 audit(1675777681.964:297): avc: denied { write } for pid=8755 comm="syz-executor.4" name="usbmon0" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 429.936454][ T8753] loop3: detected capacity change from 0 to 2048 [ 429.938315][ T8758] loop5: detected capacity change from 0 to 256 [ 429.950359][ T8739] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 429.976705][ T8753] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none. [ 429.989784][ T8739] EXT4-fs error (device loop1): ext4_mb_generate_buddy:1098: group 0, block bitmap and bg descriptor inconsistent: 25 vs 150994969 free clusters [ 430.005797][ T8739] EXT4-fs (loop1): Delayed block allocation failed for inode 18 at logical offset 0 with max blocks 1 with error 28 [ 430.009727][ T8753] EXT4-fs error (device loop3): ext4_mb_generate_buddy:1098: group 0, block bitmap and bg descriptor inconsistent: 25 vs 150994969 free clusters [ 430.018077][ T8739] EXT4-fs (loop1): This should not happen!! Data will be lost [ 430.018077][ T8739] [ 430.033574][ T8753] EXT4-fs (loop3): Delayed block allocation failed for inode 18 at logical offset 0 with max blocks 1 with error 28 [ 430.042440][ T8739] EXT4-fs (loop1): Total free blocks count 0 [ 430.054639][ T8753] EXT4-fs (loop3): This should not happen!! Data will be lost [ 430.054639][ T8753] [ 430.054651][ T8753] EXT4-fs (loop3): Total free blocks count 0 [ 430.054662][ T8753] EXT4-fs (loop3): Free/Dirty block details [ 430.054672][ T8753] EXT4-fs (loop3): free_blocks=2415919104 [ 430.054684][ T8753] EXT4-fs (loop3): dirty_blocks=16 [ 430.060646][ T8739] EXT4-fs (loop1): Free/Dirty block details [ 430.060666][ T8739] EXT4-fs (loop1): free_blocks=2415919104 [ 430.060686][ T8739] EXT4-fs (loop1): dirty_blocks=16 [ 430.070317][ T8753] EXT4-fs (loop3): Block reservation details [ 430.070328][ T8753] EXT4-fs (loop3): i_reserved_data_blocks=1 [ 430.122006][ T8739] EXT4-fs (loop1): Block reservation details [ 430.128038][ T8739] EXT4-fs (loop1): i_reserved_data_blocks=1 [ 430.135185][ T3139] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 430.163237][ T3133] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 13:48:08 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000540), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CCA_ED_LEVEL(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x28}}, 0x0) 13:48:08 executing program 2: socketpair(0x0, 0x0, 0x0, &(0x7f00000002c0)) socketpair(0x0, 0xa, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$nl80211(&(0x7f00000008c0), r0) 13:48:08 executing program 4: bpf$MAP_CREATE(0x14, &(0x7f0000000180), 0x48) 13:48:08 executing program 5: syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2000000, &(0x7f0000000540)=ANY=[], 0x1, 0x1a9, &(0x7f0000000440)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write(r1, &(0x7f0000000100)="beb12a01000100a2babe2cfe3f8cd6657ce2", 0x12) sendfile(r1, r0, 0x0, 0x1ffff) sendfile(r1, r0, 0x0, 0x1554) 13:48:08 executing program 3: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000680)) 13:48:08 executing program 1: socketpair(0x2c, 0x3, 0x4, &(0x7f0000000100)) 13:48:08 executing program 1: bpf$MAP_CREATE(0x12, &(0x7f0000000180), 0x48) 13:48:08 executing program 4: semget$private(0x0, 0x58ff02dd7eb57e7f, 0x0) 13:48:08 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x6, 0x201}, 0x14}}, 0x0) 13:48:08 executing program 5: syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2000000, &(0x7f0000000540)=ANY=[], 0x1, 0x1a9, &(0x7f0000000440)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write(r1, &(0x7f0000000100)="beb12a01000100a2babe2cfe3f8cd6657ce2", 0x12) sendfile(r1, r0, 0x0, 0x1ffff) sendfile(r1, r0, 0x0, 0x1554) 13:48:08 executing program 3: socketpair(0x25, 0x5, 0x7, &(0x7f0000000340)) [ 436.047418][ T8773] loop5: detected capacity change from 0 to 256 13:48:08 executing program 4: socketpair(0x28, 0x2, 0x0, &(0x7f0000000680)) [ 436.126790][ T8786] loop5: detected capacity change from 0 to 256 [ 436.145371][ T23] audit: type=1400 audit(1675777688.204:298): avc: denied { create } for pid=8788 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 13:48:14 executing program 0: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket(0x1e, 0x1, 0x0) fcntl$getflags(r0, 0x401) 13:48:14 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r0, &(0x7f0000000000)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x1}}, 0xfffffe10) 13:48:14 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000001c0)={'syztnl0\x00', &(0x7f0000000100)={'ip6tnl0\x00', 0x0, 0x0, 0x49, 0x7, 0x0, 0x0, @private1, @mcast1, 0x7, 0x40, 0x3f, 0x8000}}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x0, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}, [@generic={0xd2, 0x0, 0xe}, @ldst={0x0, 0x0, 0x0, 0xa, 0xb, 0x6, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000000440)=""/4096, 0x41100, 0x2, '\x00', r1, 0x0, r0, 0x8, &(0x7f0000000200)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x1, 0x2, 0xf86c, 0x1000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0xffffffffffffffff]}, 0x80) write$P9_RREADLINK(r0, &(0x7f0000000400)=ANY=[], 0x88) sendfile(r0, r0, &(0x7f0000000240), 0x7ffc) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f00000020c0)='.\x00', 0x42000502) 13:48:14 executing program 5: syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2000000, &(0x7f0000000540)=ANY=[], 0x1, 0x1a9, &(0x7f0000000440)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write(r1, &(0x7f0000000100)="beb12a01000100a2babe2cfe3f8cd6657ce2", 0x12) sendfile(r1, r0, 0x0, 0x1ffff) sendfile(r1, r0, 0x0, 0x1554) 13:48:14 executing program 4: dup(0xffffffffffffffff) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3) recvmmsg(0xffffffffffffffff, &(0x7f0000007c40)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000001300)=""/222, 0xde}, {&(0x7f0000000740)=""/27, 0x1b}, {0x0}, {&(0x7f0000000840)=""/208, 0xd0}, {&(0x7f0000000940)=""/141, 0x8d}], 0x5}, 0x1}, {{0x0, 0x0, &(0x7f0000000dc0)=[{&(0x7f0000004740)=""/254, 0xfe}, {&(0x7f0000000cc0)=""/87, 0x57}, {&(0x7f0000000d80)=""/26, 0x1a}], 0x3, &(0x7f0000000e00)=""/212, 0xd4}, 0x7f}, {{0x0, 0x0, &(0x7f0000001240)=[{&(0x7f0000000fc0)=""/232, 0xe8}, {&(0x7f0000003e00)=""/162, 0xa2}, {&(0x7f0000001180)=""/148, 0x94}], 0x3}, 0x6}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000003cc0)=""/132, 0x84}}, {{&(0x7f0000003d80)=@ieee802154={0x24, @short}, 0x80, 0x0, 0x0, &(0x7f0000006180)=""/162, 0xa2}, 0x2}, {{&(0x7f0000006240)=@sco={0x1f, @fixed}, 0x80, &(0x7f00000046c0)=[{&(0x7f00000062c0)=""/168, 0xa8}, {0x0}, {&(0x7f0000001100)=""/105, 0x69}], 0x3, &(0x7f00000063c0)=""/199, 0xc7}}, {{0x0, 0x0, &(0x7f0000006b80)=[{&(0x7f0000006540)=""/31, 0x1f}, {0x0}, {&(0x7f00000066c0)=""/197, 0xc5}, {&(0x7f00000067c0)=""/104, 0x68}, {0x0}, {&(0x7f0000006880)=""/159, 0x9f}, {&(0x7f00000069c0)=""/248, 0xf8}], 0x7, &(0x7f0000006c40)=""/4096, 0x1000}}], 0x7, 0x0, &(0x7f0000000d40)) io_destroy(0x0) ppoll(&(0x7f00000000c0)=[{r1, 0x8124, 0x3a1}, {0xffffffffffffffff, 0x0, 0x64}], 0x2, &(0x7f00000002c0)={0x0, r2+10000000}, 0x0, 0x2000000) 13:48:14 executing program 3: sched_setattr(0x0, &(0x7f0000000180)={0x38, 0x5}, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) fcntl$dupfd(r0, 0x406, r0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000001c0)={'syztnl0\x00', &(0x7f0000000100)={'ip6tnl0\x00', 0x0, 0x29, 0x49, 0x7, 0xfffffffd, 0x20, @private1, @mcast1, 0x7, 0x40, 0x3f, 0x8000}}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x0, 0x6, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}, [@generic={0xd2, 0x0, 0xe, 0x4, 0x7}, @map_fd={0x18, 0xa}]}, &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000440)=""/4096, 0x41100, 0x2, '\x00', r1, 0x0, r0, 0x8, &(0x7f0000000200)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x1, 0x2, 0xf86c, 0x1000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0xffffffffffffffff]}, 0x80) write$P9_RREADLINK(r0, &(0x7f0000000400)=ANY=[], 0x88) sendfile(r0, r0, &(0x7f0000000240), 0x7ffc) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f00000020c0)='.\x00', 0x42000502) 13:48:14 executing program 2: socketpair(0x23, 0x2, 0x0, &(0x7f0000000280)) 13:48:14 executing program 5: creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write(r1, &(0x7f0000000100)="beb12a01000100a2babe2cfe3f8cd6657ce2", 0x12) sendfile(r1, r0, 0x0, 0x1ffff) sendfile(r1, r0, 0x0, 0x1554) 13:48:14 executing program 2: bpf$MAP_CREATE(0xd, &(0x7f0000000180), 0x48) 13:48:14 executing program 2: sched_setattr(0x0, &(0x7f0000000180)={0x38, 0x5}, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) fcntl$dupfd(r0, 0x406, r0) write$P9_RREADLINK(r0, &(0x7f0000000400)=ANY=[], 0x88) sendfile(r0, r0, &(0x7f0000000240), 0x7ffc) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f00000020c0)='.\x00', 0x42000502) [ 442.284293][ T8804] loop5: detected capacity change from 0 to 256 13:48:15 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001780)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, &(0x7f0000000000)="93", 0x20000001, 0x0, 0x0, 0x0) recvmsg$unix(r0, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000240)=""/4096, 0x7ffff000}, {&(0x7f0000001240)=""/192, 0xc0}, {&(0x7f0000001300)=""/249, 0xf9}], 0x3}, 0x7c8701a0) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x2) connect$unix(0xffffffffffffffff, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) recvmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000001a00)={0x0, 0x989680}) 13:48:15 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x3a) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='net/icmp6\x00') preadv(r1, &(0x7f0000000140)=[{&(0x7f0000001640)=""/148, 0x94}], 0x1, 0x0, 0x0) [ 443.160140][ T23] audit: type=1400 audit(1675777695.214:299): avc: denied { write } for pid=8824 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 13:48:18 executing program 3: sched_setattr(0x0, &(0x7f0000000180)={0x38, 0x5}, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x0, 0x4, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}, [@generic={0xd2, 0x9, 0xe, 0x0, 0x7}]}, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000000440)=""/4096, 0x41100, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0xffffffffffffffff]}, 0x80) write$P9_RREADLINK(r0, &(0x7f0000000400)=ANY=[], 0x88) sendfile(r0, r0, &(0x7f0000000240), 0x7ffc) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f00000020c0)='.\x00', 0x42000502) 13:48:18 executing program 0: dup(0xffffffffffffffff) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r0, &(0x7f00000001c0)=[{0x0}], 0x1) sched_setscheduler(0x0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000001a40), &(0x7f0000007f00), 0x2, 0x3) recvmmsg(0xffffffffffffffff, &(0x7f0000007c40)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000001300)=""/222, 0xde}, {&(0x7f0000000740)=""/27, 0x1b}, {0x0}, {&(0x7f0000000840)=""/208, 0xd0}, {&(0x7f0000000940)=""/141, 0x8d}], 0x5}, 0x1}, {{0x0, 0x0, &(0x7f0000000dc0)=[{&(0x7f0000004740)=""/254, 0xfe}, {&(0x7f0000000cc0)=""/87, 0x57}, {&(0x7f0000000d80)=""/26, 0x1a}], 0x3, &(0x7f0000000e00)=""/212, 0xd4}, 0x7f}, {{0x0, 0x0, &(0x7f0000001240)=[{&(0x7f0000000fc0)=""/232, 0xe8}, {&(0x7f0000003e00)=""/162, 0xa2}, {&(0x7f0000001180)=""/148, 0x94}], 0x3}, 0x6}, {{&(0x7f0000001280)=@nl=@unspec, 0x80, &(0x7f0000001540)=[{&(0x7f0000000640)=""/256, 0x100}, {&(0x7f0000001400)=""/51, 0x33}, {&(0x7f0000001440)=""/237, 0xed}], 0x3, &(0x7f0000001580)=""/203, 0xcb}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000003cc0)=""/132, 0x84}}, {{&(0x7f0000003d80)=@ieee802154={0x24, @short}, 0x80, 0x0, 0x0, &(0x7f0000006180)=""/162, 0xa2}, 0x2}, {{&(0x7f0000006240)=@sco={0x1f, @fixed}, 0x80, &(0x7f00000046c0)=[{&(0x7f00000062c0)=""/168, 0xa8}, {&(0x7f00000010c0)=""/32, 0x20}, {&(0x7f0000004500)=""/190, 0xbe}, {&(0x7f00000045c0)=""/232, 0xe8}, {&(0x7f0000001100)=""/105, 0x69}], 0x5, &(0x7f00000063c0)=""/199, 0xc7}}, {{0x0, 0x0, &(0x7f0000006b80)=[{0x0}, {0x0}, {&(0x7f00000067c0)=""/104, 0x68}, {0x0}, {&(0x7f0000006940)=""/114, 0x72}, {&(0x7f00000069c0)=""/248, 0xf8}], 0x6, &(0x7f0000006c40)=""/4096, 0x1000}}], 0x8, 0x0, &(0x7f0000000d40)) io_destroy(0x0) ppoll(&(0x7f00000000c0)=[{r2, 0x8124, 0x3a1}, {0xffffffffffffffff, 0x0, 0x64}], 0x2, &(0x7f00000002c0)={0x0, r3+10000000}, 0x0, 0x2000000) sched_setaffinity(0x0, 0x0, 0x0) 13:48:18 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_PROBE_CLIENT(r0, &(0x7f0000001e00)={0x0, 0x0, 0x0}, 0x0) 13:48:18 executing program 5: creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write(r1, &(0x7f0000000100)="beb12a01000100a2babe2cfe3f8cd6657ce2", 0x12) sendfile(r1, r0, 0x0, 0x1ffff) sendfile(r1, r0, 0x0, 0x1554) 13:48:18 executing program 1: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sched_setattr(r0, &(0x7f0000000480)={0x38, 0x0, 0x0, 0x0, 0x6}, 0x0) 13:48:18 executing program 2: sched_setattr(0x0, &(0x7f0000000180)={0x38, 0x5}, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) fcntl$dupfd(r0, 0x406, r0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000001c0)={'syztnl0\x00', &(0x7f0000000100)={'ip6tnl0\x00', 0x0, 0x29, 0x49, 0x7, 0xfffffffd, 0x20, @private1, @mcast1, 0x7, 0x40, 0x3f, 0x8000}}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x0, 0x6, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}, [@generic={0xd2, 0x9, 0xe, 0x4, 0x7}, @map_fd={0x18, 0xa}]}, &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000440)=""/4096, 0x41100, 0x2, '\x00', r1, 0x0, r0, 0x8, &(0x7f0000000200)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x1, 0x2, 0xf86c, 0x1000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0xffffffffffffffff]}, 0x80) write$P9_RREADLINK(r0, &(0x7f0000000400)=ANY=[], 0x88) sendfile(r0, r0, &(0x7f0000000240), 0x7ffc) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f00000020c0)='.\x00', 0x42000502) 13:48:18 executing program 4: sched_setattr(0x0, &(0x7f0000000180)={0x38, 0x5}, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) fcntl$dupfd(r0, 0x406, r0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x0, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}, [@map_fd={0x18, 0xa}]}, &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000440)=""/4096, 0x41100, 0x2, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000200)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x1, 0x2, 0xf86c, 0x1000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0xffffffffffffffff]}, 0x80) write$P9_RREADLINK(r0, &(0x7f0000000400)=ANY=[], 0x88) sendfile(r0, r0, &(0x7f0000000240), 0x7ffc) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f00000020c0)='.\x00', 0x42000502) 13:48:18 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000180)=ANY=[@ANYBLOB="e0160002ac1414"], 0x5000) 13:48:18 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1}, 0xc) 13:48:18 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000180)=ANY=[@ANYBLOB="e0"], 0x5000) 13:48:18 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x14, 0x0, &(0x7f00000000c0)) 13:48:18 executing program 1: keyctl$KEYCTL_MOVE(0x8, 0x0, 0xfffffffffffffff8, 0x0, 0x0) 13:48:19 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="14"], 0x44}}, 0x0) [ 447.311397][ T8857] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8857 comm=syz-executor.3 13:48:25 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="440000001800010025bd7000fcdbdf2502141405ff02fde3001000000800", @ANYRES32=0x0, @ANYBLOB="14001e0002"], 0x44}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, 0x0, 0x0) 13:48:25 executing program 1: syz_genetlink_get_family_id$team(&(0x7f0000000280), 0xffffffffffffffff) syz_clone(0x42040000, &(0x7f0000000000)="6e86ea166ed36ad0bb033735ac997b74d1c5aaf9a25f8ab5040bdf8082196e3fe28d7dd0649ab4f7ad0200000000000000b8ed6e06547ea4e8861076e1fff298d68a239561a92cc3f300fc8d53ef2142195642cab07e3dfe4ca5d1453f1878f9bf2e33e4bfdcdd522d933e6a67dabbe7e928e5e12f175a7369d8bf5941151bfd1a691584d79e3a2bd79e82aeafa5e40b1403a74e9d1768d119b4948291e14973f03d147ac61ebe1bb77109b3eae9c7adad25ec4bbac6d398dc9b1969d0e947799d86b10840cc70e9ba15cf4c11297141", 0xd0, &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)) syz_open_procfs$namespace(0x0, 0x0) keyctl$KEYCTL_MOVE(0x5, 0x0, 0xfffffffffffffff8, 0x0, 0x0) 13:48:25 executing program 5: creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write(r1, &(0x7f0000000100)="beb12a01000100a2babe2cfe3f8cd6657ce2", 0x12) sendfile(r1, r0, 0x0, 0x1ffff) sendfile(r1, r0, 0x0, 0x1554) 13:48:25 executing program 2: sched_setattr(0x0, &(0x7f0000000180)={0x38, 0x5}, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) fcntl$dupfd(r0, 0x406, r0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000001c0)={'syztnl0\x00', &(0x7f0000000100)={'ip6tnl0\x00', 0x0, 0x29, 0x49, 0x7, 0xfffffffd, 0x20, @private1, @mcast1, 0x7, 0x40, 0x3f, 0x8000}}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x0, 0x6, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}, [@generic={0xd2, 0x9, 0xe, 0x4, 0x7}, @map_fd={0x18, 0xa}]}, &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000440)=""/4096, 0x41100, 0x2, '\x00', r1, 0x0, r0, 0x8, &(0x7f0000000200)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x1, 0x2, 0xf86c, 0x1000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0xffffffffffffffff]}, 0x80) write$P9_RREADLINK(r0, &(0x7f0000000400)=ANY=[], 0x88) sendfile(r0, r0, &(0x7f0000000240), 0x7ffc) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f00000020c0)='.\x00', 0x42000502) 13:48:25 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0xd, 0x0, 0x0) 13:48:25 executing program 3: r0 = gettid() rt_tgsigqueueinfo(r0, r0, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x2}) 13:48:25 executing program 4: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00'}) r1 = socket$inet(0x2, 0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8910, &(0x7f0000000000)={'batadv_slave_0\x00'}) 13:48:26 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6}]}) syz_open_procfs(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000180)) 13:48:26 executing program 1: socketpair(0x10, 0x2, 0x2, &(0x7f0000000440)) 13:48:26 executing program 4: r0 = socket$igmp(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f0000001500)={&(0x7f00000002c0)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000001640)=[@ip_retopts={{0x10}}, @ip_ttl={{0x14}}], 0x28}, 0x0) 13:48:26 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{}, {0x25}]}) [ 453.965487][ T23] audit: type=1326 audit(1675777706.024:300): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8879 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f2b7293c0f9 code=0x0 13:48:26 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f00000000c0)=@encrypted_update={'update ', 'ecryptfs', 0x20, 'trusted:', ':!'}, 0x1b, 0x0) 13:48:34 executing program 0: add_key(&(0x7f0000000080)='asymmetric\x00', 0x0, &(0x7f0000000100)="7f62", 0x2, 0xffffffffffffffff) 13:48:34 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="440000001800010025bd7000fcdbdf2502141405ff02fde30010000008"], 0x44}}, 0x0) 13:48:34 executing program 1: syz_genetlink_get_family_id$team(&(0x7f0000000280), 0xffffffffffffffff) r0 = syz_clone(0x42040000, &(0x7f0000000000)="6e86ea166ed36ad0bb033735ac997b74d1c5aaf9a25f8ab5040bdf8082196e3fe28d7dd0649ab4f7ad0200000000000000b8ed6e06547ea4e8861076e1fff298d68a239561a92cc3f300fc8d53ef2142195642cab07e3dfe4ca5d1453f1878f9bf2e33e4bfdcdd522d933e6a67dabbe7e928e5e12f175a7369d8bf5941151bfd1a691584d79e3a2bd79e82aeafa5e40b1403a74e9d1768d119b4948291e14973f03d147ac61ebe1bb77109b3eae9c7adad25ec4bbac6d398dc9b1969d0e947799d86b10840cc70e9ba15cf4c11297141", 0xd0, &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)="084aa7c3bf7085f8baf114891110919f88a189469f295aa7be87f45af3f5fd43637c094a4379b5e07b5ce0cc0d49ff62d072d57b8cc9d06d0517bf26e687335a5ebae18c6b0e4655ba995f454430f37ddcdbd9b76c2ea8be90f5ce02a9997447209110c1543f1b1a43c415b37d090f980f0f347f809f88e265f2e2a0dc2f5b08fae2d871f8c1e043affd5cafcf32033be4c9b34d1925316c73b2561d25489c7d92580a4d103f0fee98") syz_open_procfs$namespace(r0, &(0x7f00000002c0)='ns/pid_for_children\x00') keyctl$KEYCTL_MOVE(0x5, 0x0, 0xfffffffffffffff8, 0x0, 0x0) 13:48:34 executing program 5: syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2000000, &(0x7f0000000540)=ANY=[], 0x1, 0x1a9, &(0x7f0000000440)="$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") creat(0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write(r1, &(0x7f0000000100)="beb12a01000100a2babe2cfe3f8cd6657ce2", 0x12) sendfile(r1, r0, 0x0, 0x1ffff) sendfile(r1, r0, 0x0, 0x1554) 13:48:34 executing program 2: sched_setattr(0x0, &(0x7f0000000180)={0x38, 0x5}, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) fcntl$dupfd(r0, 0x406, r0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000001c0)={'syztnl0\x00', &(0x7f0000000100)={'ip6tnl0\x00', 0x0, 0x29, 0x49, 0x7, 0xfffffffd, 0x20, @private1, @mcast1, 0x7, 0x40, 0x3f, 0x8000}}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x0, 0x6, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}, [@generic={0xd2, 0x9, 0xe, 0x4, 0x7}, @map_fd={0x18, 0xa}]}, &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000440)=""/4096, 0x41100, 0x2, '\x00', r1, 0x0, r0, 0x8, &(0x7f0000000200)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x1, 0x2, 0xf86c, 0x1000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0xffffffffffffffff]}, 0x80) write$P9_RREADLINK(r0, &(0x7f0000000400)=ANY=[], 0x88) sendfile(r0, r0, &(0x7f0000000240), 0x7ffc) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f00000020c0)='.\x00', 0x42000502) 13:48:34 executing program 3: add_key$fscrypt_v1(&(0x7f0000000280), &(0x7f0000000380)={'fscrypt:', @desc1}, &(0x7f0000000180)={0x0, "4bfbdd28d5fb8013fab1947a599d387b65c25d2bae7400f3fee831c78194b75c9b63f4886b3edbdb5c66efbbe38828f982759259ad4a78a231687faff500"}, 0xfffffffffffffe55, 0x0) 13:48:34 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f00000000c0)=[{0x1, 0x0, 0x0, 0x80000000}, {0x16}]}) 13:48:34 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{}, {0x30}]}) [ 462.190234][ T8896] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 462.217886][ T8906] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.4'. [ 462.217959][ T8905] loop5: detected capacity change from 0 to 256 13:48:34 executing program 5: syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2000000, &(0x7f0000000540)=ANY=[], 0x1, 0x1a9, &(0x7f0000000440)="$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") creat(0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write(r1, &(0x7f0000000100)="beb12a01000100a2babe2cfe3f8cd6657ce2", 0x12) sendfile(r1, r0, 0x0, 0x1ffff) sendfile(r1, r0, 0x0, 0x1554) 13:48:34 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x2b, 0x0, 0x0) 13:48:34 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x2, 0x0, 0x3) 13:48:34 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0xe, 0x0, 0x0, 0x0) [ 462.290352][ T23] audit: type=1326 audit(1675777714.344:301): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8909 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f2b7293c0f9 code=0x0 [ 462.318584][ T8916] loop5: detected capacity change from 0 to 256 13:48:38 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{}, {0x15}]}) 13:48:38 executing program 3: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$get_keyring_id(0x0, r0, 0x0) 13:48:38 executing program 5: syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2000000, &(0x7f0000000540)=ANY=[], 0x1, 0x1a9, &(0x7f0000000440)="$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") creat(0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write(r1, &(0x7f0000000100)="beb12a01000100a2babe2cfe3f8cd6657ce2", 0x12) sendfile(r1, r0, 0x0, 0x1ffff) sendfile(r1, r0, 0x0, 0x1554) 13:48:38 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{}, {0x3d}]}) 13:48:38 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x11, 0x0, 0x0) 13:48:38 executing program 2: sched_setattr(0x0, &(0x7f0000000180)={0x38, 0x5}, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) fcntl$dupfd(r0, 0x406, r0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000001c0)={'syztnl0\x00', &(0x7f0000000100)={'ip6tnl0\x00', 0x0, 0x29, 0x49, 0x7, 0xfffffffd, 0x20, @private1, @mcast1, 0x7, 0x40, 0x3f, 0x8000}}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x0, 0x6, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}, [@generic={0xd2, 0x9, 0xe, 0x4, 0x7}, @map_fd={0x18, 0xa}]}, &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000440)=""/4096, 0x41100, 0x2, '\x00', r1, 0x0, r0, 0x8, &(0x7f0000000200)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x1, 0x2, 0xf86c, 0x1000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0xffffffffffffffff]}, 0x80) write$P9_RREADLINK(r0, &(0x7f0000000400)=ANY=[], 0x88) sendfile(r0, r0, &(0x7f0000000240), 0x7ffc) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f00000020c0)='.\x00', 0x42000502) 13:48:38 executing program 3: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x6, 0x0, 0x0, 0x4) 13:48:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000380)={@loopback, @remote}, 0xc) 13:48:38 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_mreqn(r0, 0x0, 0x27, 0x0, 0x0) 13:48:38 executing program 5: syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2000000, &(0x7f0000000540)=ANY=[], 0x1, 0x1a9, &(0x7f0000000440)="$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") creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write(r1, &(0x7f0000000100)="beb12a01000100a2babe2cfe3f8cd6657ce2", 0x12) sendfile(r1, r0, 0x0, 0x1ffff) sendfile(r1, r0, 0x0, 0x1554) 13:48:38 executing program 3: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8931, &(0x7f0000000000)={'batadv_slave_0\x00'}) 13:48:38 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x61, 0x0, 0x0, 0xffff}]}) [ 466.363715][ T8933] loop5: detected capacity change from 0 to 256 [ 466.440365][ T8946] loop5: detected capacity change from 0 to 256 13:48:44 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f00000000c0)=[{0x1}, {0x16}]}) 13:48:44 executing program 4: syz_genetlink_get_family_id$team(&(0x7f0000000280), 0xffffffffffffffff) syz_clone(0x42040000, 0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_MOVE(0x5, 0x0, 0xfffffffffffffff8, 0x0, 0x0) 13:48:44 executing program 1: syz_genetlink_get_family_id$team(&(0x7f0000000280), 0xffffffffffffffff) r0 = syz_clone(0x42040000, &(0x7f0000000000)="6e86ea166ed36ad0bb033735ac997b74d1c5aaf9a25f8ab5040bdf8082196e3fe28d7dd0649ab4f7ad0200000000000000b8ed6e06547ea4e8861076e1fff298d68a239561a92cc3f300fc8d53ef2142195642cab07e3dfe4ca5d1453f1878f9bf2e33e4bfdcdd522d933e6a67dabbe7e928e5e12f175a7369d8bf5941151bfd1a691584d79e3a2bd79e82aeafa5e40b1403a74e9d1768d119b4948291e14973f03d147ac61ebe1bb77109b3eae9c7adad25ec4bbac6d398dc9b1969d0e947799d86b10840cc70e9ba15cf4c11297141", 0xd0, &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)="084aa7c3bf7085f8baf114891110919f88a189469f295aa7be87f45af3f5fd43637c094a4379b5e07b5ce0cc0d49ff62d072d57b8cc9d06d0517bf26e687335a5ebae18c6b0e4655ba995f454430f37ddcdbd9b76c2ea8be90f5ce02a9997447209110c1543f1b1a43c415b37d090f980f0f347f809f88e265f2e2a0dc2f5b08fae2d871f8c1e043affd5cafcf32033be4c9b34d1925316c73b2561d25489c7d92580a4d103f0fee98c8") syz_open_procfs$namespace(r0, &(0x7f00000002c0)='ns/pid_for_children\x00') keyctl$KEYCTL_MOVE(0x5, 0x0, 0xfffffffffffffff8, 0x0, 0x0) 13:48:44 executing program 5: syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2000000, &(0x7f0000000540)=ANY=[], 0x1, 0x1a9, &(0x7f0000000440)="$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") creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write(r1, &(0x7f0000000100)="beb12a01000100a2babe2cfe3f8cd6657ce2", 0x12) sendfile(r1, r0, 0x0, 0x1ffff) sendfile(r1, r0, 0x0, 0x1554) 13:48:44 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet(0x2, 0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8927, &(0x7f0000000000)={'batadv_slave_0\x00', 0x0}) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote, r2}, 0x14) 13:48:44 executing program 2: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', &(0x7f0000000040)={'erspan0\x00', 0x0, 0x0, 0x7f0f, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote}}}}) 13:48:44 executing program 3: keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000300), 0x0, 0x0, 0x0) 13:48:44 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x4000) 13:48:44 executing program 5: syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2000000, &(0x7f0000000540)=ANY=[], 0x1, 0x1a9, &(0x7f0000000440)="$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") creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write(r1, &(0x7f0000000100)="beb12a01000100a2babe2cfe3f8cd6657ce2", 0x12) sendfile(r1, r0, 0x0, 0x1ffff) sendfile(r1, r0, 0x0, 0x1554) 13:48:44 executing program 3: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x2, 0x0, 0x0) 13:48:44 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="440000001800010025bd7000fcdbdf2502141405ff02fde30010000008000400", @ANYRES32=0x0, @ANYBLOB="14001e"], 0x44}}, 0x0) [ 472.608967][ T8961] loop5: detected capacity change from 0 to 256 13:48:44 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0xc020662a, 0x0) [ 472.675011][ T8970] loop5: detected capacity change from 0 to 256 [ 472.699424][ T8974] netlink: 'syz-executor.2': attribute type 30 has an invalid length. [ 472.712107][ T23] audit: type=1326 audit(1675777724.764:302): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8975 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f2b7293c0f9 code=0x0 13:48:53 executing program 0: syz_clone(0x28042600, 0x0, 0x0, 0x0, 0x0, 0x0) 13:48:53 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x6, 0x0, &(0x7f00000000c0)) 13:48:53 executing program 5: syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2000000, &(0x7f0000000540)=ANY=[], 0x1, 0x1a9, &(0x7f0000000440)="$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") creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x1c1002, 0x0) write(r1, &(0x7f0000000100)="beb12a01000100a2babe2cfe3f8cd6657ce2", 0x12) sendfile(r1, r0, 0x0, 0x1ffff) sendfile(r1, r0, 0x0, 0x1554) 13:48:53 executing program 4: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000006b80)) 13:48:53 executing program 1: rt_tgsigqueueinfo(0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000000)={0x0, 0x0, 0x8}) 13:48:53 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x0}, 0x0) [ 480.905088][ T23] audit: type=1326 audit(1675777732.964:303): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8980 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7ff3996e20f9 code=0x0 13:48:53 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet(0x2, 0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8915, &(0x7f0000000000)={'batadv_slave_0\x00', 0x0}) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote, r2}, 0x14) 13:48:53 executing program 1: r0 = socket$igmp(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f0000000540)={&(0x7f00000000c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1c000000000000000000000008"], 0x38}, 0x0) 13:48:53 executing program 3: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x2e, 0x0, 0x0) 13:48:53 executing program 5: syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2000000, &(0x7f0000000540)=ANY=[], 0x1, 0x1a9, &(0x7f0000000440)="$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") creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x1c1002, 0x0) write(r1, &(0x7f0000000100)="beb12a01000100a2babe2cfe3f8cd6657ce2", 0x12) sendfile(r1, r0, 0x0, 0x1ffff) sendfile(r1, r0, 0x0, 0x1554) 13:48:53 executing program 1: openat$bsg(0xffffffffffffff9c, 0x0, 0x600200, 0x0) 13:48:53 executing program 3: r0 = socket$inet(0x2, 0x1, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x16, 0x0, &(0x7f00000000c0)) [ 480.970216][ T8989] loop5: detected capacity change from 0 to 256 [ 480.977770][ T23] audit: type=1326 audit(1675777733.034:304): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8984 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f02d0cf20f9 code=0x0 [ 481.058218][ T9002] loop5: detected capacity change from 0 to 256 [ 481.059943][ T8993] I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 13:48:58 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x2d, 0x0, 0x0) 13:48:58 executing program 2: connect$tipc(0xffffffffffffffff, 0x0, 0x0) 13:48:58 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/dev_mcast\x00') read$msr(r0, 0x0, 0x0) 13:48:58 executing program 5: syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2000000, &(0x7f0000000540)=ANY=[], 0x1, 0x1a9, &(0x7f0000000440)="$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") creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x1c1002, 0x0) write(r1, &(0x7f0000000100)="beb12a01000100a2babe2cfe3f8cd6657ce2", 0x12) sendfile(r1, r0, 0x0, 0x1ffff) sendfile(r1, r0, 0x0, 0x1554) 13:48:58 executing program 3: r0 = socket$inet(0x2, 0x1, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0xf, 0x0, &(0x7f00000000c0)) 13:48:58 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0xb, 0x0, &(0x7f00000000c0)) 13:48:58 executing program 4: r0 = socket$igmp(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f0000000540)={&(0x7f00000000c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1c00000000000000", @ANYRES32=0x0, @ANYBLOB="ac1414bb000000000000000014"], 0x38}, 0x0) 13:48:58 executing program 1: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0xc0502100, 0x0) 13:48:58 executing program 2: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8924, &(0x7f0000000000)={'batadv_slave_0\x00'}) 13:48:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet(0x2, 0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00', 0x0}) sendmsg$inet(r0, &(0x7f0000000400)={&(0x7f0000000000)={0x2, 0x4e29, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @empty, @empty}}}], 0x20}, 0x0) 13:48:58 executing program 5: syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2000000, &(0x7f0000000540)=ANY=[], 0x1, 0x1a9, &(0x7f0000000440)="$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") creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x0, 0x0) write(r1, &(0x7f0000000100)="beb12a01000100a2babe2cfe3f8cd6657ce2", 0x12) sendfile(r1, r0, 0x0, 0x1ffff) sendfile(r1, r0, 0x0, 0x1554) [ 486.012322][ T9018] loop5: detected capacity change from 0 to 256 13:48:58 executing program 3: keyctl$revoke(0x6, 0x0) [ 486.039899][ T23] audit: type=1326 audit(1675777738.094:305): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9023 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fa0ebc350f9 code=0x0 [ 486.093825][ T9031] loop5: detected capacity change from 0 to 256 13:49:06 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{}, {0x2d}]}) 13:49:06 executing program 4: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00', 0x0}) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)={r1, @broadcast, @broadcast}, 0xc) rt_tgsigqueueinfo(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x8}) 13:49:06 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x8, 0x0, &(0x7f00000000c0)) 13:49:06 executing program 3: r0 = socket(0x18, 0x0, 0x1) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000040)={'batadv_slave_0\x00'}) 13:49:06 executing program 5: syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2000000, &(0x7f0000000540)=ANY=[], 0x1, 0x1a9, &(0x7f0000000440)="$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") creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x0, 0x0) write(r1, &(0x7f0000000100)="beb12a01000100a2babe2cfe3f8cd6657ce2", 0x12) sendfile(r1, r0, 0x0, 0x1ffff) sendfile(r1, r0, 0x0, 0x1554) 13:49:06 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x6, 0x0, 0x0) 13:49:06 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x19, 0x0, 0x0, 0x2}, 0x48) 13:49:06 executing program 3: r0 = socket(0x18, 0x0, 0x1) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8907, 0x0) 13:49:06 executing program 1: r0 = add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc4}, &(0x7f0000000100)={0x0, "e3d6fde79d972fca31a8a1f233ea8307b1740e9516b1b2e48aa3c547a3f7e65b46543357ee8fa7ad8546b7de3a1b98737fb470a74dd898683f33afa8e3dc73d3"}, 0x48, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'sha384-generic\x00'}}, 0x0, 0x0) 13:49:06 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x2, &(0x7f00000000c0)=[{0x7}, {0x6}]}) 13:49:06 executing program 5: syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2000000, &(0x7f0000000540)=ANY=[], 0x1, 0x1a9, &(0x7f0000000440)="$eJzs3TFrE2EcBvCnNmpwSQYncThwcQpNP0GLVBADgnKDToptQXqhYCGgg3Xz+/khnO3WQTixJ0lbzsGhnvR+vyUPvHngfZd7p/vf6/vzg93Do/2Tk28ZDtcy2MpWTtcyzo2sp/E5AMB1clrX+V43ut4LAPBvuP8BoH/c/wDQP+5/AOifFy9fPd2ezXaeF8UwmX9ZlIuy+W3Wt/fzLlX2spFRfiT1UpMfP5ntbBRnxinnx7/7x4ty/WJ/mlHG7f1p0y8u9m/mzvn+Zka5297fbO3fysMH5/qTjPL1bQ5TZTe/uqv+p2lRPHo2u9S/ffY/AAAAAAAAAAAAAAAAAAAAAAC4CpNiqXV+z2Typ/Wm/xfzgS7N1xnk3qDbswMAAAAAAAAAAAAAAAAAAMD/4ujDx4M3VbX3XhAEYRm6fjIBAAAAAAAAAAAAAAAAAED/rF767XonAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAANCd1ff/ry50fUYAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPgZAAD//yusq24=") creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x0, 0x0) write(r1, &(0x7f0000000100)="beb12a01000100a2babe2cfe3f8cd6657ce2", 0x12) sendfile(r1, r0, 0x0, 0x1ffff) sendfile(r1, r0, 0x0, 0x1554) 13:49:06 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x18, 0x0, 0x0) [ 494.283995][ T9043] loop5: detected capacity change from 0 to 256 [ 494.340039][ T23] audit: type=1326 audit(1675777746.394:306): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9052 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f02d0cf20f9 code=0x0 [ 494.347498][ T9058] loop5: detected capacity change from 0 to 256 13:49:10 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote}, 0x14) setsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f00000008c0)={@private0}, 0x14) 13:49:10 executing program 3: r0 = socket$inet(0x2, 0x1, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0xd, 0x0, &(0x7f00000000c0)) 13:49:10 executing program 2: syz_genetlink_get_family_id$team(&(0x7f0000000280), 0xffffffffffffffff) r0 = syz_clone(0x42040000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_procfs$namespace(r0, 0x0) 13:49:10 executing program 1: syz_clone(0x42040000, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)="084aa7c3bf7085f8baf114891110919f88a189469f295aa7be87f45af3f5fd43637c094a4379b5e07b5ce0cc0d49ff62d072d57b8cc9d06d0517bf26e687335a5ebae18c6b0e4655ba995f454430f37ddcdbd9b76c") keyctl$KEYCTL_MOVE(0x5, 0x0, 0xfffffffffffffff8, 0x0, 0x0) 13:49:10 executing program 5: syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2000000, &(0x7f0000000540)=ANY=[], 0x1, 0x1a9, &(0x7f0000000440)="$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") creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write(0xffffffffffffffff, &(0x7f0000000100)="beb12a01000100a2babe2cfe3f8cd6657ce2", 0x12) sendfile(r1, r0, 0x0, 0x1ffff) sendfile(r1, r0, 0x0, 0x1554) 13:49:10 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x14, 0x0, 0x0) 13:49:10 executing program 3: r0 = socket$inet(0x2, 0x1, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000000a40)={&(0x7f0000000000), 0xc, &(0x7f0000000a00)={0x0, 0x700}}, 0x20000800) 13:49:10 executing program 4: r0 = gettid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000000080)={0x0, 0x0, 0xc4ffffff}) 13:49:10 executing program 5: syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2000000, &(0x7f0000000540)=ANY=[], 0x1, 0x1a9, &(0x7f0000000440)="$eJzs3TFrE2EcBvCnNmpwSQYncThwcQpNP0GLVBADgnKDToptQXqhYCGgg3Xz+/khnO3WQTixJ0lbzsGhnvR+vyUPvHngfZd7p/vf6/vzg93Do/2Tk28ZDtcy2MpWTtcyzo2sp/E5AMB1clrX+V43ut4LAPBvuP8BoH/c/wDQP+5/AOifFy9fPd2ezXaeF8UwmX9ZlIuy+W3Wt/fzLlX2spFRfiT1UpMfP5ntbBRnxinnx7/7x4ty/WJ/mlHG7f1p0y8u9m/mzvn+Zka5297fbO3fysMH5/qTjPL1bQ5TZTe/uqv+p2lRPHo2u9S/ffY/AAAAAAAAAAAAAAAAAAAAAAC4CpNiqXV+z2Typ/Wm/xfzgS7N1xnk3qDbswMAAAAAAAAAAAAAAAAAAMD/4ujDx4M3VbX3XhAEYRm6fjIBAAAAAAAAAAAAAAAAAED/rF767XonAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAANCd1ff/ry50fUYAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPgZAAD//yusq24=") creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write(0xffffffffffffffff, &(0x7f0000000100)="beb12a01000100a2babe2cfe3f8cd6657ce2", 0x12) sendfile(r1, r0, 0x0, 0x1ffff) sendfile(r1, r0, 0x0, 0x1554) [ 498.447159][ T9072] loop5: detected capacity change from 0 to 256 13:49:10 executing program 4: mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) 13:49:10 executing program 3: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x16, 0x0, 0x0) 13:49:10 executing program 3: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x3, 0x0, 0x0) [ 498.529222][ T9086] loop5: detected capacity change from 0 to 256 13:49:14 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x3, &(0x7f0000000000)=[{}, {0x5}, {0x6}]}) 13:49:14 executing program 4: syz_genetlink_get_family_id$team(0x0, 0xffffffffffffffff) syz_clone(0x42040000, &(0x7f0000000000)="6e86ea166ed36ad0bb033735ac997b74d1c5aaf9a25f8ab5040bdf8082196e3fe28d7dd0649ab4f7ad0200000000000000b8ed6e06547ea4e8861076e1fff298d68a239561a92cc3f300fc8d53ef2142195642cab07e3dfe4ca5d1453f1878f9bf2e33", 0x63, 0x0, &(0x7f0000000140), &(0x7f0000000180)="084aa7c3bf7085f8baf114891110919f88a189469f295aa7be87f45af3f5fd43637c094a4379b5e07b5ce0cc0d49ff62d072d57b8cc9d06d0517bf26e687335a5ebae18c6b0e4655ba995f454430f37ddcdbd9b76c2ea8be90f5ce02a9997447209110c1543f1b1a43c415b37d090f980f0f347f809f88e265f2e2a0dc2f5b08fae2d871f8c1e043affd5cafcf32033be4c9b34d1925") keyctl$KEYCTL_MOVE(0x5, 0x0, 0xfffffffffffffff8, 0x0, 0x0) 13:49:14 executing program 5: syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2000000, &(0x7f0000000540)=ANY=[], 0x1, 0x1a9, &(0x7f0000000440)="$eJzs3TFrE2EcBvCnNmpwSQYncThwcQpNP0GLVBADgnKDToptQXqhYCGgg3Xz+/khnO3WQTixJ0lbzsGhnvR+vyUPvHngfZd7p/vf6/vzg93Do/2Tk28ZDtcy2MpWTtcyzo2sp/E5AMB1clrX+V43ut4LAPBvuP8BoH/c/wDQP+5/AOifFy9fPd2ezXaeF8UwmX9ZlIuy+W3Wt/fzLlX2spFRfiT1UpMfP5ntbBRnxinnx7/7x4ty/WJ/mlHG7f1p0y8u9m/mzvn+Zka5297fbO3fysMH5/qTjPL1bQ5TZTe/uqv+p2lRPHo2u9S/ffY/AAAAAAAAAAAAAAAAAAAAAAC4CpNiqXV+z2Typ/Wm/xfzgS7N1xnk3qDbswMAAAAAAAAAAAAAAAAAAMD/4ujDx4M3VbX3XhAEYRm6fjIBAAAAAAAAAAAAAAAAAED/rF767XonAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAANCd1ff/ry50fUYAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPgZAAD//yusq24=") creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write(0xffffffffffffffff, &(0x7f0000000100)="beb12a01000100a2babe2cfe3f8cd6657ce2", 0x12) sendfile(r1, r0, 0x0, 0x1ffff) sendfile(r1, r0, 0x0, 0x1554) 13:49:14 executing program 1: keyctl$revoke(0xf, 0x0) 13:49:14 executing program 2: add_key(&(0x7f0000000080)='asymmetric\x00', 0x0, &(0x7f0000000100)="7f", 0x1, 0xffffffffffffffff) 13:49:14 executing program 3: add_key(&(0x7f0000000080)='asymmetric\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) 13:49:14 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0xa, 0x0, &(0x7f00000000c0)) 13:49:14 executing program 1: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, 0x0, 0x0) 13:49:14 executing program 5: syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2000000, &(0x7f0000000540)=ANY=[], 0x1, 0x1a9, &(0x7f0000000440)="$eJzs3TFrE2EcBvCnNmpwSQYncThwcQpNP0GLVBADgnKDToptQXqhYCGgg3Xz+/khnO3WQTixJ0lbzsGhnvR+vyUPvHngfZd7p/vf6/vzg93Do/2Tk28ZDtcy2MpWTtcyzo2sp/E5AMB1clrX+V43ut4LAPBvuP8BoH/c/wDQP+5/AOifFy9fPd2ezXaeF8UwmX9ZlIuy+W3Wt/fzLlX2spFRfiT1UpMfP5ntbBRnxinnx7/7x4ty/WJ/mlHG7f1p0y8u9m/mzvn+Zka5297fbO3fysMH5/qTjPL1bQ5TZTe/uqv+p2lRPHo2u9S/ffY/AAAAAAAAAAAAAAAAAAAAAAC4CpNiqXV+z2Typ/Wm/xfzgS7N1xnk3qDbswMAAAAAAAAAAAAAAAAAAMD/4ujDx4M3VbX3XhAEYRm6fjIBAAAAAAAAAAAAAAAAAED/rF767XonAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAANCd1ff/ry50fUYAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPgZAAD//yusq24=") creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write(r1, 0x0, 0x0) sendfile(r1, r0, 0x0, 0x1ffff) sendfile(r1, r0, 0x0, 0x1554) [ 502.683172][ T9106] loop5: detected capacity change from 0 to 256 13:49:14 executing program 3: r0 = socket$inet(0x2, 0x1, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x9, 0x0, &(0x7f00000000c0)) 13:49:14 executing program 2: keyctl$KEYCTL_MOVE(0x5, 0x0, 0xfffffffffffffff8, 0x0, 0x0) 13:49:14 executing program 1: r0 = socket(0x1, 0x5, 0x0) sendmsg$ETHTOOL_MSG_CHANNELS_GET(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={0x0}}, 0x0) [ 502.726393][ T23] audit: type=1400 audit(1675777754.784:307): avc: denied { bind } for pid=9111 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 502.765411][ T9116] loop5: detected capacity change from 0 to 256 13:49:23 executing program 0: sched_getattr(0x0, &(0x7f0000000000)={0x38}, 0x38, 0x0) 13:49:23 executing program 1: syz_genetlink_get_family_id$team(&(0x7f0000000280), 0xffffffffffffffff) syz_clone(0x42040000, &(0x7f0000000000)="6e86ea166ed36ad0bb033735ac997b74d1c5aaf9a25f8ab5040bdf8082196e3fe28d7dd0649ab4f7ad0200000000000000b8ed6e06547ea4e8861076e1fff298d68a239561a92cc3f300fc8d53ef2142195642cab07e3dfe4ca5d1453f1878f9bf2e33e4bfdcdd522d933e6a67dabbe7e928e5e12f175a7369d8bf5941151bfd1a691584d79e3a2bd79e82aeafa5e40b1403a74e9d1768d119b4948291", 0x9d, &(0x7f0000000100), &(0x7f0000000140), 0x0) keyctl$KEYCTL_MOVE(0x5, 0x0, 0xfffffffffffffff8, 0x0, 0x0) 13:49:23 executing program 2: rt_tgsigqueueinfo(0x0, 0x0, 0x7, &(0x7f0000000100)={0x0, 0x0, 0x8}) 13:49:23 executing program 5: syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2000000, &(0x7f0000000540)=ANY=[], 0x1, 0x1a9, &(0x7f0000000440)="$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") creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write(r1, 0x0, 0x0) sendfile(r1, r0, 0x0, 0x1ffff) sendfile(r1, r0, 0x0, 0x1554) 13:49:23 executing program 3: r0 = gettid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000000080)={0x0, 0x0, 0xffffffff}) 13:49:23 executing program 4: syz_clone(0x84000, 0x0, 0x0, 0x0, 0x0, 0x0) [ 510.983856][ T23] audit: type=1326 audit(1675777763.044:308): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9124 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7ff3996e20f9 code=0x0 13:49:23 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 13:49:23 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=@RTM_GETNSID={0x1c, 0x5a, 0x1, 0x0, 0x0, {}, [@NETNSA_PID={0x8}]}, 0x1c}}, 0x0) [ 511.049454][ T9131] loop5: detected capacity change from 0 to 256 13:49:23 executing program 3: syz_genetlink_get_family_id$team(&(0x7f0000000280), 0xffffffffffffffff) syz_clone(0x42040000, &(0x7f0000000000), 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000180)="084aa7c3bf7085f8baf114891110919f88a189469f295aa7be87f45af3f5fd43637c094a4379b5e07b5ce0cc0d49ff62d072d57b8cc9d06d0517bf26e687335a5ebae18c6b0e4655ba995f454430f37ddcdbd9b76c2ea8be90f5ce02a9997447209110c1543f1b1a43c415b37d090f980f0f347f809f88e265f2e2a0dc2f5b08fae2d871f8c1e043affd5cafcf32033be4c9b34d1925316c73b2561d25489c7d92580a4d103f0fee") keyctl$KEYCTL_MOVE(0x5, 0x0, 0xfffffffffffffff8, 0x0, 0x0) 13:49:23 executing program 5: syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2000000, &(0x7f0000000540)=ANY=[], 0x1, 0x1a9, &(0x7f0000000440)="$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") creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write(r1, 0x0, 0x0) sendfile(r1, r0, 0x0, 0x1ffff) sendfile(r1, r0, 0x0, 0x1554) 13:49:23 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0xc0182101, 0x0) [ 511.089481][ T23] audit: type=1400 audit(1675777763.144:309): avc: denied { setopt } for pid=9139 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 511.115269][ T9143] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 13:49:23 executing program 5: syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2000000, &(0x7f0000000540)=ANY=[], 0x1, 0x1a9, &(0x7f0000000440)="$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") creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write(r1, &(0x7f0000000100), 0x0) sendfile(r1, r0, 0x0, 0x1ffff) sendfile(r1, r0, 0x0, 0x1554) [ 511.144257][ T9147] loop5: detected capacity change from 0 to 256 [ 511.162951][ T23] audit: type=1326 audit(1675777763.224:310): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9148 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f994c86d0f9 code=0x0 [ 511.257187][ T9154] loop5: detected capacity change from 0 to 256 13:49:33 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{0x1d}, {}]}) 13:49:33 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="440000001800010025bd7000", @ANYRES32=0x0, @ANYBLOB="14"], 0x44}}, 0x0) 13:49:33 executing program 3: syz_genetlink_get_family_id$team(&(0x7f0000000280), 0xffffffffffffffff) r0 = syz_clone(0x42040000, &(0x7f0000000000)="6e86ea166ed36ad0bb033735ac997b74d1c5aaf9a25f8ab5040bdf8082196e3fe28d7dd0649ab4f7ad0200000000000000b8ed6e06547ea4e8861076e1fff298d68a239561a92cc3f300fc8d53ef2142195642cab07e3dfe4ca5d1453f1878f9bf2e33e4bfdcdd522d933e6a67dabbe7e928e5e12f175a7369d8bf5941151bfd1a691584d79e3a2bd79e82aeafa5e40b1403a74e9d1768d119b4948291e14973f03d147ac61ebe1bb77109b3eae9c7adad25ec4bbac6d398dc9b1969d0e947799d86b10840cc70e9ba15cf4c112971", 0xcf, &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)="084aa7c3bf7085f8baf114891110919f88a189469f295aa7be87f45af3f5fd43637c094a4379b5e07b5ce0cc0d49ff62d072d57b8cc9d06d0517bf26e687335a5ebae18c6b0e4655ba995f454430f37ddcdbd9b76c2ea8be90f5ce02a9997447209110c1543f1b1a43c415b37d090f980f0f347f809f88e265f2e2a0dc2f5b08fae2d871f8c1e043affd5cafcf32033be4c9b34d1925316c73b2561d25489c7d92580a4d103f0f") syz_open_procfs$namespace(r0, 0x0) keyctl$KEYCTL_MOVE(0x5, 0x0, 0xfffffffffffffff8, 0x0, 0x0) 13:49:33 executing program 5: syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2000000, &(0x7f0000000540)=ANY=[], 0x1, 0x1a9, &(0x7f0000000440)="$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") creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write(r1, &(0x7f0000000100), 0x0) sendfile(r1, r0, 0x0, 0x1ffff) sendfile(r1, r0, 0x0, 0x1554) 13:49:33 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000000a40)={&(0x7f0000000000), 0x10, &(0x7f0000000a00)={0x0, 0x700}}, 0x20000800) 13:49:33 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0xa, 0x0, 0x0) 13:49:33 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{0x2d}, {}]}) 13:49:33 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) syz_open_procfs(0x0, &(0x7f0000000380)='net/ip6_tables_names\x00') 13:49:33 executing program 4: keyctl$revoke(0xe, 0x0) 13:49:33 executing program 5: syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2000000, &(0x7f0000000540)=ANY=[], 0x1, 0x1a9, &(0x7f0000000440)="$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") creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write(r1, &(0x7f0000000100), 0x0) sendfile(r1, r0, 0x0, 0x1ffff) sendfile(r1, r0, 0x0, 0x1554) 13:49:33 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x62) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000080)=0x2806, 0x4) r1 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e20, @loopback}, 0x10) sendfile(r0, r1, 0x0, 0x101000002) 13:49:33 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00', 0x0}) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback, r2}, 0xc) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000540)={@multicast1, @dev={0xac, 0x14, 0x14, 0x15}}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @remote}, 0x10) [ 521.486594][ T9165] loop5: detected capacity change from 0 to 256 [ 521.579156][ T9181] loop5: detected capacity change from 0 to 256 13:49:43 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) r2 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000080)={@mcast1, 0x0, r1}) 13:49:43 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="300000001e0001"], 0x30}}, 0x0) recvmmsg(r0, &(0x7f0000001740)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, &(0x7f0000001780)={0x0, 0x3938700}) 13:49:43 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001780)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, &(0x7f0000000000)="93", 0x20000001, 0x0, 0x0, 0x0) recvmsg$unix(r0, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000240)=""/4096, 0x7ffff000}, {&(0x7f0000001240)=""/192, 0xc0}, {&(0x7f0000001300)=""/249, 0xf9}], 0x3}, 0x0) ioctl$int_in(r0, 0x0, &(0x7f0000000040)) 13:49:43 executing program 5: syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2000000, &(0x7f0000000540)=ANY=[], 0x1, 0x1a9, &(0x7f0000000440)="$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") creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write(r1, &(0x7f0000000100)="beb12a01000100a2ba", 0x9) sendfile(r1, r0, 0x0, 0x1ffff) sendfile(r1, r0, 0x0, 0x1554) 13:49:43 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000080)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, r1}) 13:49:43 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x62) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000080)=0x2806, 0x4) r1 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e20, @loopback}, 0x10) sendfile(r0, r1, 0x0, 0x101000002) 13:49:43 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x62) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000080)=0x2806, 0x4) r1 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e20, @loopback}, 0x10) sendfile(r0, r1, 0x0, 0x101000002) 13:49:43 executing program 3: r0 = socket(0x1e, 0x1, 0x0) connect$tipc(r0, &(0x7f0000000000)=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, 0x10) write$binfmt_misc(r0, &(0x7f0000000080)=ANY=[], 0x2000011a) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x6c, 0x0, 0x400, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, {0xd}}, {@pci={{0x8}, {0x11}}, {0xd}}]}, 0x6c}}, 0x695bc7125f5e7b96) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x4040800, 0x0, 0x0) 13:49:43 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x62) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000080)=0x2806, 0x4) r1 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e20, @loopback}, 0x10) sendfile(r0, r1, 0x0, 0x101000002) [ 531.881695][ T9194] loop5: detected capacity change from 0 to 256 [ 531.896467][ T9196] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 531.933506][ T9201] ------------[ cut here ]------------ [ 531.933545][ T23] audit: type=1400 audit(1675777783.994:311): avc: denied { connect } for pid=9199 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 531.938972][ T9201] WARNING: CPU: 0 PID: 9201 at lib/iov_iter.c:629 _copy_from_iter+0x190/0x8c0 [ 531.967790][ T9201] Modules linked in: [ 531.971688][ T9201] CPU: 0 PID: 9201 Comm: syz-executor.3 Not tainted 6.2.0-rc7-syzkaller-00011-g05ecb680708a-dirty #0 [ 531.982629][ T9201] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 531.992719][ T9201] RIP: 0010:_copy_from_iter+0x190/0x8c0 [ 531.998392][ T9201] Code: 48 8b 04 25 28 00 00 00 48 3b 44 24 70 0f 85 30 07 00 00 4c 89 e0 48 83 c4 78 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 00 ed 83 ff <0f> 0b 45 31 e4 eb ce e8 f4 ec 83 ff 49 89 dc e9 d2 fe ff ff e8 e7 [ 532.018035][ T9201] RSP: 0018:ffffc90000aa7af0 EFLAGS: 00010283 [ 532.024130][ T9201] RAX: ffffffff81a3ecd0 RBX: 0000000000000000 RCX: 0000000000040000 13:49:44 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000180)=ANY=[], 0x5000) [ 532.032180][ T9201] RDX: ffffc90008369000 RSI: 000000000000036f RDI: 0000000000000370 [ 532.040180][ T9201] RBP: ffff88813d4454d8 R08: ffffffff81a3eb85 R09: 0000000000000000 [ 532.048235][ T9201] R10: 0001ffffffffffff R11: 000188812a897000 R12: 0000000000000000 [ 532.056228][ T9201] R13: ffff88812a8970d8 R14: 0000000000000000 R15: ffffc90000aa7db8 [ 532.064232][ T9201] FS: 00007f2b71caf700(0000) GS:ffff888237c00000(0000) knlGS:0000000000000000 [ 532.073219][ T9201] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 13:49:44 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = memfd_create(&(0x7f0000000300)='#}\x04\xe4\xfc\x1e\xff~\xb1\xe0\xa5\x9d\xc8\xca#\'\x12xY!\xa4=,\x1a&\xd1\x19\xde\x1b+\xb2\x1aE\x10x\xd5\x04i}\x03\x00a\x0e\xe6\x995b\r\x00\x00\x00\x00\x00\x00\x8e\x96\xb7=\xb9OmILO\x8d\x00\x00\x00\x00\x00\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00q\xf6\x0eVcG\xfa\x96\xdb\x19$\x81S\xbe\x93\xa0l\xf9S\xa0tz\x19%\xfd[3\x84A\x95\xfd\x02\x00\x99\xc0\xb3\xcbQ\xc4\x9f\xc6F\xf1s\xe9\xc7\x12K S\xa17Ky<\x7fV\x02\xd9\x1a&\x8dOfP\x80\x10\x16O\xf9\xc4\xd1\xa8\\\xf0\x1e\xab\a\xfd\xf1\x0f\xc7\xac\f\xbeh\xe8\xd0\xf9\xe1\x15\x9b\xd9\xcb\xb8\xdb\xba\nVo\xc8\x06\xba\xf3\xe9\xc8\xbfh\x0f\"\xc7\x86\x17[D\xaa\b\x9c1 Z\f\xc7\xd4Z(\xb3\x83p2\xc04:8\x9c\x93\xe6\xa6z\xb3\xf0\x1b\x14\"\x1d\x17\xcd~x\xf7\x92K]y\xee\xd2\xb1\x1b\xb4/;\vC\xe0\x05\xbe\xd3\x12~A\xc0q\xd9\x87U\xccu>\x01\xd7N\xa8\x9f\\\xff\xfcm\xecD\x1b\x90\xbb\xfc\xd52\x98P=6\xb5\xb6F\x1c\xf7}\x906\xcf\x17h\t\xea\xce\xd5!k|\xc3\xaf\xbe\xb5\x06;\x90\xc5\xf9:\x19\"\xf8\xa5\xcf\x8c\",\x82\x1d\r\x06\x96C\xc9\xfb`\xf1\xd7 \t\"B,\xb4ED@:PR\xa7\x17;\xdac\xce\x841\xd2B\xf2U\x95\xe8\x93\xd0\xae\'aZ\xedQ\xe4\x11\xae\xbc\xf8[\xac\xb6\xa2{oH\xf07\x11\xea\x1c%\x96\xa0U\x18P', 0x0) ftruncate(r1, 0x40001) sendfile(r0, r1, 0x0, 0xffe4) ftruncate(r1, 0x3) [ 532.079826][ T9201] CR2: 0000000020000000 CR3: 000000013d404000 CR4: 00000000003506f0 [ 532.087852][ T9201] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 532.095890][ T9201] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 532.103900][ T9201] Call Trace: [ 532.107180][ T9201] [ 532.110155][ T9201] ? tipc_msg_build+0xc2/0x8b0 [ 532.114974][ T9201] ? __kmalloc_node_track_caller+0x96/0x1a0 [ 532.120971][ T9201] ? __build_skb_around+0x196/0x1f0 [ 532.126210][ T9201] ? tipc_msg_build+0xc2/0x8b0 [ 532.131069][ T9201] ? __alloc_skb+0x27a/0x330 [ 532.135689][ T9201] ? skb_put+0xba/0xf0 [ 532.139795][ T9201] ? __check_object_size+0x95/0x4e0 [ 532.145061][ T9201] tipc_msg_build+0x2d3/0x8b0 [ 532.149798][ T9201] ? __rcu_read_unlock+0x4d/0x70 [ 532.154768][ T9201] ? tipc_node_find+0xf0/0x1d0 [ 532.159567][ T9201] __tipc_sendmsg+0x14e0/0x1c30 [ 532.164499][ T9201] ? wait_woken+0x60/0x60 [ 532.169021][ T9201] ? lock_sock_nested+0x10e/0x130 [ 532.174120][ T9201] ? __this_cpu_preempt_check+0x13/0x20 [ 532.179712][ T9201] ? __local_bh_enable_ip+0x58/0x80 [ 532.184949][ T9201] tipc_connect+0x33f/0x3e0 [ 532.189560][ T9201] ? release_sock+0x108/0x110 [ 532.194320][ T9201] ? tipc_bind+0x190/0x190 [ 532.198818][ T9201] __sys_connect+0x19b/0x1b0 [ 532.203485][ T9201] __x64_sys_connect+0x41/0x50 [ 532.208328][ T9201] do_syscall_64+0x41/0xc0 [ 532.212804][ T9201] ? syscall_exit_to_user_mode+0x26/0x140 [ 532.218540][ T9201] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 532.224486][ T9201] RIP: 0033:0x7f2b7293c0f9 [ 532.228958][ T9201] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 532.248761][ T9201] RSP: 002b:00007f2b71caf168 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 532.257317][ T9201] RAX: ffffffffffffffda RBX: 00007f2b72a5bf80 RCX: 00007f2b7293c0f9 [ 532.265340][ T9201] RDX: 0000000000000010 RSI: 0000000020000000 RDI: 0000000000000003 [ 532.273335][ T9201] RBP: 00007f2b72997ae9 R08: 0000000000000000 R09: 0000000000000000 13:49:44 executing program 2: r0 = socket(0x1e, 0x1, 0x0) connect$tipc(r0, &(0x7f0000000000)=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, 0x10) write$binfmt_misc(r0, &(0x7f0000000080)=ANY=[], 0x2000011a) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000180)=@ipv6_deladdr={0x18, 0x15, 0x8, 0x0, 0x25dfdbfb}, 0x18}}, 0x0) [ 532.281317][ T9201] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 532.289346][ T9201] R13: 00007ffcde2fab1f R14: 00007f2b71caf300 R15: 0000000000022000 [ 532.297357][ T9201] [ 532.300381][ T9201] ---[ end trace 0000000000000000 ]--- [ 532.347524][ T218] tipc: Subscription rejected, illegal request 13:49:48 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000380)='./file1\x00', 0x141842, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, 0x0) 13:49:48 executing program 4: open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 13:49:48 executing program 1: pipe2$9p(0x0, 0x80180) 13:49:48 executing program 2: ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, 0x0) io_setup(0x1, &(0x7f0000000140)) 13:49:48 executing program 0: sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000d40)) connect$vsock_stream(r1, &(0x7f0000000080)={0x28, 0x0, 0x0, @my=0x1}, 0x10) listen(r1, 0x0) ppoll(&(0x7f00000000c0)=[{r1, 0x0, 0x64}], 0x1, &(0x7f00000002c0)={0x0, r0+10000000}, 0x0, 0x0) 13:49:48 executing program 5: syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2000000, &(0x7f0000000540)=ANY=[], 0x1, 0x1a9, &(0x7f0000000440)="$eJzs3TFrE2EcBvCnNmpwSQYncThwcQpNP0GLVBADgnKDToptQXqhYCGgg3Xz+/khnO3WQTixJ0lbzsGhnvR+vyUPvHngfZd7p/vf6/vzg93Do/2Tk28ZDtcy2MpWTtcyzo2sp/E5AMB1clrX+V43ut4LAPBvuP8BoH/c/wDQP+5/AOifFy9fPd2ezXaeF8UwmX9ZlIuy+W3Wt/fzLlX2spFRfiT1UpMfP5ntbBRnxinnx7/7x4ty/WJ/mlHG7f1p0y8u9m/mzvn+Zka5297fbO3fysMH5/qTjPL1bQ5TZTe/uqv+p2lRPHo2u9S/ffY/AAAAAAAAAAAAAAAAAAAAAAC4CpNiqXV+z2Typ/Wm/xfzgS7N1xnk3qDbswMAAAAAAAAAAAAAAAAAAMD/4ujDx4M3VbX3XhAEYRm6fjIBAAAAAAAAAAAAAAAAAED/rF767XonAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAANCd1ff/ry50fUYAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPgZAAD//yusq24=") creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write(r1, &(0x7f0000000100)="beb12a01000100a2ba", 0x9) sendfile(r1, r0, 0x0, 0x1ffff) sendfile(r1, r0, 0x0, 0x1554) 13:49:48 executing program 1: r0 = open$dir(&(0x7f0000000140)='./file0\x00', 0x40040, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0046686, 0x0) 13:49:48 executing program 3: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x200100, 0x0) faccessat(r0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0xb, 0xffffffffffffffff) io_setup(0x1, &(0x7f0000000140)=0x0) io_cancel(r1, 0x0, &(0x7f00000002c0)) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000340)=""/36, 0x24, 0x0, 0x0, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000d00)=""/49, 0x31, 0x0, &(0x7f0000000d40)=@abs={0x1, 0x0, 0x4e20}, 0x6e) process_madvise(0xffffffffffffffff, 0x0, 0x0, 0x9, 0x0) 13:49:48 executing program 4: pipe2$watch_queue(0x0, 0x80) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000080)={0x28, 0x0, 0x0, @my=0x1}, 0x10) listen(r1, 0x0) ppoll(&(0x7f00000000c0)=[{r1, 0x0, 0x64}], 0x1, &(0x7f00000002c0)={0x0, r0+10000000}, 0x0, 0x0) [ 536.050533][ T9224] loop5: detected capacity change from 0 to 256 13:49:48 executing program 2: clock_getres(0x0, &(0x7f0000001c40)) 13:49:48 executing program 1: mmap$binder(&(0x7f0000ff7000/0x6000)=nil, 0x6000, 0x1, 0x11, 0xffffffffffffffff, 0x0) 13:49:48 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000380)='./file1\x00', 0x141842, 0x0) r1 = open$dir(&(0x7f0000008440)='.\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0}) utimensat(r1, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100)={{r2}, {0x0, 0x2710}}, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000000)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) 13:49:48 executing program 1: pipe2$9p(&(0x7f0000000000), 0x0) write$P9_RMKNOD(0xffffffffffffffff, 0x0, 0x0) [ 536.088980][ T23] audit: type=1400 audit(1675777788.144:312): avc: denied { listen } for pid=9230 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 13:49:52 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c0000005e000100"/17, @ANYRES32], 0x1c}}, 0x0) 13:49:52 executing program 0: ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, 0x0) io_setup(0x0, &(0x7f0000000140)) 13:49:52 executing program 2: r0 = getpid() sched_rr_get_interval(r0, &(0x7f0000000940)) 13:49:52 executing program 3: syz_genetlink_get_family_id$nl80211(&(0x7f0000000f00), 0xffffffffffffffff) 13:49:52 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003740)={0x11, 0x4, &(0x7f0000000000)=@framed={{}, [@jmp={0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x10}]}, &(0x7f0000002680)='GPL\x00', 0x4, 0xff2, &(0x7f00000026c0)=""/4082, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:49:52 executing program 5: syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2000000, &(0x7f0000000540)=ANY=[], 0x1, 0x1a9, &(0x7f0000000440)="$eJzs3TFrE2EcBvCnNmpwSQYncThwcQpNP0GLVBADgnKDToptQXqhYCGgg3Xz+/khnO3WQTixJ0lbzsGhnvR+vyUPvHngfZd7p/vf6/vzg93Do/2Tk28ZDtcy2MpWTtcyzo2sp/E5AMB1clrX+V43ut4LAPBvuP8BoH/c/wDQP+5/AOifFy9fPd2ezXaeF8UwmX9ZlIuy+W3Wt/fzLlX2spFRfiT1UpMfP5ntbBRnxinnx7/7x4ty/WJ/mlHG7f1p0y8u9m/mzvn+Zka5297fbO3fysMH5/qTjPL1bQ5TZTe/uqv+p2lRPHo2u9S/ffY/AAAAAAAAAAAAAAAAAAAAAAC4CpNiqXV+z2Typ/Wm/xfzgS7N1xnk3qDbswMAAAAAAAAAAAAAAAAAAMD/4ujDx4M3VbX3XhAEYRm6fjIBAAAAAAAAAAAAAAAAAED/rF767XonAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAANCd1ff/ry50fUYAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPgZAAD//yusq24=") creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write(r1, &(0x7f0000000100), 0x0) sendfile(r1, r0, 0x0, 0x1ffff) sendfile(r1, r0, 0x0, 0x1554) 13:49:52 executing program 3: mmap$binder(&(0x7f0000ff7000/0x6000)=nil, 0x6000, 0x1, 0x11, 0xffffffffffffffff, 0x9c) 13:49:52 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000380)='./file1\x00', 0x141842, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x6f68}) 13:49:52 executing program 2: rt_sigaction(0x36, 0x0, &(0x7f0000001680)={0x0, 0x0, 0x0}, 0x8, &(0x7f00000016c0)) 13:49:52 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003740)={0x11, 0x4, &(0x7f0000001340)=@framed={{0x18, 0x0, 0x0, 0x0, 0x300}, [@generic={0x36, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000002680)='GPL\x00', 0x3, 0xfe5, &(0x7f0000000240)=""/4069, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:49:52 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0xa, [@volatile={0x0, 0x0, 0x0, 0x9, 0x2}, @func={0x8}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000000280)=""/243, 0x3a, 0xf3, 0x1}, 0x20) 13:49:52 executing program 5: syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2000000, &(0x7f0000000540)=ANY=[], 0x1, 0x1a9, &(0x7f0000000440)="$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") creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write(r1, &(0x7f0000000100), 0x0) sendfile(r1, r0, 0x0, 0x1ffff) sendfile(r1, r0, 0x0, 0x1554) 13:49:52 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000580)={0x6, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1000000}, [@generic={0x34, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f00000003c0)='GPL\x00', 0x2, 0xd2, &(0x7f0000000400)=""/210, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 540.481683][ T9255] loop5: detected capacity change from 0 to 256 [ 540.573065][ T9270] loop5: detected capacity change from 0 to 256 13:49:56 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000780)={&(0x7f0000000580)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x3, 0x0, 0x0, [{}]}]}}, &(0x7f0000000680)=""/232, 0x32, 0xe8, 0x1}, 0x20) 13:49:56 executing program 5: syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2000000, &(0x7f0000000540)=ANY=[], 0x1, 0x1a9, &(0x7f0000000440)="$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") creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write(r1, &(0x7f0000000100), 0x0) sendfile(r1, r0, 0x0, 0x1ffff) sendfile(r1, r0, 0x0, 0x1554) 13:49:56 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000840)={0x6, 0x1, &(0x7f0000000000)=@raw=[@ldst={0x2}], &(0x7f0000000040)='GPL\x00', 0x6, 0xe4, &(0x7f0000000700)=""/228, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:49:56 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003740)={0x11, 0x4, &(0x7f0000000000)=@framed={{}, [@jmp={0x5, 0x0, 0x8}]}, &(0x7f0000002680)='GPL\x00', 0x4, 0xff2, &(0x7f00000026c0)=""/4082, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:49:56 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@func={0x3, 0x2}]}, {0x0, [0x0, 0x0, 0x5f, 0x30]}}, &(0x7f0000000100)=""/238, 0x2a, 0xee, 0x1}, 0x20) 13:49:56 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000002280)=[{&(0x7f0000000e40)='3', 0x1}], 0x1}, 0x0) recvmsg(r1, &(0x7f0000004140)={0x0, 0x0, &(0x7f0000004080)=[{&(0x7f0000003b00)=""/63, 0x3f}], 0x1}, 0xf0ff7f) 13:49:56 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003740)={0x11, 0x4, &(0x7f0000000000)=@framed={{}, [@jmp={0x4}]}, &(0x7f0000002680)='GPL\x00', 0x4, 0xff2, &(0x7f00000026c0)=""/4082, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:49:56 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000001c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000001340)='sched_switch\x00', r1}, 0x10) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r0, &(0x7f0000000000)={[{0x0, 'cpuset'}]}, 0x8) 13:49:56 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000580)={0x6, 0x6, &(0x7f0000000040)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @exit, @exit]}, &(0x7f00000003c0)='GPL\x00', 0x2, 0xd2, &(0x7f0000000400)=""/210, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:49:56 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003740)={0x11, 0x4, &(0x7f0000000000)=@framed={{}, [@jmp={0x5, 0x0, 0x2}]}, &(0x7f0000002680)='GPL\x00', 0x4, 0xff2, &(0x7f00000026c0)=""/4082, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:49:56 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000010100069119200000000002d0000000000000095000b0000000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) 13:49:56 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003740)={0x11, 0x5, &(0x7f0000000040)=@framed={{}, [@generic={0xb6}, @generic={0x1f}]}, &(0x7f0000002680)='GPL\x00', 0x4, 0xff2, &(0x7f0000000240)=""/4082, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:49:56 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003740)={0x11, 0x3, &(0x7f0000000200)=@framed, &(0x7f0000002680)='GPL\x00', 0x4, 0xff2, &(0x7f00000026c0)=""/4082, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r0, 0x2, 0x0}, 0x10) [ 544.684902][ T23] audit: type=1400 audit(1675777796.744:313): avc: denied { read } for pid=9279 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 544.689621][ T9278] loop5: detected capacity change from 0 to 256 13:50:00 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFINDEX(r0, 0x400454da, 0x0) 13:50:00 executing program 2: socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f00000004c0)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) 13:50:00 executing program 5: syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2000000, &(0x7f0000000540)=ANY=[], 0x1, 0x1a9, &(0x7f0000000440)="$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") creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write(r1, &(0x7f0000000100)="beb12a0100", 0x5) sendfile(r1, r0, 0x0, 0x1ffff) sendfile(r1, r0, 0x0, 0x1554) 13:50:00 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000840)={0x9, 0x3, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:50:00 executing program 1: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) recvmsg(r1, &(0x7f0000004140)={0x0, 0x0, &(0x7f0000004080)=[{&(0x7f0000003b00)=""/63, 0x3f}], 0x1}, 0x0) 13:50:00 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x541b, 0x0) 13:50:01 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003740)={0x11, 0x3, &(0x7f0000000200)=@framed, &(0x7f0000002680)='GPL\x00', 0x4, 0xff2, &(0x7f00000026c0)=""/4082, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r0, 0xe0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) 13:50:01 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003740)={0x11, 0x4, &(0x7f0000000000)=@framed={{}, [@jmp={0x5, 0x0, 0x3}]}, &(0x7f0000002680)='GPL\x00', 0x4, 0xff2, &(0x7f00000026c0)=""/4082, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:50:01 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003740)={0x11, 0x3, &(0x7f0000000200)=@framed, &(0x7f0000002680)='GPL\x00', 0x4, 0xff2, &(0x7f00000026c0)=""/4082, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000680)={0x6, 0x1, &(0x7f0000000700)=@raw=[@exit], &(0x7f0000000040)='syzkaller\x00', 0x5, 0xb8, &(0x7f0000000080)=""/184, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000640), 0x10}, 0x80) 13:50:01 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000840)={0x9, 0x3, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:50:01 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000010100063110800000000002d0000000000000095000b0000000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) [ 548.920943][ T9306] loop5: detected capacity change from 0 to 256 13:50:01 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003740)={0x11, 0x3, &(0x7f0000000200)=@framed, &(0x7f0000002680)='GPL\x00', 0x4, 0xff2, &(0x7f00000026c0)=""/4082, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r0, 0xe0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) 13:50:05 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/145, 0x91}], 0x1}, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) 13:50:05 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003740)={0x11, 0x4, &(0x7f0000000000)=@framed={{}, [@jmp={0x5, 0x0, 0xc}]}, &(0x7f0000002680)='GPL\x00', 0x4, 0xff2, &(0x7f00000026c0)=""/4082, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:50:05 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000002280), 0x32}, 0x0) 13:50:05 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003740)={0x11, 0x4, &(0x7f0000000200)=@framed={{}, [@kfunc]}, &(0x7f0000002680)='GPL\x00', 0x4, 0xff2, &(0x7f00000026c0)=""/4082, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:50:05 executing program 5: syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2000000, &(0x7f0000000540)=ANY=[], 0x1, 0x1a9, &(0x7f0000000440)="$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") creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write(r1, &(0x7f0000000100)="be", 0x1) sendfile(r1, r0, 0x0, 0x1ffff) sendfile(r1, r0, 0x0, 0x1554) 13:50:05 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x40087602, 0x0) 13:50:05 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003740)={0x11, 0x3, &(0x7f0000000200)=@framed, &(0x7f0000002680)='GPL\x00', 0x4, 0xff2, &(0x7f00000026c0)=""/4082, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='virtio_transport_alloc_pkt\x00', r0}, 0x10) 13:50:05 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003740)={0x11, 0x6, &(0x7f0000000000)=@framed={{}, [@initr0, @jmp]}, &(0x7f0000002680)='GPL\x00', 0x4, 0xff2, &(0x7f00000026c0)=""/4082, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:50:05 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003740)={0x1a, 0x3, &(0x7f0000000200)=@framed, &(0x7f0000002680)='GPL\x00', 0x4, 0xff2, &(0x7f00000026c0)=""/4082, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:50:05 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0x17, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x0, 0xa}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:50:05 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000840)={0x9, 0x3, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x2}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:50:05 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003740)={0x11, 0x3, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x300}}, &(0x7f0000002680)='GPL\x00', 0x4, 0xff2, &(0x7f00000026c0)=""/4082, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='virtio_transport_alloc_pkt\x00', r0}, 0x10) [ 553.090010][ T9336] loop5: detected capacity change from 0 to 256 [ 553.100656][ T23] audit: type=1400 audit(1675777805.154:314): avc: denied { setattr } for pid=9335 comm="syz-executor.1" path="/dev/net/tun" dev="devtmpfs" ino=115 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 553.450164][ T9336] ================================================================== [ 553.458275][ T9336] BUG: KCSAN: data-race in __writeback_single_inode / xas_set_mark [ 553.466159][ T9336] [ 553.468463][ T9336] write to 0xffff88810aeda21c of 4 bytes by task 9351 on cpu 1: [ 553.476071][ T9336] xas_set_mark+0x131/0x140 [ 553.480556][ T9336] __folio_start_writeback+0x23f/0x4b0 [ 553.485996][ T9336] set_page_writeback+0x46/0xf0 [ 553.490830][ T9336] __mpage_writepage+0x99c/0xd60 [ 553.495746][ T9336] write_cache_pages+0x468/0xaa0 [ 553.500661][ T9336] mpage_writepages+0x72/0xe0 [ 553.505321][ T9336] fat_writepages+0x24/0x30 [ 553.509805][ T9336] do_writepages+0x1c7/0x330 [ 553.514376][ T9336] filemap_fdatawrite_wbc+0xdb/0xf0 [ 553.519572][ T9336] file_write_and_wait_range+0xfa/0x190 [ 553.525099][ T9336] __generic_file_fsync+0x4c/0x140 [ 553.530196][ T9336] fat_file_fsync+0x4c/0x100 [ 553.534766][ T9336] vfs_fsync_range+0x10b/0x120 [ 553.539682][ T9336] generic_file_write_iter+0x191/0x1c0 [ 553.545119][ T9336] do_iter_write+0x418/0x700 [ 553.549692][ T9336] vfs_iter_write+0x50/0x70 [ 553.554176][ T9336] iter_file_splice_write+0x42b/0x7b0 [ 553.559526][ T9336] direct_splice_actor+0x84/0xa0 [ 553.564460][ T9336] splice_direct_to_actor+0x2ee/0x5f0 [ 553.569826][ T9336] do_splice_direct+0x104/0x180 [ 553.574662][ T9336] do_sendfile+0x3b8/0x950 [ 553.579066][ T9336] __x64_sys_sendfile64+0x110/0x150 [ 553.584252][ T9336] do_syscall_64+0x41/0xc0 [ 553.588662][ T9336] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 553.594538][ T9336] [ 553.596844][ T9336] read to 0xffff88810aeda21c of 4 bytes by task 9336 on cpu 0: [ 553.604364][ T9336] __writeback_single_inode+0x21d/0x860 [ 553.609900][ T9336] writeback_single_inode+0x12f/0x4a0 [ 553.615254][ T9336] sync_inode_metadata+0x56/0x80 [ 553.620191][ T9336] __generic_file_fsync+0xf9/0x140 [ 553.625287][ T9336] fat_file_fsync+0x4c/0x100 [ 553.629858][ T9336] vfs_fsync_range+0x10b/0x120 [ 553.634603][ T9336] generic_file_write_iter+0x191/0x1c0 [ 553.640052][ T9336] do_iter_write+0x418/0x700 [ 553.644636][ T9336] vfs_iter_write+0x50/0x70 [ 553.649121][ T9336] iter_file_splice_write+0x42b/0x7b0 [ 553.654472][ T9336] direct_splice_actor+0x84/0xa0 [ 553.659401][ T9336] splice_direct_to_actor+0x2ee/0x5f0 [ 553.664765][ T9336] do_splice_direct+0x104/0x180 [ 553.669602][ T9336] do_sendfile+0x3b8/0x950 [ 553.673999][ T9336] __x64_sys_sendfile64+0x110/0x150 [ 553.679180][ T9336] do_syscall_64+0x41/0xc0 [ 553.683589][ T9336] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 553.689477][ T9336] [ 553.691777][ T9336] value changed: 0x28000021 -> 0x10000021 [ 553.697478][ T9336] [ 553.699787][ T9336] Reported by Kernel Concurrency Sanitizer on: [ 553.705934][ T9336] CPU: 0 PID: 9336 Comm: syz-executor.5 Tainted: G W 6.2.0-rc7-syzkaller-00011-g05ecb680708a-dirty #0 [ 553.718232][ T9336] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 553.728359][ T9336] ================================================================== [ 553.739648][ T23] audit: type=1400 audit(1675777805.794:315): avc: denied { rename } for pid=2719 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 553.762499][ T23] audit: type=1400 audit(1675777805.794:316): avc: denied { unlink } for pid=2719 comm="syslogd" name="messages.0" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 553.784988][ T23] audit: type=1400 audit(1675777805.794:317): avc: denied { create } for pid=2719 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 13:50:11 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003740)={0x11, 0x3, &(0x7f0000000200)=@framed, &(0x7f0000002680)='GPL\x00', 0x4, 0xff2, &(0x7f00000026c0)=""/4082, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000280)={r0, 0x1}, 0xc) 13:50:11 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002380)={&(0x7f0000001f00)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union]}}, &(0x7f0000002180)=""/211, 0x26, 0xd3, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={r0, 0x20, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1c, 0x2, &(0x7f0000001580)=@raw=[@initr0], &(0x7f0000001600)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1d, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r1}, 0x80) 13:50:11 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@func={0x3, 0x2}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000000100)=""/238, 0x29, 0xee, 0x1}, 0x20) 13:50:11 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x2, &(0x7f0000000040)) 13:50:11 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003740)={0x11, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000000000000000000000c07f397ba810ebfb00000095"], &(0x7f0000002680)='GPL\x00', 0x4, 0xff2, &(0x7f00000026c0)=""/4082, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:50:11 executing program 5: syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x2000000, &(0x7f0000000540)=ANY=[], 0x1, 0x1a9, &(0x7f0000000440)="$eJzs3TFrE2EcBvCnNmpwSQYncThwcQpNP0GLVBADgnKDToptQXqhYCGgg3Xz+/khnO3WQTixJ0lbzsGhnvR+vyUPvHngfZd7p/vf6/vzg93Do/2Tk28ZDtcy2MpWTtcyzo2sp/E5AMB1clrX+V43ut4LAPBvuP8BoH/c/wDQP+5/AOifFy9fPd2ezXaeF8UwmX9ZlIuy+W3Wt/fzLlX2spFRfiT1UpMfP5ntbBRnxinnx7/7x4ty/WJ/mlHG7f1p0y8u9m/mzvn+Zka5297fbO3fysMH5/qTjPL1bQ5TZTe/uqv+p2lRPHo2u9S/ffY/AAAAAAAAAAAAAAAAAAAAAAC4CpNiqXV+z2Typ/Wm/xfzgS7N1xnk3qDbswMAAAAAAAAAAAAAAAAAAMD/4ujDx4M3VbX3XhAEYRm6fjIBAAAAAAAAAAAAAAAAAED/rF767XonAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAANCd1ff/ry50fUYAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPgZAAD//yusq24=") creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write(r1, &(0x7f0000000100)="be", 0x1) sendfile(r1, r0, 0x0, 0x1ffff) sendfile(r1, r0, 0x0, 0x1554) 13:50:11 executing program 1: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000002280)=[{&(0x7f0000000e40)='3', 0x1}], 0x1}, 0x0) recvmsg(r1, &(0x7f0000004140)={0x0, 0x0, &(0x7f0000004080)=[{0x0}, {&(0x7f0000003b00)=""/63, 0x3f}], 0x2, 0x0, 0xf0ffffff7f0000}, 0x0) 13:50:11 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000580)={0x6, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x2}, [@generic={0x34}]}, &(0x7f00000003c0)='GPL\x00', 0x2, 0xd2, &(0x7f0000000400)=""/210, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:50:11 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000580)={0x6, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3c000000}, [@generic={0x34, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f00000003c0)='GPL\x00', 0x2, 0xd2, &(0x7f0000000400)=""/210, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 13:50:11 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000010100069114400000000002d0000000000000095000b0000000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) 13:50:11 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x4b47, 0x0) 13:50:11 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003740)={0x11, 0x3, &(0x7f0000000200)=@framed, &(0x7f0000002680)='GPL\x00', 0x4, 0xff2, &(0x7f00000026c0)=""/4082, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r0, 0xe0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78, 0x8, 0x0, 0x0}}, 0x10) [ 559.421208][ T9362] loop5: detected capacity change from 0 to 256 [ 559.776751][ T9378] ================================================================== [ 559.784853][ T9378] BUG: KCSAN: data-race in __writeback_single_inode / xas_set_mark [ 559.792733][ T9378] [ 559.795033][ T9378] write to 0xffff88810aea381c of 4 bytes by task 9362 on cpu 0: [ 559.802675][ T9378] xas_set_mark+0x131/0x140 [ 559.807163][ T9378] __folio_start_writeback+0x23f/0x4b0 [ 559.812602][ T9378] set_page_writeback+0x46/0xf0 [ 559.817446][ T9378] __mpage_writepage+0x99c/0xd60 [ 559.822363][ T9378] write_cache_pages+0x468/0xaa0 [ 559.827280][ T9378] mpage_writepages+0x72/0xe0 [ 559.831940][ T9378] fat_writepages+0x24/0x30 [ 559.836428][ T9378] do_writepages+0x1c7/0x330 [ 559.841011][ T9378] filemap_fdatawrite_wbc+0xdb/0xf0 [ 559.846201][ T9378] file_write_and_wait_range+0xfa/0x190 [ 559.851741][ T9378] __generic_file_fsync+0x4c/0x140 [ 559.856852][ T9378] fat_file_fsync+0x4c/0x100 [ 559.861432][ T9378] vfs_fsync_range+0x10b/0x120 [ 559.866191][ T9378] generic_file_write_iter+0x191/0x1c0 [ 559.871631][ T9378] do_iter_write+0x418/0x700 [ 559.876291][ T9378] vfs_iter_write+0x50/0x70 [ 559.880788][ T9378] iter_file_splice_write+0x42b/0x7b0 [ 559.886148][ T9378] direct_splice_actor+0x84/0xa0 [ 559.891073][ T9378] splice_direct_to_actor+0x2ee/0x5f0 [ 559.896426][ T9378] do_splice_direct+0x104/0x180 [ 559.901255][ T9378] do_sendfile+0x3b8/0x950 [ 559.906010][ T9378] __x64_sys_sendfile64+0x110/0x150 [ 559.911190][ T9378] do_syscall_64+0x41/0xc0 [ 559.915586][ T9378] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 559.921471][ T9378] [ 559.923785][ T9378] read to 0xffff88810aea381c of 4 bytes by task 9378 on cpu 1: [ 559.931388][ T9378] __writeback_single_inode+0x21d/0x860 [ 559.936913][ T9378] writeback_single_inode+0x12f/0x4a0 [ 559.942266][ T9378] sync_inode_metadata+0x56/0x80 [ 559.947181][ T9378] __generic_file_fsync+0xf9/0x140 [ 559.952287][ T9378] fat_file_fsync+0x4c/0x100 [ 559.956948][ T9378] vfs_fsync_range+0x10b/0x120 [ 559.961691][ T9378] generic_file_write_iter+0x191/0x1c0 [ 559.967126][ T9378] do_iter_write+0x418/0x700 [ 559.971694][ T9378] vfs_iter_write+0x50/0x70 [ 559.976187][ T9378] iter_file_splice_write+0x42b/0x7b0 [ 559.981539][ T9378] direct_splice_actor+0x84/0xa0 [ 559.986456][ T9378] splice_direct_to_actor+0x2ee/0x5f0 [ 559.991807][ T9378] do_splice_direct+0x104/0x180 [ 559.996637][ T9378] do_sendfile+0x3b8/0x950 [ 560.001054][ T9378] __x64_sys_sendfile64+0x110/0x150 [ 560.006233][ T9378] do_syscall_64+0x41/0xc0 [ 560.010634][ T9378] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 560.016509][ T9378] [ 560.018812][ T9378] value changed: 0x28000021 -> 0x00000021 [ 560.024503][ T9378] [ 560.026807][ T9378] Reported by Kernel Concurrency Sanitizer on: [ 560.032943][ T9378] CPU: 1 PID: 9378 Comm: syz-executor.5 Tainted: G W 6.2.0-rc7-syzkaller-00011-g05ecb680708a-dirty #0 [ 560.045263][ T9378] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 560.055302][ T9378] ==================================================================