[ 18.454763][ T28] audit: type=1400 audit(1714682534.074:81): avc: denied { read } for pid=2766 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 Warning: Permanently added '10.128.0.89' (ED25519) to the list of known hosts. 2024/05/02 20:42:16 fuzzer started 2024/05/02 20:42:16 dialing manager at 10.128.0.163:30015 [ 21.125911][ T28] audit: type=1400 audit(1714682536.744:82): avc: denied { node_bind } for pid=3073 comm="syz-fuzzer" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 21.146479][ T28] audit: type=1400 audit(1714682536.744:83): avc: denied { name_bind } for pid=3073 comm="syz-fuzzer" src=6060 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 21.178578][ T28] audit: type=1400 audit(1714682536.794:84): avc: denied { mounton } for pid=3082 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 21.179621][ T3082] cgroup: Unknown subsys name 'net' [ 21.201361][ T28] audit: type=1400 audit(1714682536.794:85): avc: denied { mount } for pid=3082 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.229038][ T28] audit: type=1400 audit(1714682536.824:86): avc: denied { unmount } for pid=3082 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.395671][ T3082] cgroup: Unknown subsys name 'rlimit' [ 21.515840][ T28] audit: type=1400 audit(1714682537.134:87): avc: denied { mounton } for pid=3082 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 21.540631][ T28] audit: type=1400 audit(1714682537.134:88): avc: denied { mount } for pid=3082 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 21.563835][ T28] audit: type=1400 audit(1714682537.134:89): avc: denied { create } for pid=3082 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 21.572028][ T3084] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 21.584239][ T28] audit: type=1400 audit(1714682537.134:90): avc: denied { write } for pid=3082 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 2024/05/02 20:42:17 code coverage: enabled 2024/05/02 20:42:17 comparison tracing: enabled 2024/05/02 20:42:17 extra coverage: enabled 2024/05/02 20:42:17 delay kcov mmap: enabled 2024/05/02 20:42:17 setuid sandbox: enabled 2024/05/02 20:42:17 namespace sandbox: enabled 2024/05/02 20:42:17 Android sandbox: enabled 2024/05/02 20:42:17 fault injection: enabled 2024/05/02 20:42:17 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2024/05/02 20:42:17 net packet injection: enabled 2024/05/02 20:42:17 net device setup: enabled 2024/05/02 20:42:17 concurrency sanitizer: enabled 2024/05/02 20:42:17 devlink PCI setup: PCI device 0000:00:10.0 is not available 2024/05/02 20:42:17 NIC VF setup: PCI device 0000:00:11.0 is not available 2024/05/02 20:42:17 USB emulation: /dev/raw-gadget does not exist 2024/05/02 20:42:17 hci packet injection: /dev/vhci does not exist 2024/05/02 20:42:17 wifi device emulation: /sys/class/mac80211_hwsim/ does not exist 2024/05/02 20:42:17 802.15.4 emulation: enabled 2024/05/02 20:42:17 swap file: enabled 2024/05/02 20:42:17 starting 5 executor processes [ 21.613463][ T28] audit: type=1400 audit(1714682537.134:91): avc: denied { read } for pid=3082 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 21.641408][ T3082] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 34.446268][ T28] kauditd_printk_skb: 30 callbacks suppressed [ 34.446278][ T28] audit: type=1400 audit(1714682550.064:122): avc: denied { append } for pid=2766 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 34.474597][ T28] audit: type=1400 audit(1714682550.074:123): avc: denied { open } for pid=2766 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 34.496996][ T28] audit: type=1400 audit(1714682550.074:124): avc: denied { getattr } for pid=2766 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 71.758152][ T3769] chnl_net:caif_netlink_parms(): no params data found [ 71.833517][ T3775] chnl_net:caif_netlink_parms(): no params data found [ 71.876166][ T3769] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.883217][ T3769] bridge0: port 1(bridge_slave_0) entered disabled state [ 71.890508][ T3769] bridge_slave_0: entered allmulticast mode [ 71.896972][ T3769] bridge_slave_0: entered promiscuous mode [ 71.903546][ T3769] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.910712][ T3769] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.917800][ T3769] bridge_slave_1: entered allmulticast mode [ 71.924036][ T3769] bridge_slave_1: entered promiscuous mode [ 71.952999][ T3769] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 71.963078][ T3769] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 72.009355][ T3775] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.016479][ T3775] bridge0: port 1(bridge_slave_0) entered disabled state [ 72.023620][ T3775] bridge_slave_0: entered allmulticast mode [ 72.030185][ T3775] bridge_slave_0: entered promiscuous mode [ 72.055851][ T3769] team0: Port device team_slave_0 added [ 72.061983][ T3769] team0: Port device team_slave_1 added [ 72.072321][ T3775] bridge0: port 2(bridge_slave_1) entered blocking state [ 72.079379][ T3775] bridge0: port 2(bridge_slave_1) entered disabled state [ 72.086610][ T3775] bridge_slave_1: entered allmulticast mode [ 72.092861][ T3775] bridge_slave_1: entered promiscuous mode [ 72.112952][ T3769] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 72.119983][ T3769] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 72.145927][ T3769] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 72.195020][ T3769] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 72.202004][ T3769] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 72.227879][ T3769] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 72.241840][ T3775] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 72.253668][ T3775] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 72.273956][ T3793] chnl_net:caif_netlink_parms(): no params data found [ 72.285433][ T3776] chnl_net:caif_netlink_parms(): no params data found [ 72.312468][ T3775] team0: Port device team_slave_0 added [ 72.334027][ T3800] chnl_net:caif_netlink_parms(): no params data found [ 72.342899][ T3775] team0: Port device team_slave_1 added [ 72.359102][ T3769] hsr_slave_0: entered promiscuous mode [ 72.364987][ T3769] hsr_slave_1: entered promiscuous mode [ 72.403210][ T3775] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 72.410286][ T3775] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 72.436189][ T3775] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 72.457475][ T3776] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.464567][ T3776] bridge0: port 1(bridge_slave_0) entered disabled state [ 72.471627][ T3776] bridge_slave_0: entered allmulticast mode [ 72.478402][ T3776] bridge_slave_0: entered promiscuous mode [ 72.484865][ T3775] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 72.491793][ T3775] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 72.517683][ T3775] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 72.530076][ T3793] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.537137][ T3793] bridge0: port 1(bridge_slave_0) entered disabled state [ 72.544467][ T3793] bridge_slave_0: entered allmulticast mode [ 72.550630][ T3793] bridge_slave_0: entered promiscuous mode [ 72.560651][ T3776] bridge0: port 2(bridge_slave_1) entered blocking state [ 72.567734][ T3776] bridge0: port 2(bridge_slave_1) entered disabled state [ 72.574863][ T3776] bridge_slave_1: entered allmulticast mode [ 72.581083][ T3776] bridge_slave_1: entered promiscuous mode [ 72.592567][ T3793] bridge0: port 2(bridge_slave_1) entered blocking state [ 72.599669][ T3793] bridge0: port 2(bridge_slave_1) entered disabled state [ 72.606754][ T3793] bridge_slave_1: entered allmulticast mode [ 72.613229][ T3793] bridge_slave_1: entered promiscuous mode [ 72.650680][ T3800] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.657805][ T3800] bridge0: port 1(bridge_slave_0) entered disabled state [ 72.665135][ T3800] bridge_slave_0: entered allmulticast mode [ 72.671326][ T3800] bridge_slave_0: entered promiscuous mode [ 72.683630][ T3775] hsr_slave_0: entered promiscuous mode [ 72.689673][ T3775] hsr_slave_1: entered promiscuous mode [ 72.695545][ T3775] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 72.703562][ T3775] Cannot create hsr debugfs directory [ 72.710107][ T3776] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 72.724221][ T3793] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 72.735264][ T3800] bridge0: port 2(bridge_slave_1) entered blocking state [ 72.742321][ T3800] bridge0: port 2(bridge_slave_1) entered disabled state [ 72.750229][ T3800] bridge_slave_1: entered allmulticast mode [ 72.756533][ T3800] bridge_slave_1: entered promiscuous mode [ 72.769842][ T3776] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 72.784236][ T3793] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 72.814498][ T3776] team0: Port device team_slave_0 added [ 72.828838][ T3793] team0: Port device team_slave_0 added [ 72.835537][ T3800] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 72.845713][ T3800] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 72.860089][ T3776] team0: Port device team_slave_1 added [ 72.873404][ T3793] team0: Port device team_slave_1 added [ 72.895538][ T3800] team0: Port device team_slave_0 added [ 72.901927][ T3800] team0: Port device team_slave_1 added [ 72.925726][ T3793] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 72.932713][ T3793] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 72.958658][ T3793] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 72.977485][ T3776] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 72.984457][ T3776] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 73.010392][ T3776] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 73.026460][ T3793] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 73.033404][ T3793] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 73.059605][ T3793] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 73.089794][ T3776] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 73.096784][ T3776] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 73.122681][ T3776] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 73.142190][ T3800] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 73.149266][ T3800] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 73.175254][ T3800] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 73.186345][ T3800] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 73.193300][ T3800] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 73.219246][ T3800] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 73.230319][ T28] audit: type=1400 audit(1714682588.844:125): avc: denied { remove_name } for pid=2766 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 73.253046][ T28] audit: type=1400 audit(1714682588.844:126): avc: denied { rename } for pid=2766 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 73.275215][ T28] audit: type=1400 audit(1714682588.844:127): avc: denied { create } for pid=2766 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 73.298302][ T3793] hsr_slave_0: entered promiscuous mode [ 73.304171][ T3793] hsr_slave_1: entered promiscuous mode [ 73.310259][ T3793] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 73.317819][ T3793] Cannot create hsr debugfs directory [ 73.353578][ T28] audit: type=1400 audit(1714682588.964:128): avc: denied { create } for pid=3775 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 73.375222][ T3775] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 73.375547][ T28] audit: type=1400 audit(1714682588.994:129): avc: denied { write } for pid=3775 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 73.402546][ T28] audit: type=1400 audit(1714682588.994:130): avc: denied { read } for pid=3775 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 73.433930][ T3776] hsr_slave_0: entered promiscuous mode [ 73.439943][ T3776] hsr_slave_1: entered promiscuous mode [ 73.445812][ T3776] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 73.453334][ T3776] Cannot create hsr debugfs directory [ 73.461368][ T3775] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 73.471250][ T3800] hsr_slave_0: entered promiscuous mode [ 73.477365][ T3800] hsr_slave_1: entered promiscuous mode [ 73.483143][ T3800] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 73.490939][ T3800] Cannot create hsr debugfs directory [ 73.500796][ T3775] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 73.518115][ T3775] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 73.546931][ T3769] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 73.555240][ T3769] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 73.569561][ T3769] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 73.577883][ T3769] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 73.610566][ T3793] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 73.618916][ T3793] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 73.635191][ T3793] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 73.643826][ T3793] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 73.696363][ T3776] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 73.715069][ T3776] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 73.725466][ T3776] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 73.742127][ T3776] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 73.759470][ T3769] 8021q: adding VLAN 0 to HW filter on device bond0 [ 73.771943][ T3775] 8021q: adding VLAN 0 to HW filter on device bond0 [ 73.783552][ T3800] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 73.791691][ T3800] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 73.804499][ T3800] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 73.813954][ T3800] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 73.827327][ T3775] 8021q: adding VLAN 0 to HW filter on device team0 [ 73.836824][ T3769] 8021q: adding VLAN 0 to HW filter on device team0 [ 73.865608][ T3853] bridge0: port 1(bridge_slave_0) entered blocking state [ 73.872715][ T3853] bridge0: port 1(bridge_slave_0) entered forwarding state [ 73.882273][ T3853] bridge0: port 1(bridge_slave_0) entered blocking state [ 73.889329][ T3853] bridge0: port 1(bridge_slave_0) entered forwarding state [ 73.908572][ T3793] 8021q: adding VLAN 0 to HW filter on device bond0 [ 73.923774][ T3793] 8021q: adding VLAN 0 to HW filter on device team0 [ 73.934772][ T3853] bridge0: port 2(bridge_slave_1) entered blocking state [ 73.941812][ T3853] bridge0: port 2(bridge_slave_1) entered forwarding state [ 73.950432][ T3853] bridge0: port 2(bridge_slave_1) entered blocking state [ 73.957463][ T3853] bridge0: port 2(bridge_slave_1) entered forwarding state [ 73.966944][ T3853] bridge0: port 1(bridge_slave_0) entered blocking state [ 73.973983][ T3853] bridge0: port 1(bridge_slave_0) entered forwarding state [ 73.990238][ T3853] bridge0: port 2(bridge_slave_1) entered blocking state [ 73.997295][ T3853] bridge0: port 2(bridge_slave_1) entered forwarding state [ 74.033259][ T3769] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 74.067708][ T3775] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 74.082585][ T3776] 8021q: adding VLAN 0 to HW filter on device bond0 [ 74.103158][ T3800] 8021q: adding VLAN 0 to HW filter on device bond0 [ 74.119553][ T3800] 8021q: adding VLAN 0 to HW filter on device team0 [ 74.139504][ T3848] bridge0: port 1(bridge_slave_0) entered blocking state [ 74.146673][ T3848] bridge0: port 1(bridge_slave_0) entered forwarding state [ 74.156233][ T3848] bridge0: port 2(bridge_slave_1) entered blocking state [ 74.163254][ T3848] bridge0: port 2(bridge_slave_1) entered forwarding state [ 74.178491][ T3775] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 74.187059][ T3769] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 74.199228][ T3776] 8021q: adding VLAN 0 to HW filter on device team0 [ 74.210742][ T3848] bridge0: port 1(bridge_slave_0) entered blocking state [ 74.217837][ T3848] bridge0: port 1(bridge_slave_0) entered forwarding state [ 74.235358][ T3848] bridge0: port 2(bridge_slave_1) entered blocking state [ 74.242404][ T3848] bridge0: port 2(bridge_slave_1) entered forwarding state [ 74.256087][ T3793] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 74.310759][ T3776] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 74.396490][ T3775] veth0_vlan: entered promiscuous mode [ 74.410377][ T3800] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 74.427593][ T3775] veth1_vlan: entered promiscuous mode [ 74.437017][ T3769] veth0_vlan: entered promiscuous mode [ 74.456842][ T3793] veth0_vlan: entered promiscuous mode [ 74.472791][ T3776] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 74.487615][ T3775] veth0_macvtap: entered promiscuous mode [ 74.494174][ T3769] veth1_vlan: entered promiscuous mode [ 74.505591][ T3775] veth1_macvtap: entered promiscuous mode [ 74.516830][ T3793] veth1_vlan: entered promiscuous mode [ 74.529929][ T3775] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 74.544092][ T3793] veth0_macvtap: entered promiscuous mode [ 74.555994][ T3800] veth0_vlan: entered promiscuous mode [ 74.567897][ T3775] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 74.575828][ T3793] veth1_macvtap: entered promiscuous mode [ 74.586410][ T3800] veth1_vlan: entered promiscuous mode [ 74.599783][ T3775] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 74.608561][ T3775] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 74.617401][ T3775] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 74.626188][ T3775] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 74.637152][ T3793] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 74.647586][ T3793] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 74.658184][ T3793] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 74.671801][ T3800] veth0_macvtap: entered promiscuous mode [ 74.683535][ T3793] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 74.693999][ T3793] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 74.704979][ T3793] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 74.713494][ T3793] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 74.722292][ T3793] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 74.731005][ T3793] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 74.739730][ T3793] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 74.759649][ T3800] veth1_macvtap: entered promiscuous mode [ 74.767294][ T3769] veth0_macvtap: entered promiscuous mode [ 74.779516][ T3769] veth1_macvtap: entered promiscuous mode [ 74.790950][ T3776] veth0_vlan: entered promiscuous mode [ 74.800000][ T3800] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 74.810607][ T3800] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 74.820460][ T3800] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 74.830976][ T3800] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 74.842811][ T3800] batman_adv: batadv0: Interface activated: batadv_slave_0 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd\x00') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6}]}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) statx(r0, &(0x7f0000000300)='.\x00', 0x0, 0x6000, 0x0) [ 74.861564][ T3776] veth1_vlan: entered promiscuous mode [ 74.868819][ T3800] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 74.879272][ T3800] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 74.889121][ T3800] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 74.899603][ T3800] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 74.910582][ T28] audit: type=1326 audit(1714682590.524:131): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3917 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fb9abf6bd29 code=0x0 [ 74.914473][ T3800] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 74.942651][ T3800] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 74.951377][ T3800] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockname$packet(r0, 0x0, &(0x7f0000000180)) [ 74.960084][ T3800] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 74.968851][ T3800] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 74.983977][ T3769] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 74.994569][ T3769] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 74.997666][ T28] audit: type=1400 audit(1714682590.614:132): avc: denied { create } for pid=3919 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 75.004640][ T3769] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 75.030077][ T28] audit: type=1400 audit(1714682590.644:133): avc: denied { connect } for pid=3919 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 executing program 3: executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000), 0x4) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="0000080000000200088b2f01000046"], 0xfdef) [ 75.034521][ T3769] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 75.064181][ T3769] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 75.074706][ T3769] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 75.087937][ T3769] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 75.096301][ T3769] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 75.096831][ T28] audit: type=1400 audit(1714682590.714:134): avc: denied { create } for pid=3923 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 75.106724][ T3769] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 75.106740][ T3769] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 75.106753][ T3769] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 75.106761][ T3769] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 75.106778][ T3769] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 75.107550][ T3769] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 75.179622][ T3925] syz-executor.3 uses obsolete (PF_INET,SOCK_PACKET) [ 75.201185][ T3769] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f0000000000)=0x7e000001) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='blkio.bfq.io_service_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000200)=ANY=[], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x12, r1, 0x0) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f0000000040)) [ 75.210124][ T3769] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 75.218898][ T3769] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 75.227732][ T3769] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 75.245707][ T3776] veth0_macvtap: entered promiscuous mode executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000600)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x8, [@datasec={0x6, 0x2, 0x0, 0xf, 0x2, [{0x1, 0x0, 0x2}], "da2a"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x2, [], "759f"}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000700)=""/164, 0x48, 0xab, 0x2}, 0x20) [ 75.275848][ T3776] veth1_macvtap: entered promiscuous mode [ 75.308912][ T3776] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x20, 0x0, 0x0, 0xfffff038}, {0x6}]}, 0x10) r2 = fcntl$dupfd(r0, 0x0, r1) write$sndseq(r2, 0x0, 0x0) executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000d40)={0x10, 0x30, 0x3, {0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @private}}}}, 0x38) executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0x21081e, &(0x7f00000000c0)={[{@grpquota}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x200000}}, {@minixdf}]}, 0x1, 0x500, &(0x7f0000000ac0)="$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") chmod(&(0x7f00000000c0)='./file0\x00', 0x21e) chdir(&(0x7f0000000140)='./file0\x00') setreuid(0x0, 0xee01) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) [ 75.319492][ T3776] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 75.329395][ T3776] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 75.339872][ T3776] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 75.349753][ T3776] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 75.360257][ T3776] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x11, 0x4, 0x4, 0xff}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b1a87ff00000000bfa200000000000007020002f8ffffffb703000008000000b704002300000000850000008200000095"], &(0x7f0000000200)='syzkaller\x00', 0xf, 0xff9, &(0x7f0000002300)=""/4089}, 0x90) [ 75.370119][ T3776] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 75.380592][ T3776] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 75.383954][ T3939] loop1: detected capacity change from 0 to 512 [ 75.392462][ T3776] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 75.405858][ T3776] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 75.416388][ T3776] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! executing program 3: pidfd_send_signal(0xffffffffffffffff, 0x0, 0x0, 0x8) [ 75.426225][ T3776] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 75.436817][ T3776] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 75.446729][ T3776] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 75.453939][ T3939] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @private=0xa010100}, 0x10, 0x0, 0x0, &(0x7f0000000240)=[@mask_cswp={0x58, 0x114, 0x9, {{}, &(0x7f00000000c0), 0x0}}, @fadd={0x58, 0x114, 0x6, {{}, 0x0, 0x0}}], 0xb0}, 0x0) [ 75.457362][ T3776] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 75.470005][ T3939] ext4 filesystem being mounted at /root/syzkaller-testdir4100334086/syzkaller.wrzQRl/3/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 75.479449][ T3776] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 75.504397][ T3776] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f00000001c0), 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000500)=[@in={0x2, 0x0, @private=0xa010102}]}, &(0x7f0000000140)=0x10) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x6d, &(0x7f0000000080)={r2}, &(0x7f00000000c0)=0x18) executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f00000000c0)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f00000003c0)=@abs={0x1}, 0x2) executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000000c0)='./file1\x00', 0x58, &(0x7f0000000400)={[{@abort}, {@resuid={'resuid', 0x3d, r1}}, {@nomblk_io_submit}, {@stripe={'stripe', 0x3d, 0x4ffff}}, {@norecovery}, {@minixdf}, {@nobh}], [{@fsname={'fsname', 0x3d, '&'}}, {@seclabel}, {@appraise}, {@euid_gt={'euid>', r1}}, {@uid_eq}, {@appraise_type}, {@subj_type={'subj_type', 0x3d, 'resuid'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '-!'}}, {@seclabel}]}, 0xfe, 0x7ab, &(0x7f0000001100)="$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") executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/fs/cgroup', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x13, r1, 0x0) getdents(r0, &(0x7f0000000340)=""/194, 0x18) [ 75.520354][ T3939] syz-executor.1 (3939) used greatest stack depth: 10688 bytes left [ 75.537094][ T3776] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 75.550283][ T3800] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 75.561738][ T3776] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040), 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000180)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x3c}, {}]}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000580)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcd0cdfa146ec561750379585e5a076d839240d29c034055b67dafe6c8dc3d5d78c07fa1f7db55ce34e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bdb2209c67deca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c580000e6ba0dc001c4110555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697aeea0c440961f182babd18cac1bd4f4390af9a9ceafd0002cab9ccb6159c17d29e1000000870014f51c3c975d5aec84222fd3a0ec4be3e563112f0b39501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a6a71bc85018e5ff2c91018afc9ffc2cc788bee1b47683db01a469398685211dfbbae3e2ed0a50e7313bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcd36e7487afa447e2edfae4f390a83378401ef386e22cc22ee17476d738952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d3ae486aca54183fb01c73f979ca9957399537f5dc2a2d0e0000000000000578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a088a22e8b15fd6b9b45b153da699b9206fc8cc3e233db7ab22e30d46a9d24d37cef099ece729aa218f9f44a3210223fdae7ed04935c3c90d3add8eebc8619d73415cda20000000000000000a8b90dfae158b94f50adab988dd8e12baf5cc9398fff00404d5d99f82e20ee6a8c88e18c2977aab37d9ac4cfc1c7b400001000000007ff57c39495c826b956ba859ac8e3c177b91bd7d5e41ff868f7ca1664fe2f3ced846891180604b6dd2499d16d7d9158ffffffff00000000ef069dc42749a89f854797f29d0000002d8c38a967c1bbe09315c29877a308bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a90800c66ee2b1ad76dff9f9000071414c9994894ee7f8249dc1e3428d2129369ee1b85af6eb2ef414b315f651c8412392191fa83ee830548f11e1036a8debd64cbe359454a3f2239cfe35f81b7a490f167e6d5c1109000000000000000042b8ff8c21ad702ccacad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92052188bd1f285f653b621491dc6aaee0200e2ff08644fb90900006eff1be2f633c1d987591ec3db58a7bb3042ec3f771f7a1338a5c3dd35e926049fe86e09c58e273cd905cbb28c13c1ed1c0d9cae846bcbfa8cce7b893e578af7dc7d5e87d4230328de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4eda0545c00f576b2b5cc7f819abd0f885cc4806f40300966fcf1e54f5a2d38708294cd6f496e5dee734fe7da3770845cf442d488afdc0e17000000000000000000000000000000000000000000000000000005205000000dc1c56d59f35d367632952a93466ae595c6a8cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e121d01342703f5bf030e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c3093c3690d10ecb65dc5b47481edbf1f000000000000004d16d29c28eb5167e9936ed327fb237a56224e49d9ea955a5f0dec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf8179ecd9e5a225d67521dc728eac7d80a5656ac2cbde21d3ebfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be1827fcd95cf1077d3cb0a6a979d3db0c407081c6281e2d8429a863903ca75f4c7df4028fc2018d07af1491ef060cd4403a099f322d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea20bdac0000000000000000ca06f256c8028e0f9b65f037b21f3289086b6826c69fa35ba5cbc3f2db1516ffc5c6e3fa618b24a6ce16d6c7010bb37b61fa0a2d8974e69115d33394e86e4b838297ba20f96936b7e4746e92dea6c5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000b5ace293bec833c13e3229432ad71d646218b5229dd88137fc7c59aa242af3bb4efb82055a3b61227ad40f52c9f2500579aca11033ec14bb9cc16bd83a00840e31d828ec78e116ae46c4897e2795b6ff92e9a1e24b0b855c02f2b7add58ffb25f339297729a7a51810134d3dfbf71f6516737be55c06d9cdcfb1e2bb10b50000eb4acff90756dba1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe80745fe89ad349ffabd76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b53f2fb0e16d8262c080c159ce40c14089c82759106f422582b42e3e8484ea5a6ad9aa52106eafe0e0caea1ad4cb23f3c2b8a0f455ba69ea284c268d54b43158a8b1d128d02af263b3dc1cab794c9ac57a2a7332f4d8764c302ccd5aac114482b619fc575aa0dd2777e881e29a854380e2f1e49db5a1517ec40bb3fa44f9959bad67ccaba76408da35c9f1534c8bd48bbd61627a2e0a74b5e6aefb7eee403502734137ff47257f164391c673b6079e65d7295eed164ca63e4ea26dce0fb3ce0f6591d80dfb8f386bb74b5589829b6b0679b5d65a0dd287b84bc21f130be45dbd20c8ce4af2b6ae1fd9e494c7970ff5b152733fc2ef7f4082840705397c0e79727c489adcefac8371225bb1c23a85bb15d4301e16fb4e6247815c43b0c7704d0816349681f100000000000000e01106a76b56a1a434ac969c2498a1fb42495377ec7aa8965df697d907f4bb1ad661172d92a4cb6218205cf3747add0ec76011477872a5e9005b976ba8b88c6185406d9354aeade40f13c4a2127f8e2f65629043732e3478af76b33b06c623069ae78d2c91040fd821f323674d841eff41332d5d856a1d32326bc2bdb980e9"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) [ 75.570571][ T3776] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 75.579305][ T3776] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 75.588135][ T3776] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 75.614507][ T3955] loop3: detected capacity change from 0 to 2048 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/60, 0x3c}], 0x1, 0x0, 0x0) executing program 0: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000009850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000280)='ext4_mballoc_alloc\x00', r1}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, &(0x7f00000014c0)=""/4094, 0x0, 0xffe}, 0x20) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.memory_pressure\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "c6292b1452167bc378c7b3b90de001f6da29eb74498244ba616e31c1c700d4286804d7a5da86cab64254c800c413b7051a641d91c12ff065301a27349baf7e1d"}, 0x48, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$revoke(0x3, r2) keyctl$KEYCTL_MOVE(0x1e, r2, 0x0, r0, 0x0) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000300)={0x0, "08862f7747b36fe744fe896f311cf21acd6640d9a93152dc1bf03abe7aa98f515d1a63d5b8b40f3a86294c185a60d29371cb5f03d4e39ceb2d59651a10901537", 0x35}, 0x48, 0x0) keyctl$setperm(0x5, r1, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0x0, 0x0) keyctl$join(0x1, &(0x7f0000000240)={'syz', 0x1}) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc4}, &(0x7f00000001c0)={0x0, "f04ffd178d2170699de0a92dfd81c314a0b540158421544801b4156c321ddf8ad587116d7e8e8ecd23f5ab864749efdbed496b359b57826e51a84e2934626056", 0x40}, 0x48, 0x0) executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0xd, 0x10, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000fffeffff7b8af0ff00000000bf8100000000000007080000f8ffffffbfa400000000000007040000f0ffffccbf2214000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000002000000b705000008000000850000000500000095"], &(0x7f0000000300)='GPL\x00', 0x5, 0xff6, &(0x7f0000001e00)=""/4086}, 0x90) [ 75.643805][ T3955] ======================================================= [ 75.643805][ T3955] WARNING: The mand mount option has been deprecated and [ 75.643805][ T3955] and is ignored by this kernel. Remove the mand [ 75.643805][ T3955] option from the mount to silence this warning. [ 75.643805][ T3955] ======================================================= [ 75.683557][ T3955] EXT4-fs: Invalid uid value -1 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) r0 = inotify_init1(0x0) r1 = open$dir(&(0x7f0000000080)='./file0/bus\x00', 0x0, 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x20) getdents64(r1, 0x0, 0x0) executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) r0 = inotify_init1(0x0) r1 = open$dir(&(0x7f0000000080)='./file0/bus\x00', 0x0, 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x20) getdents64(r1, 0x0, 0x0) executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) r0 = inotify_init1(0x0) r1 = open$dir(&(0x7f0000000080)='./file0/bus\x00', 0x0, 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x20) getdents64(r1, 0x0, 0x0) executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) r0 = inotify_init1(0x0) r1 = open$dir(&(0x7f0000000080)='./file0/bus\x00', 0x0, 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x20) getdents64(r1, 0x0, 0x0) executing program 2: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xf6150000, 0x1000}, 0x20) r1 = socket$nl_audit(0x10, 0x3, 0x9) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="2800000035005700000000000000f0ff02ffffffe5000000100001800c001000080001"], 0x28}}, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000200)}, 0x20) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x5, 0x1, 0x7, 0x1120, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x0, 0x3}, 0x48) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r6, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) r7 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r7, 0x8918, &(0x7f0000000080)={@loopback={0x0, 0xff08}, 0x0, r8}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'syzkaller0\x00', 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in6=@private1, @in=@remote, 0x4e24, 0x0, 0x0, 0x0, 0x2, 0x80, 0x0, 0x3a, r9, r10}, {0x2, 0x9, 0x70, 0x2, 0x4, 0x0, 0x3, 0x7fffffffffffffff}, {0x7ff, 0x0, 0x100, 0x100000000}, 0x1, 0x6e6bbd, 0x2, 0x0, 0x2}, {{@in6=@local, 0x4d3, 0x33}, 0x2, @in=@multicast1, 0x0, 0x4, 0x2, 0xc2, 0x0, 0x8, 0x401}}, 0xe8) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000001c0)={0x19c, 0x2, 0x2, 0x101, 0x70bd2a, 0x25dfdbfe, {0xc, 0x0, 0x5}, [@nested={0xfa, 0x61, 0x0, 0x1, [@typed={0x8, 0x7e, 0x0, 0x0, @uid=r10}, @generic="fda26ca18b26a93bbeb97e232f62eecd3dae47f4248c3b568cb09072ae4091e90912a57fb04e4d796e120443094a87b422b5e27f36199f55cd54121a67bbea708e220ecf98110d83b87d907dca0158d951cfe1104c094c41996f9c4320848d800af4c8d5395bf5ec62a227c8aaa450ee582b40833a2eeea97d3b59ef67966a752cd10068cb689e65a3242e08cc716ca123526e22c2254e7b6c6f26995846cc268e98fe7eaa8c70ccb8084aa4aa059155461ac2be2a52a7dae7c83da0e87e95375795381347852715762ab220861e29ca06c5a450940ccec59736f45200ac93d969e1b9d7815faa71c77d9209405a"]}, @generic="a4cc378e7db7def04fb60290c2380dad96b9ff0d657d792e15349218a6c202981a9427bf475cc6084f2e29bf8bef857466efe38b4dc645bd60bc970ecfbf9e88a08651ef8575630ce221ce924fc00c62d8207a39e52f0e13b49b797e40f6895a7f39d8c62d219303ef78c3e2e366afba6e2f39b07b9ecaf9e4dc", @typed={0xc, 0x7f, 0x0, 0x0, @u64=0xfffffffffffffe06}, @typed={0x4, 0xc}]}, 0x19c}, 0x1, 0x0, 0x0, 0x4}, 0x4000001) setsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f0000000000)={{{@in=@rand_addr=0x64010100, @in6=@ipv4={'\x00', '\xff\xff', @private=0xa010102}, 0x4e22, 0x4, 0x4e24, 0x7, 0x0, 0xa0, 0x20, 0x0, r8, r10}, {0xaf, 0x0, 0x2, 0x6, 0xd00, 0xffffffffffffffff, 0x7, 0x1f}, {0x100000001, 0x7f, 0x10000, 0x8000000000000001}, 0x7, 0x6e6bc0, 0x1, 0x1, 0x2, 0x1}, {{@in=@remote, 0x4d3, 0xff}, 0x2, @in6=@loopback, 0x3506, 0x4, 0x3, 0x29, 0x2, 0xda}}, 0xe8) r11 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') preadv(r11, &(0x7f0000000180), 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0xd, &(0x7f0000000340)=@raw=[@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xf17}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @map_fd={0x18, 0x5, 0x1, 0x0, r5}, @call={0x85, 0x0, 0x0, 0xaa}, @jmp={0x5, 0x0, 0xa, 0x9, 0x0, 0x20, 0x10}], &(0x7f00000003c0)='syzkaller\x00', 0x81, 0xa, &(0x7f0000000400)=""/10, 0x41100, 0x2, '\x00', r8, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x8, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000480)=[r11], &(0x7f00000004c0)=[{0x3, 0x2, 0x7, 0x9}, {0x0, 0x1, 0x6, 0x3}, {0x5, 0x2, 0xf, 0x3}, {0x3, 0x1, 0x0, 0x8}, {0x2, 0x3, 0xa, 0x3}, {0x5, 0x5, 0xd, 0x6}, {0x2, 0x3, 0x5, 0xb}, {0x2, 0x2, 0x8, 0x4}], 0x10, 0x2}, 0x90) r12 = socket$rds(0x15, 0x5, 0x0) bind$rds(r12, &(0x7f00000010c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$RDS_GET_MR(r12, 0x114, 0x2, &(0x7f0000001040)={{0x0}, 0x0}, 0x20) r13 = syz_pidfd_open(0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ppoll(&(0x7f0000000040)=[{r0, 0x95}, {r1, 0x71b1}, {r2, 0x5000}, {r3, 0x8004}, {r11, 0x249}, {r12, 0x8608}, {r13, 0x60c}], 0x7, &(0x7f0000000100)={r14, r15+10000000}, &(0x7f0000000140)={[0x5]}, 0x8) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f00000000c0)='./bus\x00', 0x2100d0, &(0x7f0000000100), 0x1, 0x4b9, &(0x7f0000000540)="$eJzs3c9vG1kdAPDvTJLmx2Y3WdgDIGDLslBQtXbibqOqp3IBoaoSouLEoQ2JG0Wx4yh2ShN6SP8HJCpxgj+BAxIHpJ64c4Mbl3JAKlCBGiQORh5P0pDaSbRN7Srz+UijmTfP8fe9WPOe/XUyL4DCuhgRuxFxISLuRsRMfj7Jt7jR3TqPe/H84dLe84dLSbTbt/+RZPWdc3HoZzreyZ9zIiJ++L2InySvxm1u76wt1mrVzbxcbtU3ys3tnU9W64sr1ZXqeqWyML8wd+3K1cqZ9fXD+m+efXf15o9+/7uvPP3j7rd/1mnWdF53uB9nqdv1sYM4HaMRcfNNBBuCkbw/F4bdED6TNCI+FxEfZdf/TIxkryYAcJ612zPRnjlcBgDOuzTLgSVpKc8FTEealkrdHN4HMZXWGs3W5XuNrfXlbq5sNsbSe6u16lyeK5yNsaRTns+OX5YrR8pXIuL9iPj5+GRWLi01asvDfOMDAAX2zpH5/9/j3fkfADjnJobdAABg4Mz/AFA85n8AKB7zPwAUT8/5P9kdfEMAgIHx+R8Aisf8DwCF8oNbtzpbey+///Xy/e2ttcb9T5arzbVSfWuptNTY3CitNBor2T176ic9X63R2Jj/NLYelFvVZqvc3N65U29srbfuZPf1vlMdG0ivAIDjvP/hkz8nEbF7fTLb4tBaDuZqON/SYTcAGJqRYTcAGBqrfUFx+YwP9Fii95CJ/n8i9PhNtAYYhEtflP+HopL/h+KS/4fikv+H4mq3E2v+A0DByPEDx3//3+8WIZO+/wcAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAKDQprMtSUv5WuDTkaalUsS7ETEbY8m91Vp1LiLei4g/jY+Nd8rzw240APCa0r8l+fpfl2Y+nj5aeyH5z3i2j4if/vL2Lx4stlqb853z/zw433qcn68Mo/0AwEn25+n9eXzfi+cPl/a3Qbbn2Xe6i4t24u7lW7dmNEaz/USMRcTUv5K83NV5vzJyBvF3H0XEF3r1P8lyI7P5yqdH43divzvQ+On/xU+zuu6+87v4/Bm0BYrmSWf8udHr+kvjYrbvff1PZCPU69sf//ZeGf/Sg/FvpM/4d/G0MT79w/f71j2K+NJor/jJQfykT/yPTxn/L1/+6kf96tq/irgUveMfjlVu1TfKze2dyagvrlRXquuVysL8wty1K1cr5SxHXd7PVL/q79cvv3dc/6f6xJ84of/fOGX/f/3fuz/+2jHxv/X13q//B8fE78yJ3zxl/MWp3/ZevjuPv9yn/ye9/pdPGf/pX3eWT/lQAGAAmts7a4u1WnXz7T0Yfzua4cBBkQ6GPTIBb9rLi37YLQEAAAAAAAAAAAAAAPoZxL8TDbuPAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAnF//CwAA//9zztjU") renameat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000200)='./bus\x00', 0x0) executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xf6150000, 0x1000}, 0x20) r1 = socket$nl_audit(0x10, 0x3, 0x9) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="2800000035005700000000000000f0ff02ffffffe5000000100001800c001000080001"], 0x28}}, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000200)}, 0x20) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x5, 0x1, 0x7, 0x1120, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x0, 0x3}, 0x48) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r6, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) r7 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r7, 0x8918, &(0x7f0000000080)={@loopback={0x0, 0xff08}, 0x0, r8}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'syzkaller0\x00', 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in6=@private1, @in=@remote, 0x4e24, 0x0, 0x0, 0x0, 0x2, 0x80, 0x0, 0x3a, r9, r10}, {0x2, 0x9, 0x70, 0x2, 0x4, 0x0, 0x3, 0x7fffffffffffffff}, {0x7ff, 0x0, 0x100, 0x100000000}, 0x1, 0x6e6bbd, 0x2, 0x0, 0x2}, {{@in6=@local, 0x4d3, 0x33}, 0x2, @in=@multicast1, 0x0, 0x4, 0x2, 0xc2, 0x0, 0x8, 0x401}}, 0xe8) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000001c0)={0x19c, 0x2, 0x2, 0x101, 0x70bd2a, 0x25dfdbfe, {0xc, 0x0, 0x5}, [@nested={0xfa, 0x61, 0x0, 0x1, [@typed={0x8, 0x7e, 0x0, 0x0, @uid=r10}, @generic="fda26ca18b26a93bbeb97e232f62eecd3dae47f4248c3b568cb09072ae4091e90912a57fb04e4d796e120443094a87b422b5e27f36199f55cd54121a67bbea708e220ecf98110d83b87d907dca0158d951cfe1104c094c41996f9c4320848d800af4c8d5395bf5ec62a227c8aaa450ee582b40833a2eeea97d3b59ef67966a752cd10068cb689e65a3242e08cc716ca123526e22c2254e7b6c6f26995846cc268e98fe7eaa8c70ccb8084aa4aa059155461ac2be2a52a7dae7c83da0e87e95375795381347852715762ab220861e29ca06c5a450940ccec59736f45200ac93d969e1b9d7815faa71c77d9209405a"]}, @generic="a4cc378e7db7def04fb60290c2380dad96b9ff0d657d792e15349218a6c202981a9427bf475cc6084f2e29bf8bef857466efe38b4dc645bd60bc970ecfbf9e88a08651ef8575630ce221ce924fc00c62d8207a39e52f0e13b49b797e40f6895a7f39d8c62d219303ef78c3e2e366afba6e2f39b07b9ecaf9e4dc", @typed={0xc, 0x7f, 0x0, 0x0, @u64=0xfffffffffffffe06}, @typed={0x4, 0xc}]}, 0x19c}, 0x1, 0x0, 0x0, 0x4}, 0x4000001) setsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f0000000000)={{{@in=@rand_addr=0x64010100, @in6=@ipv4={'\x00', '\xff\xff', @private=0xa010102}, 0x4e22, 0x4, 0x4e24, 0x7, 0x0, 0xa0, 0x20, 0x0, r8, r10}, {0xaf, 0x0, 0x2, 0x6, 0xd00, 0xffffffffffffffff, 0x7, 0x1f}, {0x100000001, 0x7f, 0x10000, 0x8000000000000001}, 0x7, 0x6e6bc0, 0x1, 0x1, 0x2, 0x1}, {{@in=@remote, 0x4d3, 0xff}, 0x2, @in6=@loopback, 0x3506, 0x4, 0x3, 0x29, 0x2, 0xda}}, 0xe8) r11 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') preadv(r11, &(0x7f0000000180), 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0xd, &(0x7f0000000340)=@raw=[@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xf17}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @map_fd={0x18, 0x5, 0x1, 0x0, r5}, @call={0x85, 0x0, 0x0, 0xaa}, @jmp={0x5, 0x0, 0xa, 0x9, 0x0, 0x20, 0x10}], &(0x7f00000003c0)='syzkaller\x00', 0x81, 0xa, &(0x7f0000000400)=""/10, 0x41100, 0x2, '\x00', r8, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x8, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000480)=[r11], &(0x7f00000004c0)=[{0x3, 0x2, 0x7, 0x9}, {0x0, 0x1, 0x6, 0x3}, {0x5, 0x2, 0xf, 0x3}, {0x3, 0x1, 0x0, 0x8}, {0x2, 0x3, 0xa, 0x3}, {0x5, 0x5, 0xd, 0x6}, {0x2, 0x3, 0x5, 0xb}, {0x2, 0x2, 0x8, 0x4}], 0x10, 0x2}, 0x90) r12 = socket$rds(0x15, 0x5, 0x0) bind$rds(r12, &(0x7f00000010c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$RDS_GET_MR(r12, 0x114, 0x2, &(0x7f0000001040)={{0x0}, 0x0}, 0x20) r13 = syz_pidfd_open(0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ppoll(&(0x7f0000000040)=[{r0, 0x95}, {r1, 0x71b1}, {r2, 0x5000}, {r3, 0x8004}, {r11, 0x249}, {r12, 0x8608}, {r13, 0x60c}], 0x7, &(0x7f0000000100)={r14, r15+10000000}, &(0x7f0000000140)={[0x5]}, 0x8) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f00000000c0)='./bus\x00', 0x2100d0, &(0x7f0000000100), 0x1, 0x4b9, &(0x7f0000000540)="$eJzs3c9vG1kdAPDvTJLmx2Y3WdgDIGDLslBQtXbibqOqp3IBoaoSouLEoQ2JG0Wx4yh2ShN6SP8HJCpxgj+BAxIHpJ64c4Mbl3JAKlCBGiQORh5P0pDaSbRN7Srz+UijmTfP8fe9WPOe/XUyL4DCuhgRuxFxISLuRsRMfj7Jt7jR3TqPe/H84dLe84dLSbTbt/+RZPWdc3HoZzreyZ9zIiJ++L2InySvxm1u76wt1mrVzbxcbtU3ys3tnU9W64sr1ZXqeqWyML8wd+3K1cqZ9fXD+m+efXf15o9+/7uvPP3j7rd/1mnWdF53uB9nqdv1sYM4HaMRcfNNBBuCkbw/F4bdED6TNCI+FxEfZdf/TIxkryYAcJ612zPRnjlcBgDOuzTLgSVpKc8FTEealkrdHN4HMZXWGs3W5XuNrfXlbq5sNsbSe6u16lyeK5yNsaRTns+OX5YrR8pXIuL9iPj5+GRWLi01asvDfOMDAAX2zpH5/9/j3fkfADjnJobdAABg4Mz/AFA85n8AKB7zPwAUT8/5P9kdfEMAgIHx+R8Aisf8DwCF8oNbtzpbey+///Xy/e2ttcb9T5arzbVSfWuptNTY3CitNBor2T176ic9X63R2Jj/NLYelFvVZqvc3N65U29srbfuZPf1vlMdG0ivAIDjvP/hkz8nEbF7fTLb4tBaDuZqON/SYTcAGJqRYTcAGBqrfUFx+YwP9Fii95CJ/n8i9PhNtAYYhEtflP+HopL/h+KS/4fikv+H4mq3E2v+A0DByPEDx3//3+8WIZO+/wcAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAKDQprMtSUv5WuDTkaalUsS7ETEbY8m91Vp1LiLei4g/jY+Nd8rzw240APCa0r8l+fpfl2Y+nj5aeyH5z3i2j4if/vL2Lx4stlqb853z/zw433qcn68Mo/0AwEn25+n9eXzfi+cPl/a3Qbbn2Xe6i4t24u7lW7dmNEaz/USMRcTUv5K83NV5vzJyBvF3H0XEF3r1P8lyI7P5yqdH43divzvQ+On/xU+zuu6+87v4/Bm0BYrmSWf8udHr+kvjYrbvff1PZCPU69sf//ZeGf/Sg/FvpM/4d/G0MT79w/f71j2K+NJor/jJQfykT/yPTxn/L1/+6kf96tq/irgUveMfjlVu1TfKze2dyagvrlRXquuVysL8wty1K1cr5SxHXd7PVL/q79cvv3dc/6f6xJ84of/fOGX/f/3fuz/+2jHxv/X13q//B8fE78yJ3zxl/MWp3/ZevjuPv9yn/ye9/pdPGf/pX3eWT/lQAGAAmts7a4u1WnXz7T0Yfzua4cBBkQ6GPTIBb9rLi37YLQEAAAAAAAAAAAAAAPoZxL8TDbuPAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAnF//CwAA//9zztjU") renameat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000200)='./bus\x00', 0x0) executing program 1: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xf6150000, 0x1000}, 0x20) r1 = socket$nl_audit(0x10, 0x3, 0x9) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="2800000035005700000000000000f0ff02ffffffe5000000100001800c001000080001"], 0x28}}, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000200)}, 0x20) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x5, 0x1, 0x7, 0x1120, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x0, 0x3}, 0x48) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r6, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) r7 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r7, 0x8918, &(0x7f0000000080)={@loopback={0x0, 0xff08}, 0x0, r8}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'syzkaller0\x00', 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in6=@private1, @in=@remote, 0x4e24, 0x0, 0x0, 0x0, 0x2, 0x80, 0x0, 0x3a, r9, r10}, {0x2, 0x9, 0x70, 0x2, 0x4, 0x0, 0x3, 0x7fffffffffffffff}, {0x7ff, 0x0, 0x100, 0x100000000}, 0x1, 0x6e6bbd, 0x2, 0x0, 0x2}, {{@in6=@local, 0x4d3, 0x33}, 0x2, @in=@multicast1, 0x0, 0x4, 0x2, 0xc2, 0x0, 0x8, 0x401}}, 0xe8) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000001c0)={0x19c, 0x2, 0x2, 0x101, 0x70bd2a, 0x25dfdbfe, {0xc, 0x0, 0x5}, [@nested={0xfa, 0x61, 0x0, 0x1, [@typed={0x8, 0x7e, 0x0, 0x0, @uid=r10}, @generic="fda26ca18b26a93bbeb97e232f62eecd3dae47f4248c3b568cb09072ae4091e90912a57fb04e4d796e120443094a87b422b5e27f36199f55cd54121a67bbea708e220ecf98110d83b87d907dca0158d951cfe1104c094c41996f9c4320848d800af4c8d5395bf5ec62a227c8aaa450ee582b40833a2eeea97d3b59ef67966a752cd10068cb689e65a3242e08cc716ca123526e22c2254e7b6c6f26995846cc268e98fe7eaa8c70ccb8084aa4aa059155461ac2be2a52a7dae7c83da0e87e95375795381347852715762ab220861e29ca06c5a450940ccec59736f45200ac93d969e1b9d7815faa71c77d9209405a"]}, @generic="a4cc378e7db7def04fb60290c2380dad96b9ff0d657d792e15349218a6c202981a9427bf475cc6084f2e29bf8bef857466efe38b4dc645bd60bc970ecfbf9e88a08651ef8575630ce221ce924fc00c62d8207a39e52f0e13b49b797e40f6895a7f39d8c62d219303ef78c3e2e366afba6e2f39b07b9ecaf9e4dc", @typed={0xc, 0x7f, 0x0, 0x0, @u64=0xfffffffffffffe06}, @typed={0x4, 0xc}]}, 0x19c}, 0x1, 0x0, 0x0, 0x4}, 0x4000001) setsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f0000000000)={{{@in=@rand_addr=0x64010100, @in6=@ipv4={'\x00', '\xff\xff', @private=0xa010102}, 0x4e22, 0x4, 0x4e24, 0x7, 0x0, 0xa0, 0x20, 0x0, r8, r10}, {0xaf, 0x0, 0x2, 0x6, 0xd00, 0xffffffffffffffff, 0x7, 0x1f}, {0x100000001, 0x7f, 0x10000, 0x8000000000000001}, 0x7, 0x6e6bc0, 0x1, 0x1, 0x2, 0x1}, {{@in=@remote, 0x4d3, 0xff}, 0x2, @in6=@loopback, 0x3506, 0x4, 0x3, 0x29, 0x2, 0xda}}, 0xe8) r11 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') preadv(r11, &(0x7f0000000180), 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0xd, &(0x7f0000000340)=@raw=[@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xf17}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @map_fd={0x18, 0x5, 0x1, 0x0, r5}, @call={0x85, 0x0, 0x0, 0xaa}, @jmp={0x5, 0x0, 0xa, 0x9, 0x0, 0x20, 0x10}], &(0x7f00000003c0)='syzkaller\x00', 0x81, 0xa, &(0x7f0000000400)=""/10, 0x41100, 0x2, '\x00', r8, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x8, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000480)=[r11], &(0x7f00000004c0)=[{0x3, 0x2, 0x7, 0x9}, {0x0, 0x1, 0x6, 0x3}, {0x5, 0x2, 0xf, 0x3}, {0x3, 0x1, 0x0, 0x8}, {0x2, 0x3, 0xa, 0x3}, {0x5, 0x5, 0xd, 0x6}, {0x2, 0x3, 0x5, 0xb}, {0x2, 0x2, 0x8, 0x4}], 0x10, 0x2}, 0x90) r12 = socket$rds(0x15, 0x5, 0x0) bind$rds(r12, &(0x7f00000010c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$RDS_GET_MR(r12, 0x114, 0x2, &(0x7f0000001040)={{0x0}, 0x0}, 0x20) r13 = syz_pidfd_open(0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ppoll(&(0x7f0000000040)=[{r0, 0x95}, {r1, 0x71b1}, {r2, 0x5000}, {r3, 0x8004}, {r11, 0x249}, {r12, 0x8608}, {r13, 0x60c}], 0x7, &(0x7f0000000100)={r14, r15+10000000}, &(0x7f0000000140)={[0x5]}, 0x8) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f00000000c0)='./bus\x00', 0x2100d0, &(0x7f0000000100), 0x1, 0x4b9, &(0x7f0000000540)="$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") renameat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000200)='./bus\x00', 0x0) executing program 3: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xf6150000, 0x1000}, 0x20) r1 = socket$nl_audit(0x10, 0x3, 0x9) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="2800000035005700000000000000f0ff02ffffffe5000000100001800c001000080001"], 0x28}}, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000200)}, 0x20) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x5, 0x1, 0x7, 0x1120, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x0, 0x3}, 0x48) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r6, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) r7 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r7, 0x8918, &(0x7f0000000080)={@loopback={0x0, 0xff08}, 0x0, r8}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'syzkaller0\x00', 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in6=@private1, @in=@remote, 0x4e24, 0x0, 0x0, 0x0, 0x2, 0x80, 0x0, 0x3a, r9, r10}, {0x2, 0x9, 0x70, 0x2, 0x4, 0x0, 0x3, 0x7fffffffffffffff}, {0x7ff, 0x0, 0x100, 0x100000000}, 0x1, 0x6e6bbd, 0x2, 0x0, 0x2}, {{@in6=@local, 0x4d3, 0x33}, 0x2, @in=@multicast1, 0x0, 0x4, 0x2, 0xc2, 0x0, 0x8, 0x401}}, 0xe8) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000001c0)={0x19c, 0x2, 0x2, 0x101, 0x70bd2a, 0x25dfdbfe, {0xc, 0x0, 0x5}, [@nested={0xfa, 0x61, 0x0, 0x1, [@typed={0x8, 0x7e, 0x0, 0x0, @uid=r10}, @generic="fda26ca18b26a93bbeb97e232f62eecd3dae47f4248c3b568cb09072ae4091e90912a57fb04e4d796e120443094a87b422b5e27f36199f55cd54121a67bbea708e220ecf98110d83b87d907dca0158d951cfe1104c094c41996f9c4320848d800af4c8d5395bf5ec62a227c8aaa450ee582b40833a2eeea97d3b59ef67966a752cd10068cb689e65a3242e08cc716ca123526e22c2254e7b6c6f26995846cc268e98fe7eaa8c70ccb8084aa4aa059155461ac2be2a52a7dae7c83da0e87e95375795381347852715762ab220861e29ca06c5a450940ccec59736f45200ac93d969e1b9d7815faa71c77d9209405a"]}, @generic="a4cc378e7db7def04fb60290c2380dad96b9ff0d657d792e15349218a6c202981a9427bf475cc6084f2e29bf8bef857466efe38b4dc645bd60bc970ecfbf9e88a08651ef8575630ce221ce924fc00c62d8207a39e52f0e13b49b797e40f6895a7f39d8c62d219303ef78c3e2e366afba6e2f39b07b9ecaf9e4dc", @typed={0xc, 0x7f, 0x0, 0x0, @u64=0xfffffffffffffe06}, @typed={0x4, 0xc}]}, 0x19c}, 0x1, 0x0, 0x0, 0x4}, 0x4000001) setsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f0000000000)={{{@in=@rand_addr=0x64010100, @in6=@ipv4={'\x00', '\xff\xff', @private=0xa010102}, 0x4e22, 0x4, 0x4e24, 0x7, 0x0, 0xa0, 0x20, 0x0, r8, r10}, {0xaf, 0x0, 0x2, 0x6, 0xd00, 0xffffffffffffffff, 0x7, 0x1f}, {0x100000001, 0x7f, 0x10000, 0x8000000000000001}, 0x7, 0x6e6bc0, 0x1, 0x1, 0x2, 0x1}, {{@in=@remote, 0x4d3, 0xff}, 0x2, @in6=@loopback, 0x3506, 0x4, 0x3, 0x29, 0x2, 0xda}}, 0xe8) r11 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') preadv(r11, &(0x7f0000000180), 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0xd, &(0x7f0000000340)=@raw=[@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xf17}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @map_fd={0x18, 0x5, 0x1, 0x0, r5}, @call={0x85, 0x0, 0x0, 0xaa}, @jmp={0x5, 0x0, 0xa, 0x9, 0x0, 0x20, 0x10}], &(0x7f00000003c0)='syzkaller\x00', 0x81, 0xa, &(0x7f0000000400)=""/10, 0x41100, 0x2, '\x00', r8, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x8, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000480)=[r11], &(0x7f00000004c0)=[{0x3, 0x2, 0x7, 0x9}, {0x0, 0x1, 0x6, 0x3}, {0x5, 0x2, 0xf, 0x3}, {0x3, 0x1, 0x0, 0x8}, {0x2, 0x3, 0xa, 0x3}, {0x5, 0x5, 0xd, 0x6}, {0x2, 0x3, 0x5, 0xb}, {0x2, 0x2, 0x8, 0x4}], 0x10, 0x2}, 0x90) r12 = socket$rds(0x15, 0x5, 0x0) bind$rds(r12, &(0x7f00000010c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$RDS_GET_MR(r12, 0x114, 0x2, &(0x7f0000001040)={{0x0}, 0x0}, 0x20) r13 = syz_pidfd_open(0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ppoll(&(0x7f0000000040)=[{r0, 0x95}, {r1, 0x71b1}, {r2, 0x5000}, {r3, 0x8004}, {r11, 0x249}, {r12, 0x8608}, {r13, 0x60c}], 0x7, &(0x7f0000000100)={r14, r15+10000000}, &(0x7f0000000140)={[0x5]}, 0x8) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f00000000c0)='./bus\x00', 0x2100d0, &(0x7f0000000100), 0x1, 0x4b9, &(0x7f0000000540)="$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") renameat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000200)='./bus\x00', 0x0) [ 75.873617][ T3977] openvswitch: netlink: IPv4 tunnel dst address is zero [ 75.889685][ T3982] openvswitch: netlink: IPv4 tunnel dst address is zero [ 75.897803][ T3980] openvswitch: netlink: IPv4 tunnel dst address is zero [ 75.908874][ T3984] openvswitch: netlink: IPv4 tunnel dst address is zero executing program 0: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xf6150000, 0x1000}, 0x20) r1 = socket$nl_audit(0x10, 0x3, 0x9) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="2800000035005700000000000000f0ff02ffffffe5000000100001800c001000080001"], 0x28}}, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000200)}, 0x20) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x5, 0x1, 0x7, 0x1120, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x0, 0x3}, 0x48) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r6, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) r7 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r7, 0x8918, &(0x7f0000000080)={@loopback={0x0, 0xff08}, 0x0, r8}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'syzkaller0\x00', 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in6=@private1, @in=@remote, 0x4e24, 0x0, 0x0, 0x0, 0x2, 0x80, 0x0, 0x3a, r9, r10}, {0x2, 0x9, 0x70, 0x2, 0x4, 0x0, 0x3, 0x7fffffffffffffff}, {0x7ff, 0x0, 0x100, 0x100000000}, 0x1, 0x6e6bbd, 0x2, 0x0, 0x2}, {{@in6=@local, 0x4d3, 0x33}, 0x2, @in=@multicast1, 0x0, 0x4, 0x2, 0xc2, 0x0, 0x8, 0x401}}, 0xe8) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000001c0)={0x19c, 0x2, 0x2, 0x101, 0x70bd2a, 0x25dfdbfe, {0xc, 0x0, 0x5}, [@nested={0xfa, 0x61, 0x0, 0x1, [@typed={0x8, 0x7e, 0x0, 0x0, @uid=r10}, @generic="fda26ca18b26a93bbeb97e232f62eecd3dae47f4248c3b568cb09072ae4091e90912a57fb04e4d796e120443094a87b422b5e27f36199f55cd54121a67bbea708e220ecf98110d83b87d907dca0158d951cfe1104c094c41996f9c4320848d800af4c8d5395bf5ec62a227c8aaa450ee582b40833a2eeea97d3b59ef67966a752cd10068cb689e65a3242e08cc716ca123526e22c2254e7b6c6f26995846cc268e98fe7eaa8c70ccb8084aa4aa059155461ac2be2a52a7dae7c83da0e87e95375795381347852715762ab220861e29ca06c5a450940ccec59736f45200ac93d969e1b9d7815faa71c77d9209405a"]}, @generic="a4cc378e7db7def04fb60290c2380dad96b9ff0d657d792e15349218a6c202981a9427bf475cc6084f2e29bf8bef857466efe38b4dc645bd60bc970ecfbf9e88a08651ef8575630ce221ce924fc00c62d8207a39e52f0e13b49b797e40f6895a7f39d8c62d219303ef78c3e2e366afba6e2f39b07b9ecaf9e4dc", @typed={0xc, 0x7f, 0x0, 0x0, @u64=0xfffffffffffffe06}, @typed={0x4, 0xc}]}, 0x19c}, 0x1, 0x0, 0x0, 0x4}, 0x4000001) setsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f0000000000)={{{@in=@rand_addr=0x64010100, @in6=@ipv4={'\x00', '\xff\xff', @private=0xa010102}, 0x4e22, 0x4, 0x4e24, 0x7, 0x0, 0xa0, 0x20, 0x0, r8, r10}, {0xaf, 0x0, 0x2, 0x6, 0xd00, 0xffffffffffffffff, 0x7, 0x1f}, {0x100000001, 0x7f, 0x10000, 0x8000000000000001}, 0x7, 0x6e6bc0, 0x1, 0x1, 0x2, 0x1}, {{@in=@remote, 0x4d3, 0xff}, 0x2, @in6=@loopback, 0x3506, 0x4, 0x3, 0x29, 0x2, 0xda}}, 0xe8) r11 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') preadv(r11, &(0x7f0000000180), 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0xd, &(0x7f0000000340)=@raw=[@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xf17}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @map_fd={0x18, 0x5, 0x1, 0x0, r5}, @call={0x85, 0x0, 0x0, 0xaa}, @jmp={0x5, 0x0, 0xa, 0x9, 0x0, 0x20, 0x10}], &(0x7f00000003c0)='syzkaller\x00', 0x81, 0xa, &(0x7f0000000400)=""/10, 0x41100, 0x2, '\x00', r8, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x8, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000480)=[r11], &(0x7f00000004c0)=[{0x3, 0x2, 0x7, 0x9}, {0x0, 0x1, 0x6, 0x3}, {0x5, 0x2, 0xf, 0x3}, {0x3, 0x1, 0x0, 0x8}, {0x2, 0x3, 0xa, 0x3}, {0x5, 0x5, 0xd, 0x6}, {0x2, 0x3, 0x5, 0xb}, {0x2, 0x2, 0x8, 0x4}], 0x10, 0x2}, 0x90) r12 = socket$rds(0x15, 0x5, 0x0) bind$rds(r12, &(0x7f00000010c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$RDS_GET_MR(r12, 0x114, 0x2, &(0x7f0000001040)={{0x0}, 0x0}, 0x20) r13 = syz_pidfd_open(0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ppoll(&(0x7f0000000040)=[{r0, 0x95}, {r1, 0x71b1}, {r2, 0x5000}, {r3, 0x8004}, {r11, 0x249}, {r12, 0x8608}, {r13, 0x60c}], 0x7, &(0x7f0000000100)={r14, r15+10000000}, &(0x7f0000000140)={[0x5]}, 0x8) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f00000000c0)='./bus\x00', 0x2100d0, &(0x7f0000000100), 0x1, 0x4b9, &(0x7f0000000540)="$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") renameat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000200)='./bus\x00', 0x0) [ 75.972377][ T3977] loop2: detected capacity change from 0 to 512 [ 75.987943][ T3985] loop3: detected capacity change from 0 to 512 [ 75.991465][ T3982] loop1: detected capacity change from 0 to 512 [ 76.002904][ T3987] openvswitch: netlink: IPv4 tunnel dst address is zero [ 76.011281][ T3988] loop4: detected capacity change from 0 to 512 [ 76.029356][ T3977] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 76.043445][ T3977] ext4 filesystem being mounted at /root/syzkaller-testdir2425205832/syzkaller.xiDwdI/2/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 76.047197][ T3982] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. executing program 2: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xf6150000, 0x1000}, 0x20) r1 = socket$nl_audit(0x10, 0x3, 0x9) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="2800000035005700000000000000f0ff02ffffffe5000000100001800c001000080001"], 0x28}}, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000200)}, 0x20) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x5, 0x1, 0x7, 0x1120, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x0, 0x3}, 0x48) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r6, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) r7 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r7, 0x8918, &(0x7f0000000080)={@loopback={0x0, 0xff08}, 0x0, r8}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'syzkaller0\x00', 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in6=@private1, @in=@remote, 0x4e24, 0x0, 0x0, 0x0, 0x2, 0x80, 0x0, 0x3a, r9, r10}, {0x2, 0x9, 0x70, 0x2, 0x4, 0x0, 0x3, 0x7fffffffffffffff}, {0x7ff, 0x0, 0x100, 0x100000000}, 0x1, 0x6e6bbd, 0x2, 0x0, 0x2}, {{@in6=@local, 0x4d3, 0x33}, 0x2, @in=@multicast1, 0x0, 0x4, 0x2, 0xc2, 0x0, 0x8, 0x401}}, 0xe8) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000001c0)={0x19c, 0x2, 0x2, 0x101, 0x70bd2a, 0x25dfdbfe, {0xc, 0x0, 0x5}, [@nested={0xfa, 0x61, 0x0, 0x1, [@typed={0x8, 0x7e, 0x0, 0x0, @uid=r10}, @generic="fda26ca18b26a93bbeb97e232f62eecd3dae47f4248c3b568cb09072ae4091e90912a57fb04e4d796e120443094a87b422b5e27f36199f55cd54121a67bbea708e220ecf98110d83b87d907dca0158d951cfe1104c094c41996f9c4320848d800af4c8d5395bf5ec62a227c8aaa450ee582b40833a2eeea97d3b59ef67966a752cd10068cb689e65a3242e08cc716ca123526e22c2254e7b6c6f26995846cc268e98fe7eaa8c70ccb8084aa4aa059155461ac2be2a52a7dae7c83da0e87e95375795381347852715762ab220861e29ca06c5a450940ccec59736f45200ac93d969e1b9d7815faa71c77d9209405a"]}, @generic="a4cc378e7db7def04fb60290c2380dad96b9ff0d657d792e15349218a6c202981a9427bf475cc6084f2e29bf8bef857466efe38b4dc645bd60bc970ecfbf9e88a08651ef8575630ce221ce924fc00c62d8207a39e52f0e13b49b797e40f6895a7f39d8c62d219303ef78c3e2e366afba6e2f39b07b9ecaf9e4dc", @typed={0xc, 0x7f, 0x0, 0x0, @u64=0xfffffffffffffe06}, @typed={0x4, 0xc}]}, 0x19c}, 0x1, 0x0, 0x0, 0x4}, 0x4000001) setsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f0000000000)={{{@in=@rand_addr=0x64010100, @in6=@ipv4={'\x00', '\xff\xff', @private=0xa010102}, 0x4e22, 0x4, 0x4e24, 0x7, 0x0, 0xa0, 0x20, 0x0, r8, r10}, {0xaf, 0x0, 0x2, 0x6, 0xd00, 0xffffffffffffffff, 0x7, 0x1f}, {0x100000001, 0x7f, 0x10000, 0x8000000000000001}, 0x7, 0x6e6bc0, 0x1, 0x1, 0x2, 0x1}, {{@in=@remote, 0x4d3, 0xff}, 0x2, @in6=@loopback, 0x3506, 0x4, 0x3, 0x29, 0x2, 0xda}}, 0xe8) r11 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') preadv(r11, &(0x7f0000000180), 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0xd, &(0x7f0000000340)=@raw=[@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xf17}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @map_fd={0x18, 0x5, 0x1, 0x0, r5}, @call={0x85, 0x0, 0x0, 0xaa}, @jmp={0x5, 0x0, 0xa, 0x9, 0x0, 0x20, 0x10}], &(0x7f00000003c0)='syzkaller\x00', 0x81, 0xa, &(0x7f0000000400)=""/10, 0x41100, 0x2, '\x00', r8, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x8, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000480)=[r11], &(0x7f00000004c0)=[{0x3, 0x2, 0x7, 0x9}, {0x0, 0x1, 0x6, 0x3}, {0x5, 0x2, 0xf, 0x3}, {0x3, 0x1, 0x0, 0x8}, {0x2, 0x3, 0xa, 0x3}, {0x5, 0x5, 0xd, 0x6}, {0x2, 0x3, 0x5, 0xb}, {0x2, 0x2, 0x8, 0x4}], 0x10, 0x2}, 0x90) r12 = socket$rds(0x15, 0x5, 0x0) bind$rds(r12, &(0x7f00000010c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$RDS_GET_MR(r12, 0x114, 0x2, &(0x7f0000001040)={{0x0}, 0x0}, 0x20) r13 = syz_pidfd_open(0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ppoll(&(0x7f0000000040)=[{r0, 0x95}, {r1, 0x71b1}, {r2, 0x5000}, {r3, 0x8004}, {r11, 0x249}, {r12, 0x8608}, {r13, 0x60c}], 0x7, &(0x7f0000000100)={r14, r15+10000000}, &(0x7f0000000140)={[0x5]}, 0x8) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f00000000c0)='./bus\x00', 0x2100d0, &(0x7f0000000100), 0x1, 0x4b9, &(0x7f0000000540)="$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") renameat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000200)='./bus\x00', 0x0) [ 76.074236][ T3985] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 76.087576][ T3982] ext4 filesystem being mounted at /root/syzkaller-testdir4100334086/syzkaller.wrzQRl/8/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 76.097890][ T3996] loop0: detected capacity change from 0 to 512 [ 76.109933][ T3985] ext4 filesystem being mounted at /root/syzkaller-testdir2676061251/syzkaller.csB4Ho/10/bus supports timestamps until 2038-01-19 (0x7fffffff) executing program 1: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xf6150000, 0x1000}, 0x20) r1 = socket$nl_audit(0x10, 0x3, 0x9) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="2800000035005700000000000000f0ff02ffffffe5000000100001800c001000080001"], 0x28}}, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000200)}, 0x20) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x5, 0x1, 0x7, 0x1120, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x0, 0x3}, 0x48) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r6, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) r7 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r7, 0x8918, &(0x7f0000000080)={@loopback={0x0, 0xff08}, 0x0, r8}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'syzkaller0\x00', 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in6=@private1, @in=@remote, 0x4e24, 0x0, 0x0, 0x0, 0x2, 0x80, 0x0, 0x3a, r9, r10}, {0x2, 0x9, 0x70, 0x2, 0x4, 0x0, 0x3, 0x7fffffffffffffff}, {0x7ff, 0x0, 0x100, 0x100000000}, 0x1, 0x6e6bbd, 0x2, 0x0, 0x2}, {{@in6=@local, 0x4d3, 0x33}, 0x2, @in=@multicast1, 0x0, 0x4, 0x2, 0xc2, 0x0, 0x8, 0x401}}, 0xe8) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000001c0)={0x19c, 0x2, 0x2, 0x101, 0x70bd2a, 0x25dfdbfe, {0xc, 0x0, 0x5}, [@nested={0xfa, 0x61, 0x0, 0x1, [@typed={0x8, 0x7e, 0x0, 0x0, @uid=r10}, @generic="fda26ca18b26a93bbeb97e232f62eecd3dae47f4248c3b568cb09072ae4091e90912a57fb04e4d796e120443094a87b422b5e27f36199f55cd54121a67bbea708e220ecf98110d83b87d907dca0158d951cfe1104c094c41996f9c4320848d800af4c8d5395bf5ec62a227c8aaa450ee582b40833a2eeea97d3b59ef67966a752cd10068cb689e65a3242e08cc716ca123526e22c2254e7b6c6f26995846cc268e98fe7eaa8c70ccb8084aa4aa059155461ac2be2a52a7dae7c83da0e87e95375795381347852715762ab220861e29ca06c5a450940ccec59736f45200ac93d969e1b9d7815faa71c77d9209405a"]}, @generic="a4cc378e7db7def04fb60290c2380dad96b9ff0d657d792e15349218a6c202981a9427bf475cc6084f2e29bf8bef857466efe38b4dc645bd60bc970ecfbf9e88a08651ef8575630ce221ce924fc00c62d8207a39e52f0e13b49b797e40f6895a7f39d8c62d219303ef78c3e2e366afba6e2f39b07b9ecaf9e4dc", @typed={0xc, 0x7f, 0x0, 0x0, @u64=0xfffffffffffffe06}, @typed={0x4, 0xc}]}, 0x19c}, 0x1, 0x0, 0x0, 0x4}, 0x4000001) setsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f0000000000)={{{@in=@rand_addr=0x64010100, @in6=@ipv4={'\x00', '\xff\xff', @private=0xa010102}, 0x4e22, 0x4, 0x4e24, 0x7, 0x0, 0xa0, 0x20, 0x0, r8, r10}, {0xaf, 0x0, 0x2, 0x6, 0xd00, 0xffffffffffffffff, 0x7, 0x1f}, {0x100000001, 0x7f, 0x10000, 0x8000000000000001}, 0x7, 0x6e6bc0, 0x1, 0x1, 0x2, 0x1}, {{@in=@remote, 0x4d3, 0xff}, 0x2, @in6=@loopback, 0x3506, 0x4, 0x3, 0x29, 0x2, 0xda}}, 0xe8) r11 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') preadv(r11, &(0x7f0000000180), 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0xd, &(0x7f0000000340)=@raw=[@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xf17}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @map_fd={0x18, 0x5, 0x1, 0x0, r5}, @call={0x85, 0x0, 0x0, 0xaa}, @jmp={0x5, 0x0, 0xa, 0x9, 0x0, 0x20, 0x10}], &(0x7f00000003c0)='syzkaller\x00', 0x81, 0xa, &(0x7f0000000400)=""/10, 0x41100, 0x2, '\x00', r8, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x8, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000480)=[r11], &(0x7f00000004c0)=[{0x3, 0x2, 0x7, 0x9}, {0x0, 0x1, 0x6, 0x3}, {0x5, 0x2, 0xf, 0x3}, {0x3, 0x1, 0x0, 0x8}, {0x2, 0x3, 0xa, 0x3}, {0x5, 0x5, 0xd, 0x6}, {0x2, 0x3, 0x5, 0xb}, {0x2, 0x2, 0x8, 0x4}], 0x10, 0x2}, 0x90) r12 = socket$rds(0x15, 0x5, 0x0) bind$rds(r12, &(0x7f00000010c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$RDS_GET_MR(r12, 0x114, 0x2, &(0x7f0000001040)={{0x0}, 0x0}, 0x20) r13 = syz_pidfd_open(0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ppoll(&(0x7f0000000040)=[{r0, 0x95}, {r1, 0x71b1}, {r2, 0x5000}, {r3, 0x8004}, {r11, 0x249}, {r12, 0x8608}, {r13, 0x60c}], 0x7, &(0x7f0000000100)={r14, r15+10000000}, &(0x7f0000000140)={[0x5]}, 0x8) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f00000000c0)='./bus\x00', 0x2100d0, &(0x7f0000000100), 0x1, 0x4b9, &(0x7f0000000540)="$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") renameat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000200)='./bus\x00', 0x0) [ 76.128141][ T3775] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 76.151084][ T3800] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 76.162222][ T3988] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 76.179820][ T3988] ext4 filesystem being mounted at /root/syzkaller-testdir3636980945/syzkaller.Qg79Ho/2/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 76.203670][ T3996] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. executing program 3: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xf6150000, 0x1000}, 0x20) r1 = socket$nl_audit(0x10, 0x3, 0x9) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="2800000035005700000000000000f0ff02ffffffe5000000100001800c001000080001"], 0x28}}, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000200)}, 0x20) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x5, 0x1, 0x7, 0x1120, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x0, 0x3}, 0x48) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r6, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) r7 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r7, 0x8918, &(0x7f0000000080)={@loopback={0x0, 0xff08}, 0x0, r8}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'syzkaller0\x00', 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in6=@private1, @in=@remote, 0x4e24, 0x0, 0x0, 0x0, 0x2, 0x80, 0x0, 0x3a, r9, r10}, {0x2, 0x9, 0x70, 0x2, 0x4, 0x0, 0x3, 0x7fffffffffffffff}, {0x7ff, 0x0, 0x100, 0x100000000}, 0x1, 0x6e6bbd, 0x2, 0x0, 0x2}, {{@in6=@local, 0x4d3, 0x33}, 0x2, @in=@multicast1, 0x0, 0x4, 0x2, 0xc2, 0x0, 0x8, 0x401}}, 0xe8) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000001c0)={0x19c, 0x2, 0x2, 0x101, 0x70bd2a, 0x25dfdbfe, {0xc, 0x0, 0x5}, [@nested={0xfa, 0x61, 0x0, 0x1, [@typed={0x8, 0x7e, 0x0, 0x0, @uid=r10}, @generic="fda26ca18b26a93bbeb97e232f62eecd3dae47f4248c3b568cb09072ae4091e90912a57fb04e4d796e120443094a87b422b5e27f36199f55cd54121a67bbea708e220ecf98110d83b87d907dca0158d951cfe1104c094c41996f9c4320848d800af4c8d5395bf5ec62a227c8aaa450ee582b40833a2eeea97d3b59ef67966a752cd10068cb689e65a3242e08cc716ca123526e22c2254e7b6c6f26995846cc268e98fe7eaa8c70ccb8084aa4aa059155461ac2be2a52a7dae7c83da0e87e95375795381347852715762ab220861e29ca06c5a450940ccec59736f45200ac93d969e1b9d7815faa71c77d9209405a"]}, @generic="a4cc378e7db7def04fb60290c2380dad96b9ff0d657d792e15349218a6c202981a9427bf475cc6084f2e29bf8bef857466efe38b4dc645bd60bc970ecfbf9e88a08651ef8575630ce221ce924fc00c62d8207a39e52f0e13b49b797e40f6895a7f39d8c62d219303ef78c3e2e366afba6e2f39b07b9ecaf9e4dc", @typed={0xc, 0x7f, 0x0, 0x0, @u64=0xfffffffffffffe06}, @typed={0x4, 0xc}]}, 0x19c}, 0x1, 0x0, 0x0, 0x4}, 0x4000001) setsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f0000000000)={{{@in=@rand_addr=0x64010100, @in6=@ipv4={'\x00', '\xff\xff', @private=0xa010102}, 0x4e22, 0x4, 0x4e24, 0x7, 0x0, 0xa0, 0x20, 0x0, r8, r10}, {0xaf, 0x0, 0x2, 0x6, 0xd00, 0xffffffffffffffff, 0x7, 0x1f}, {0x100000001, 0x7f, 0x10000, 0x8000000000000001}, 0x7, 0x6e6bc0, 0x1, 0x1, 0x2, 0x1}, {{@in=@remote, 0x4d3, 0xff}, 0x2, @in6=@loopback, 0x3506, 0x4, 0x3, 0x29, 0x2, 0xda}}, 0xe8) r11 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') preadv(r11, &(0x7f0000000180), 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0xd, &(0x7f0000000340)=@raw=[@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xf17}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @map_fd={0x18, 0x5, 0x1, 0x0, r5}, @call={0x85, 0x0, 0x0, 0xaa}, @jmp={0x5, 0x0, 0xa, 0x9, 0x0, 0x20, 0x10}], &(0x7f00000003c0)='syzkaller\x00', 0x81, 0xa, &(0x7f0000000400)=""/10, 0x41100, 0x2, '\x00', r8, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x8, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000480)=[r11], &(0x7f00000004c0)=[{0x3, 0x2, 0x7, 0x9}, {0x0, 0x1, 0x6, 0x3}, {0x5, 0x2, 0xf, 0x3}, {0x3, 0x1, 0x0, 0x8}, {0x2, 0x3, 0xa, 0x3}, {0x5, 0x5, 0xd, 0x6}, {0x2, 0x3, 0x5, 0xb}, {0x2, 0x2, 0x8, 0x4}], 0x10, 0x2}, 0x90) r12 = socket$rds(0x15, 0x5, 0x0) bind$rds(r12, &(0x7f00000010c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$RDS_GET_MR(r12, 0x114, 0x2, &(0x7f0000001040)={{0x0}, 0x0}, 0x20) r13 = syz_pidfd_open(0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ppoll(&(0x7f0000000040)=[{r0, 0x95}, {r1, 0x71b1}, {r2, 0x5000}, {r3, 0x8004}, {r11, 0x249}, {r12, 0x8608}, {r13, 0x60c}], 0x7, &(0x7f0000000100)={r14, r15+10000000}, &(0x7f0000000140)={[0x5]}, 0x8) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f00000000c0)='./bus\x00', 0x2100d0, &(0x7f0000000100), 0x1, 0x4b9, &(0x7f0000000540)="$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") renameat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000200)='./bus\x00', 0x0) [ 76.220576][ T3996] ext4 filesystem being mounted at /root/syzkaller-testdir2163917739/syzkaller.mpqcH0/3/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 76.235957][ T3793] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 76.268272][ T3776] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xf6150000, 0x1000}, 0x20) r1 = socket$nl_audit(0x10, 0x3, 0x9) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="2800000035005700000000000000f0ff02ffffffe5000000100001800c001000080001"], 0x28}}, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000200)}, 0x20) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x5, 0x1, 0x7, 0x1120, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x0, 0x3}, 0x48) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r6, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) r7 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r7, 0x8918, &(0x7f0000000080)={@loopback={0x0, 0xff08}, 0x0, r8}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'syzkaller0\x00', 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in6=@private1, @in=@remote, 0x4e24, 0x0, 0x0, 0x0, 0x2, 0x80, 0x0, 0x3a, r9, r10}, {0x2, 0x9, 0x70, 0x2, 0x4, 0x0, 0x3, 0x7fffffffffffffff}, {0x7ff, 0x0, 0x100, 0x100000000}, 0x1, 0x6e6bbd, 0x2, 0x0, 0x2}, {{@in6=@local, 0x4d3, 0x33}, 0x2, @in=@multicast1, 0x0, 0x4, 0x2, 0xc2, 0x0, 0x8, 0x401}}, 0xe8) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000001c0)={0x19c, 0x2, 0x2, 0x101, 0x70bd2a, 0x25dfdbfe, {0xc, 0x0, 0x5}, [@nested={0xfa, 0x61, 0x0, 0x1, [@typed={0x8, 0x7e, 0x0, 0x0, @uid=r10}, @generic="fda26ca18b26a93bbeb97e232f62eecd3dae47f4248c3b568cb09072ae4091e90912a57fb04e4d796e120443094a87b422b5e27f36199f55cd54121a67bbea708e220ecf98110d83b87d907dca0158d951cfe1104c094c41996f9c4320848d800af4c8d5395bf5ec62a227c8aaa450ee582b40833a2eeea97d3b59ef67966a752cd10068cb689e65a3242e08cc716ca123526e22c2254e7b6c6f26995846cc268e98fe7eaa8c70ccb8084aa4aa059155461ac2be2a52a7dae7c83da0e87e95375795381347852715762ab220861e29ca06c5a450940ccec59736f45200ac93d969e1b9d7815faa71c77d9209405a"]}, @generic="a4cc378e7db7def04fb60290c2380dad96b9ff0d657d792e15349218a6c202981a9427bf475cc6084f2e29bf8bef857466efe38b4dc645bd60bc970ecfbf9e88a08651ef8575630ce221ce924fc00c62d8207a39e52f0e13b49b797e40f6895a7f39d8c62d219303ef78c3e2e366afba6e2f39b07b9ecaf9e4dc", @typed={0xc, 0x7f, 0x0, 0x0, @u64=0xfffffffffffffe06}, @typed={0x4, 0xc}]}, 0x19c}, 0x1, 0x0, 0x0, 0x4}, 0x4000001) setsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f0000000000)={{{@in=@rand_addr=0x64010100, @in6=@ipv4={'\x00', '\xff\xff', @private=0xa010102}, 0x4e22, 0x4, 0x4e24, 0x7, 0x0, 0xa0, 0x20, 0x0, r8, r10}, {0xaf, 0x0, 0x2, 0x6, 0xd00, 0xffffffffffffffff, 0x7, 0x1f}, {0x100000001, 0x7f, 0x10000, 0x8000000000000001}, 0x7, 0x6e6bc0, 0x1, 0x1, 0x2, 0x1}, {{@in=@remote, 0x4d3, 0xff}, 0x2, @in6=@loopback, 0x3506, 0x4, 0x3, 0x29, 0x2, 0xda}}, 0xe8) r11 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') preadv(r11, &(0x7f0000000180), 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0xd, &(0x7f0000000340)=@raw=[@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xf17}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @map_fd={0x18, 0x5, 0x1, 0x0, r5}, @call={0x85, 0x0, 0x0, 0xaa}, @jmp={0x5, 0x0, 0xa, 0x9, 0x0, 0x20, 0x10}], &(0x7f00000003c0)='syzkaller\x00', 0x81, 0xa, &(0x7f0000000400)=""/10, 0x41100, 0x2, '\x00', r8, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x8, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000480)=[r11], &(0x7f00000004c0)=[{0x3, 0x2, 0x7, 0x9}, {0x0, 0x1, 0x6, 0x3}, {0x5, 0x2, 0xf, 0x3}, {0x3, 0x1, 0x0, 0x8}, {0x2, 0x3, 0xa, 0x3}, {0x5, 0x5, 0xd, 0x6}, {0x2, 0x3, 0x5, 0xb}, {0x2, 0x2, 0x8, 0x4}], 0x10, 0x2}, 0x90) r12 = socket$rds(0x15, 0x5, 0x0) bind$rds(r12, &(0x7f00000010c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$RDS_GET_MR(r12, 0x114, 0x2, &(0x7f0000001040)={{0x0}, 0x0}, 0x20) r13 = syz_pidfd_open(0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ppoll(&(0x7f0000000040)=[{r0, 0x95}, {r1, 0x71b1}, {r2, 0x5000}, {r3, 0x8004}, {r11, 0x249}, {r12, 0x8608}, {r13, 0x60c}], 0x7, &(0x7f0000000100)={r14, r15+10000000}, &(0x7f0000000140)={[0x5]}, 0x8) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f00000000c0)='./bus\x00', 0x2100d0, &(0x7f0000000100), 0x1, 0x4b9, &(0x7f0000000540)="$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") renameat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000200)='./bus\x00', 0x0) executing program 0: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xf6150000, 0x1000}, 0x20) r1 = socket$nl_audit(0x10, 0x3, 0x9) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="2800000035005700000000000000f0ff02ffffffe5000000100001800c001000080001"], 0x28}}, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000200)}, 0x20) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x5, 0x1, 0x7, 0x1120, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x0, 0x3}, 0x48) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r6, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) r7 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r7, 0x8918, &(0x7f0000000080)={@loopback={0x0, 0xff08}, 0x0, r8}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'syzkaller0\x00', 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in6=@private1, @in=@remote, 0x4e24, 0x0, 0x0, 0x0, 0x2, 0x80, 0x0, 0x3a, r9, r10}, {0x2, 0x9, 0x70, 0x2, 0x4, 0x0, 0x3, 0x7fffffffffffffff}, {0x7ff, 0x0, 0x100, 0x100000000}, 0x1, 0x6e6bbd, 0x2, 0x0, 0x2}, {{@in6=@local, 0x4d3, 0x33}, 0x2, @in=@multicast1, 0x0, 0x4, 0x2, 0xc2, 0x0, 0x8, 0x401}}, 0xe8) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000001c0)={0x19c, 0x2, 0x2, 0x101, 0x70bd2a, 0x25dfdbfe, {0xc, 0x0, 0x5}, [@nested={0xfa, 0x61, 0x0, 0x1, [@typed={0x8, 0x7e, 0x0, 0x0, @uid=r10}, @generic="fda26ca18b26a93bbeb97e232f62eecd3dae47f4248c3b568cb09072ae4091e90912a57fb04e4d796e120443094a87b422b5e27f36199f55cd54121a67bbea708e220ecf98110d83b87d907dca0158d951cfe1104c094c41996f9c4320848d800af4c8d5395bf5ec62a227c8aaa450ee582b40833a2eeea97d3b59ef67966a752cd10068cb689e65a3242e08cc716ca123526e22c2254e7b6c6f26995846cc268e98fe7eaa8c70ccb8084aa4aa059155461ac2be2a52a7dae7c83da0e87e95375795381347852715762ab220861e29ca06c5a450940ccec59736f45200ac93d969e1b9d7815faa71c77d9209405a"]}, @generic="a4cc378e7db7def04fb60290c2380dad96b9ff0d657d792e15349218a6c202981a9427bf475cc6084f2e29bf8bef857466efe38b4dc645bd60bc970ecfbf9e88a08651ef8575630ce221ce924fc00c62d8207a39e52f0e13b49b797e40f6895a7f39d8c62d219303ef78c3e2e366afba6e2f39b07b9ecaf9e4dc", @typed={0xc, 0x7f, 0x0, 0x0, @u64=0xfffffffffffffe06}, @typed={0x4, 0xc}]}, 0x19c}, 0x1, 0x0, 0x0, 0x4}, 0x4000001) setsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f0000000000)={{{@in=@rand_addr=0x64010100, @in6=@ipv4={'\x00', '\xff\xff', @private=0xa010102}, 0x4e22, 0x4, 0x4e24, 0x7, 0x0, 0xa0, 0x20, 0x0, r8, r10}, {0xaf, 0x0, 0x2, 0x6, 0xd00, 0xffffffffffffffff, 0x7, 0x1f}, {0x100000001, 0x7f, 0x10000, 0x8000000000000001}, 0x7, 0x6e6bc0, 0x1, 0x1, 0x2, 0x1}, {{@in=@remote, 0x4d3, 0xff}, 0x2, @in6=@loopback, 0x3506, 0x4, 0x3, 0x29, 0x2, 0xda}}, 0xe8) r11 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') preadv(r11, &(0x7f0000000180), 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0xd, &(0x7f0000000340)=@raw=[@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xf17}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @map_fd={0x18, 0x5, 0x1, 0x0, r5}, @call={0x85, 0x0, 0x0, 0xaa}, @jmp={0x5, 0x0, 0xa, 0x9, 0x0, 0x20, 0x10}], &(0x7f00000003c0)='syzkaller\x00', 0x81, 0xa, &(0x7f0000000400)=""/10, 0x41100, 0x2, '\x00', r8, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x8, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000480)=[r11], &(0x7f00000004c0)=[{0x3, 0x2, 0x7, 0x9}, {0x0, 0x1, 0x6, 0x3}, {0x5, 0x2, 0xf, 0x3}, {0x3, 0x1, 0x0, 0x8}, {0x2, 0x3, 0xa, 0x3}, {0x5, 0x5, 0xd, 0x6}, {0x2, 0x3, 0x5, 0xb}, {0x2, 0x2, 0x8, 0x4}], 0x10, 0x2}, 0x90) r12 = socket$rds(0x15, 0x5, 0x0) bind$rds(r12, &(0x7f00000010c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$RDS_GET_MR(r12, 0x114, 0x2, &(0x7f0000001040)={{0x0}, 0x0}, 0x20) r13 = syz_pidfd_open(0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ppoll(&(0x7f0000000040)=[{r0, 0x95}, {r1, 0x71b1}, {r2, 0x5000}, {r3, 0x8004}, {r11, 0x249}, {r12, 0x8608}, {r13, 0x60c}], 0x7, &(0x7f0000000100)={r14, r15+10000000}, &(0x7f0000000140)={[0x5]}, 0x8) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f00000000c0)='./bus\x00', 0x2100d0, &(0x7f0000000100), 0x1, 0x4b9, &(0x7f0000000540)="$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") renameat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000200)='./bus\x00', 0x0) [ 76.281509][ T4002] openvswitch: netlink: IPv4 tunnel dst address is zero [ 76.305600][ T4004] openvswitch: netlink: IPv4 tunnel dst address is zero [ 76.316170][ T3769] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 76.330353][ T4002] loop2: detected capacity change from 0 to 512 [ 76.330451][ T4004] loop1: detected capacity change from 0 to 512 [ 76.360758][ T4007] openvswitch: netlink: IPv4 tunnel dst address is zero [ 76.369154][ T4008] openvswitch: netlink: IPv4 tunnel dst address is zero [ 76.380929][ T4004] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 76.391900][ T4007] loop4: detected capacity change from 0 to 512 [ 76.409630][ T4004] ext4 filesystem being mounted at /root/syzkaller-testdir4100334086/syzkaller.wrzQRl/9/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 76.416413][ T4013] openvswitch: netlink: IPv4 tunnel dst address is zero [ 76.437197][ T4008] loop3: detected capacity change from 0 to 512 [ 76.437880][ T4007] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 76.458599][ T4002] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 76.463378][ T4007] ext4 filesystem being mounted at /root/syzkaller-testdir3636980945/syzkaller.Qg79Ho/3/bus supports timestamps until 2038-01-19 (0x7fffffff) executing program 4: capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000000040)={0x200000, 0x200000}) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xa, 0xf, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x7}, {}, {0x85, 0x0, 0x0, 0x88}}, {{0x5, 0x0, 0x3}}, [], {{}, {0x6, 0x0, 0x5, 0x7}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0xd, 0x10, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000fffeffff7b8af0ff00000000bf8100000000000007080000f8ffffffbfa400000000000007040000f0ffffccbf2214000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000002000000b705000008000000850000000500000095"], &(0x7f0000000300)='GPL\x00', 0x5, 0xff6, &(0x7f0000001e00)=""/4086}, 0x90) executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) r0 = inotify_init1(0x0) r1 = open$dir(&(0x7f0000000080)='./file0/bus\x00', 0x0, 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x20) getdents64(r1, 0x0, 0x0) [ 76.477454][ T4013] loop0: detected capacity change from 0 to 512 [ 76.497701][ T4002] ext4 filesystem being mounted at /root/syzkaller-testdir2425205832/syzkaller.xiDwdI/3/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 76.518148][ T3800] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 76.533118][ T3776] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 76.543087][ T4008] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 76.556108][ T3775] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 76.556550][ T4008] ext4 filesystem being mounted at /root/syzkaller-testdir2676061251/syzkaller.csB4Ho/11/bus supports timestamps until 2038-01-19 (0x7fffffff) executing program 3: capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000000040)={0x200000, 0x200000}) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xa, 0xf, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x7}, {}, {0x85, 0x0, 0x0, 0x88}}, {{0x5, 0x0, 0x3}}, [], {{}, {0x6, 0x0, 0x5, 0x7}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) executing program 0: capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000000040)={0x200000, 0x200000}) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xa, 0xf, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x7}, {}, {0x85, 0x0, 0x0, 0x88}}, {{0x5, 0x0, 0x3}}, [], {{}, {0x6, 0x0, 0x5, 0x7}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) [ 76.567001][ T4013] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 76.593968][ T4013] ext4 filesystem being mounted at /root/syzkaller-testdir2163917739/syzkaller.mpqcH0/4/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 76.620783][ T3793] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockname$packet(r0, 0x0, &(0x7f0000000180)) [ 76.641153][ T3769] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. executing program 1: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockname$packet(r0, 0x0, &(0x7f0000000180)) executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.stat\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000100), 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r0, 0x0) r1 = signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) move_mount(r0, &(0x7f00000000c0)='./file0\x00', r1, &(0x7f0000000180)='./file0\x00', 0x54) executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000001c0)="d8000000180081064e81f782db44b904021d005c06007c07e8fe55a1040008400100142603600e120800060000000401a80008000800104003001100036010fab94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef52a98516277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db70100000040fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9701", 0xd8}], 0x1}, 0x0) executing program 4: r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, 0x0, &(0x7f0000000100)=@udp}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="c00000001900030100000000000000007f000001000000000000000000000000fc00000000000000000000000000000000000000000000000200200000000000", @ANYRES32=0xee00, @ANYBLOB], 0xc0}}, 0x0) [ 76.700596][ T4032] capability: warning: `syz-executor.3' uses deprecated v2 capabilities in a way that may be insecure executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'ipvlan0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000400)={'ip6tnl0\x00', &(0x7f0000000000)={'syztnl1\x00', r2, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @loopback={0xfec0ffff00000000, 0x2}}}) executing program 3: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xf6150000, 0x1000}, 0x20) r1 = socket$nl_audit(0x10, 0x3, 0x9) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="2800000035005700000000000000f0ff02ffffffe5000000100001800c001000080001"], 0x28}}, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000200)}, 0x20) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x5, 0x1, 0x7, 0x1120, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x0, 0x3}, 0x48) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r6, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) r7 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r7, 0x8918, &(0x7f0000000080)={@loopback={0x0, 0xff08}, 0x0, r8}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'syzkaller0\x00', 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in6=@private1, @in=@remote, 0x4e24, 0x0, 0x0, 0x0, 0x2, 0x80, 0x0, 0x3a, r9, r10}, {0x2, 0x9, 0x70, 0x2, 0x4, 0x0, 0x3, 0x7fffffffffffffff}, {0x7ff, 0x0, 0x100, 0x100000000}, 0x1, 0x6e6bbd, 0x2, 0x0, 0x2}, {{@in6=@local, 0x4d3, 0x33}, 0x2, @in=@multicast1, 0x0, 0x4, 0x2, 0xc2, 0x0, 0x8, 0x401}}, 0xe8) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000001c0)={0x19c, 0x2, 0x2, 0x101, 0x70bd2a, 0x25dfdbfe, {0xc, 0x0, 0x5}, [@nested={0xfa, 0x61, 0x0, 0x1, [@typed={0x8, 0x7e, 0x0, 0x0, @uid=r10}, @generic="fda26ca18b26a93bbeb97e232f62eecd3dae47f4248c3b568cb09072ae4091e90912a57fb04e4d796e120443094a87b422b5e27f36199f55cd54121a67bbea708e220ecf98110d83b87d907dca0158d951cfe1104c094c41996f9c4320848d800af4c8d5395bf5ec62a227c8aaa450ee582b40833a2eeea97d3b59ef67966a752cd10068cb689e65a3242e08cc716ca123526e22c2254e7b6c6f26995846cc268e98fe7eaa8c70ccb8084aa4aa059155461ac2be2a52a7dae7c83da0e87e95375795381347852715762ab220861e29ca06c5a450940ccec59736f45200ac93d969e1b9d7815faa71c77d9209405a"]}, @generic="a4cc378e7db7def04fb60290c2380dad96b9ff0d657d792e15349218a6c202981a9427bf475cc6084f2e29bf8bef857466efe38b4dc645bd60bc970ecfbf9e88a08651ef8575630ce221ce924fc00c62d8207a39e52f0e13b49b797e40f6895a7f39d8c62d219303ef78c3e2e366afba6e2f39b07b9ecaf9e4dc", @typed={0xc, 0x7f, 0x0, 0x0, @u64=0xfffffffffffffe06}, @typed={0x4, 0xc}]}, 0x19c}, 0x1, 0x0, 0x0, 0x4}, 0x4000001) setsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f0000000000)={{{@in=@rand_addr=0x64010100, @in6=@ipv4={'\x00', '\xff\xff', @private=0xa010102}, 0x4e22, 0x4, 0x4e24, 0x7, 0x0, 0xa0, 0x20, 0x0, r8, r10}, {0xaf, 0x0, 0x2, 0x6, 0xd00, 0xffffffffffffffff, 0x7, 0x1f}, {0x100000001, 0x7f, 0x10000, 0x8000000000000001}, 0x7, 0x6e6bc0, 0x1, 0x1, 0x2, 0x1}, {{@in=@remote, 0x4d3, 0xff}, 0x2, @in6=@loopback, 0x3506, 0x4, 0x3, 0x29, 0x2, 0xda}}, 0xe8) r11 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') preadv(r11, &(0x7f0000000180), 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0xd, &(0x7f0000000340)=@raw=[@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xf17}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @map_fd={0x18, 0x5, 0x1, 0x0, r5}, @call={0x85, 0x0, 0x0, 0xaa}, @jmp={0x5, 0x0, 0xa, 0x9, 0x0, 0x20, 0x10}], &(0x7f00000003c0)='syzkaller\x00', 0x81, 0xa, &(0x7f0000000400)=""/10, 0x41100, 0x2, '\x00', r8, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x8, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000480)=[r11], &(0x7f00000004c0)=[{0x3, 0x2, 0x7, 0x9}, {0x0, 0x1, 0x6, 0x3}, {0x5, 0x2, 0xf, 0x3}, {0x3, 0x1, 0x0, 0x8}, {0x2, 0x3, 0xa, 0x3}, {0x5, 0x5, 0xd, 0x6}, {0x2, 0x3, 0x5, 0xb}, {0x2, 0x2, 0x8, 0x4}], 0x10, 0x2}, 0x90) r12 = socket$rds(0x15, 0x5, 0x0) bind$rds(r12, &(0x7f00000010c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$RDS_GET_MR(r12, 0x114, 0x2, &(0x7f0000001040)={{0x0}, 0x0}, 0x20) r13 = syz_pidfd_open(0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ppoll(&(0x7f0000000040)=[{r0, 0x95}, {r1, 0x71b1}, {r2, 0x5000}, {r3, 0x8004}, {r11, 0x249}, {r12, 0x8608}, {r13, 0x60c}], 0x7, &(0x7f0000000100)={r14, r15+10000000}, &(0x7f0000000140)={[0x5]}, 0x8) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f00000000c0)='./bus\x00', 0x2100d0, &(0x7f0000000100), 0x1, 0x4b9, &(0x7f0000000540)="$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") renameat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000200)='./bus\x00', 0x0) executing program 2: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fsopen(&(0x7f0000000100)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r1, &(0x7f0000000140)='./file0\x00') openat2(r1, &(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x8}, 0x18) executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'ipvlan0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000400)={'ip6tnl0\x00', &(0x7f0000000000)={'syztnl1\x00', r2, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @loopback={0xfec0ffff00000000, 0x2}}}) [ 76.774024][ T4039] netlink: 184 bytes leftover after parsing attributes in process `syz-executor.0'. [ 76.791060][ T4042] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xf6150000, 0x1000}, 0x20) r1 = socket$nl_audit(0x10, 0x3, 0x9) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="2800000035005700000000000000f0ff02ffffffe5000000100001800c001000080001"], 0x28}}, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000200)}, 0x20) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x5, 0x1, 0x7, 0x1120, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x0, 0x3}, 0x48) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r6, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) r7 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r7, 0x8918, &(0x7f0000000080)={@loopback={0x0, 0xff08}, 0x0, r8}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'syzkaller0\x00', 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in6=@private1, @in=@remote, 0x4e24, 0x0, 0x0, 0x0, 0x2, 0x80, 0x0, 0x3a, r9, r10}, {0x2, 0x9, 0x70, 0x2, 0x4, 0x0, 0x3, 0x7fffffffffffffff}, {0x7ff, 0x0, 0x100, 0x100000000}, 0x1, 0x6e6bbd, 0x2, 0x0, 0x2}, {{@in6=@local, 0x4d3, 0x33}, 0x2, @in=@multicast1, 0x0, 0x4, 0x2, 0xc2, 0x0, 0x8, 0x401}}, 0xe8) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000001c0)={0x19c, 0x2, 0x2, 0x101, 0x70bd2a, 0x25dfdbfe, {0xc, 0x0, 0x5}, [@nested={0xfa, 0x61, 0x0, 0x1, [@typed={0x8, 0x7e, 0x0, 0x0, @uid=r10}, @generic="fda26ca18b26a93bbeb97e232f62eecd3dae47f4248c3b568cb09072ae4091e90912a57fb04e4d796e120443094a87b422b5e27f36199f55cd54121a67bbea708e220ecf98110d83b87d907dca0158d951cfe1104c094c41996f9c4320848d800af4c8d5395bf5ec62a227c8aaa450ee582b40833a2eeea97d3b59ef67966a752cd10068cb689e65a3242e08cc716ca123526e22c2254e7b6c6f26995846cc268e98fe7eaa8c70ccb8084aa4aa059155461ac2be2a52a7dae7c83da0e87e95375795381347852715762ab220861e29ca06c5a450940ccec59736f45200ac93d969e1b9d7815faa71c77d9209405a"]}, @generic="a4cc378e7db7def04fb60290c2380dad96b9ff0d657d792e15349218a6c202981a9427bf475cc6084f2e29bf8bef857466efe38b4dc645bd60bc970ecfbf9e88a08651ef8575630ce221ce924fc00c62d8207a39e52f0e13b49b797e40f6895a7f39d8c62d219303ef78c3e2e366afba6e2f39b07b9ecaf9e4dc", @typed={0xc, 0x7f, 0x0, 0x0, @u64=0xfffffffffffffe06}, @typed={0x4, 0xc}]}, 0x19c}, 0x1, 0x0, 0x0, 0x4}, 0x4000001) setsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f0000000000)={{{@in=@rand_addr=0x64010100, @in6=@ipv4={'\x00', '\xff\xff', @private=0xa010102}, 0x4e22, 0x4, 0x4e24, 0x7, 0x0, 0xa0, 0x20, 0x0, r8, r10}, {0xaf, 0x0, 0x2, 0x6, 0xd00, 0xffffffffffffffff, 0x7, 0x1f}, {0x100000001, 0x7f, 0x10000, 0x8000000000000001}, 0x7, 0x6e6bc0, 0x1, 0x1, 0x2, 0x1}, {{@in=@remote, 0x4d3, 0xff}, 0x2, @in6=@loopback, 0x3506, 0x4, 0x3, 0x29, 0x2, 0xda}}, 0xe8) r11 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') preadv(r11, &(0x7f0000000180), 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0xd, &(0x7f0000000340)=@raw=[@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xf17}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @map_fd={0x18, 0x5, 0x1, 0x0, r5}, @call={0x85, 0x0, 0x0, 0xaa}, @jmp={0x5, 0x0, 0xa, 0x9, 0x0, 0x20, 0x10}], &(0x7f00000003c0)='syzkaller\x00', 0x81, 0xa, &(0x7f0000000400)=""/10, 0x41100, 0x2, '\x00', r8, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x8, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000480)=[r11], &(0x7f00000004c0)=[{0x3, 0x2, 0x7, 0x9}, {0x0, 0x1, 0x6, 0x3}, {0x5, 0x2, 0xf, 0x3}, {0x3, 0x1, 0x0, 0x8}, {0x2, 0x3, 0xa, 0x3}, {0x5, 0x5, 0xd, 0x6}, {0x2, 0x3, 0x5, 0xb}, {0x2, 0x2, 0x8, 0x4}], 0x10, 0x2}, 0x90) r12 = socket$rds(0x15, 0x5, 0x0) bind$rds(r12, &(0x7f00000010c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$RDS_GET_MR(r12, 0x114, 0x2, &(0x7f0000001040)={{0x0}, 0x0}, 0x20) r13 = syz_pidfd_open(0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ppoll(&(0x7f0000000040)=[{r0, 0x95}, {r1, 0x71b1}, {r2, 0x5000}, {r3, 0x8004}, {r11, 0x249}, {r12, 0x8608}, {r13, 0x60c}], 0x7, &(0x7f0000000100)={r14, r15+10000000}, &(0x7f0000000140)={[0x5]}, 0x8) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f00000000c0)='./bus\x00', 0x2100d0, &(0x7f0000000100), 0x1, 0x4b9, &(0x7f0000000540)="$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") renameat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000200)='./bus\x00', 0x0) executing program 2: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xf6150000, 0x1000}, 0x20) r1 = socket$nl_audit(0x10, 0x3, 0x9) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="2800000035005700000000000000f0ff02ffffffe5000000100001800c001000080001"], 0x28}}, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000200)}, 0x20) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x5, 0x1, 0x7, 0x1120, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x0, 0x3}, 0x48) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r6, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) r7 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r7, 0x8918, &(0x7f0000000080)={@loopback={0x0, 0xff08}, 0x0, r8}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'syzkaller0\x00', 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in6=@private1, @in=@remote, 0x4e24, 0x0, 0x0, 0x0, 0x2, 0x80, 0x0, 0x3a, r9, r10}, {0x2, 0x9, 0x70, 0x2, 0x4, 0x0, 0x3, 0x7fffffffffffffff}, {0x7ff, 0x0, 0x100, 0x100000000}, 0x1, 0x6e6bbd, 0x2, 0x0, 0x2}, {{@in6=@local, 0x4d3, 0x33}, 0x2, @in=@multicast1, 0x0, 0x4, 0x2, 0xc2, 0x0, 0x8, 0x401}}, 0xe8) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000001c0)={0x19c, 0x2, 0x2, 0x101, 0x70bd2a, 0x25dfdbfe, {0xc, 0x0, 0x5}, [@nested={0xfa, 0x61, 0x0, 0x1, [@typed={0x8, 0x7e, 0x0, 0x0, @uid=r10}, @generic="fda26ca18b26a93bbeb97e232f62eecd3dae47f4248c3b568cb09072ae4091e90912a57fb04e4d796e120443094a87b422b5e27f36199f55cd54121a67bbea708e220ecf98110d83b87d907dca0158d951cfe1104c094c41996f9c4320848d800af4c8d5395bf5ec62a227c8aaa450ee582b40833a2eeea97d3b59ef67966a752cd10068cb689e65a3242e08cc716ca123526e22c2254e7b6c6f26995846cc268e98fe7eaa8c70ccb8084aa4aa059155461ac2be2a52a7dae7c83da0e87e95375795381347852715762ab220861e29ca06c5a450940ccec59736f45200ac93d969e1b9d7815faa71c77d9209405a"]}, @generic="a4cc378e7db7def04fb60290c2380dad96b9ff0d657d792e15349218a6c202981a9427bf475cc6084f2e29bf8bef857466efe38b4dc645bd60bc970ecfbf9e88a08651ef8575630ce221ce924fc00c62d8207a39e52f0e13b49b797e40f6895a7f39d8c62d219303ef78c3e2e366afba6e2f39b07b9ecaf9e4dc", @typed={0xc, 0x7f, 0x0, 0x0, @u64=0xfffffffffffffe06}, @typed={0x4, 0xc}]}, 0x19c}, 0x1, 0x0, 0x0, 0x4}, 0x4000001) setsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f0000000000)={{{@in=@rand_addr=0x64010100, @in6=@ipv4={'\x00', '\xff\xff', @private=0xa010102}, 0x4e22, 0x4, 0x4e24, 0x7, 0x0, 0xa0, 0x20, 0x0, r8, r10}, {0xaf, 0x0, 0x2, 0x6, 0xd00, 0xffffffffffffffff, 0x7, 0x1f}, {0x100000001, 0x7f, 0x10000, 0x8000000000000001}, 0x7, 0x6e6bc0, 0x1, 0x1, 0x2, 0x1}, {{@in=@remote, 0x4d3, 0xff}, 0x2, @in6=@loopback, 0x3506, 0x4, 0x3, 0x29, 0x2, 0xda}}, 0xe8) r11 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') preadv(r11, &(0x7f0000000180), 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0xd, &(0x7f0000000340)=@raw=[@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xf17}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @map_fd={0x18, 0x5, 0x1, 0x0, r5}, @call={0x85, 0x0, 0x0, 0xaa}, @jmp={0x5, 0x0, 0xa, 0x9, 0x0, 0x20, 0x10}], &(0x7f00000003c0)='syzkaller\x00', 0x81, 0xa, &(0x7f0000000400)=""/10, 0x41100, 0x2, '\x00', r8, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x8, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000480)=[r11], &(0x7f00000004c0)=[{0x3, 0x2, 0x7, 0x9}, {0x0, 0x1, 0x6, 0x3}, {0x5, 0x2, 0xf, 0x3}, {0x3, 0x1, 0x0, 0x8}, {0x2, 0x3, 0xa, 0x3}, {0x5, 0x5, 0xd, 0x6}, {0x2, 0x3, 0x5, 0xb}, {0x2, 0x2, 0x8, 0x4}], 0x10, 0x2}, 0x90) r12 = socket$rds(0x15, 0x5, 0x0) bind$rds(r12, &(0x7f00000010c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$RDS_GET_MR(r12, 0x114, 0x2, &(0x7f0000001040)={{0x0}, 0x0}, 0x20) r13 = syz_pidfd_open(0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ppoll(&(0x7f0000000040)=[{r0, 0x95}, {r1, 0x71b1}, {r2, 0x5000}, {r3, 0x8004}, {r11, 0x249}, {r12, 0x8608}, {r13, 0x60c}], 0x7, &(0x7f0000000100)={r14, r15+10000000}, &(0x7f0000000140)={[0x5]}, 0x8) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f00000000c0)='./bus\x00', 0x2100d0, &(0x7f0000000100), 0x1, 0x4b9, &(0x7f0000000540)="$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") renameat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000200)='./bus\x00', 0x0) [ 76.817053][ T4046] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 76.827103][ T4045] loop3: detected capacity change from 0 to 512 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) r0 = inotify_init1(0x0) r1 = open$dir(&(0x7f0000000080)='./file0/bus\x00', 0x0, 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x20) getdents64(r1, 0x0, 0x0) executing program 0: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xf6150000, 0x1000}, 0x20) r1 = socket$nl_audit(0x10, 0x3, 0x9) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="2800000035005700000000000000f0ff02ffffffe5000000100001800c001000080001"], 0x28}}, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000200)}, 0x20) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x5, 0x1, 0x7, 0x1120, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x0, 0x3}, 0x48) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r6, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) r7 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r7, 0x8918, &(0x7f0000000080)={@loopback={0x0, 0xff08}, 0x0, r8}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'syzkaller0\x00', 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in6=@private1, @in=@remote, 0x4e24, 0x0, 0x0, 0x0, 0x2, 0x80, 0x0, 0x3a, r9, r10}, {0x2, 0x9, 0x70, 0x2, 0x4, 0x0, 0x3, 0x7fffffffffffffff}, {0x7ff, 0x0, 0x100, 0x100000000}, 0x1, 0x6e6bbd, 0x2, 0x0, 0x2}, {{@in6=@local, 0x4d3, 0x33}, 0x2, @in=@multicast1, 0x0, 0x4, 0x2, 0xc2, 0x0, 0x8, 0x401}}, 0xe8) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000001c0)={0x19c, 0x2, 0x2, 0x101, 0x70bd2a, 0x25dfdbfe, {0xc, 0x0, 0x5}, [@nested={0xfa, 0x61, 0x0, 0x1, [@typed={0x8, 0x7e, 0x0, 0x0, @uid=r10}, @generic="fda26ca18b26a93bbeb97e232f62eecd3dae47f4248c3b568cb09072ae4091e90912a57fb04e4d796e120443094a87b422b5e27f36199f55cd54121a67bbea708e220ecf98110d83b87d907dca0158d951cfe1104c094c41996f9c4320848d800af4c8d5395bf5ec62a227c8aaa450ee582b40833a2eeea97d3b59ef67966a752cd10068cb689e65a3242e08cc716ca123526e22c2254e7b6c6f26995846cc268e98fe7eaa8c70ccb8084aa4aa059155461ac2be2a52a7dae7c83da0e87e95375795381347852715762ab220861e29ca06c5a450940ccec59736f45200ac93d969e1b9d7815faa71c77d9209405a"]}, @generic="a4cc378e7db7def04fb60290c2380dad96b9ff0d657d792e15349218a6c202981a9427bf475cc6084f2e29bf8bef857466efe38b4dc645bd60bc970ecfbf9e88a08651ef8575630ce221ce924fc00c62d8207a39e52f0e13b49b797e40f6895a7f39d8c62d219303ef78c3e2e366afba6e2f39b07b9ecaf9e4dc", @typed={0xc, 0x7f, 0x0, 0x0, @u64=0xfffffffffffffe06}, @typed={0x4, 0xc}]}, 0x19c}, 0x1, 0x0, 0x0, 0x4}, 0x4000001) setsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f0000000000)={{{@in=@rand_addr=0x64010100, @in6=@ipv4={'\x00', '\xff\xff', @private=0xa010102}, 0x4e22, 0x4, 0x4e24, 0x7, 0x0, 0xa0, 0x20, 0x0, r8, r10}, {0xaf, 0x0, 0x2, 0x6, 0xd00, 0xffffffffffffffff, 0x7, 0x1f}, {0x100000001, 0x7f, 0x10000, 0x8000000000000001}, 0x7, 0x6e6bc0, 0x1, 0x1, 0x2, 0x1}, {{@in=@remote, 0x4d3, 0xff}, 0x2, @in6=@loopback, 0x3506, 0x4, 0x3, 0x29, 0x2, 0xda}}, 0xe8) r11 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') preadv(r11, &(0x7f0000000180), 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0xd, &(0x7f0000000340)=@raw=[@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xf17}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @map_fd={0x18, 0x5, 0x1, 0x0, r5}, @call={0x85, 0x0, 0x0, 0xaa}, @jmp={0x5, 0x0, 0xa, 0x9, 0x0, 0x20, 0x10}], &(0x7f00000003c0)='syzkaller\x00', 0x81, 0xa, &(0x7f0000000400)=""/10, 0x41100, 0x2, '\x00', r8, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x8, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000480)=[r11], &(0x7f00000004c0)=[{0x3, 0x2, 0x7, 0x9}, {0x0, 0x1, 0x6, 0x3}, {0x5, 0x2, 0xf, 0x3}, {0x3, 0x1, 0x0, 0x8}, {0x2, 0x3, 0xa, 0x3}, {0x5, 0x5, 0xd, 0x6}, {0x2, 0x3, 0x5, 0xb}, {0x2, 0x2, 0x8, 0x4}], 0x10, 0x2}, 0x90) r12 = socket$rds(0x15, 0x5, 0x0) bind$rds(r12, &(0x7f00000010c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$RDS_GET_MR(r12, 0x114, 0x2, &(0x7f0000001040)={{0x0}, 0x0}, 0x20) r13 = syz_pidfd_open(0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ppoll(&(0x7f0000000040)=[{r0, 0x95}, {r1, 0x71b1}, {r2, 0x5000}, {r3, 0x8004}, {r11, 0x249}, {r12, 0x8608}, {r13, 0x60c}], 0x7, &(0x7f0000000100)={r14, r15+10000000}, &(0x7f0000000140)={[0x5]}, 0x8) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f00000000c0)='./bus\x00', 0x2100d0, &(0x7f0000000100), 0x1, 0x4b9, &(0x7f0000000540)="$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") renameat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000200)='./bus\x00', 0x0) [ 76.905351][ T4052] loop4: detected capacity change from 0 to 512 [ 76.918193][ T4045] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 76.937340][ T4045] ext4 filesystem being mounted at /root/syzkaller-testdir2676061251/syzkaller.csB4Ho/13/bus supports timestamps until 2038-01-19 (0x7fffffff) executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.stat\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000100), 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r0, 0x0) r1 = signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) move_mount(r0, &(0x7f00000000c0)='./file0\x00', r1, &(0x7f0000000180)='./file0\x00', 0x54) executing program 3: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xf6150000, 0x1000}, 0x20) r1 = socket$nl_audit(0x10, 0x3, 0x9) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="2800000035005700000000000000f0ff02ffffffe5000000100001800c001000080001"], 0x28}}, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000200)}, 0x20) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x5, 0x1, 0x7, 0x1120, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x0, 0x3}, 0x48) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r6, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) r7 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r7, 0x8918, &(0x7f0000000080)={@loopback={0x0, 0xff08}, 0x0, r8}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'syzkaller0\x00', 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in6=@private1, @in=@remote, 0x4e24, 0x0, 0x0, 0x0, 0x2, 0x80, 0x0, 0x3a, r9, r10}, {0x2, 0x9, 0x70, 0x2, 0x4, 0x0, 0x3, 0x7fffffffffffffff}, {0x7ff, 0x0, 0x100, 0x100000000}, 0x1, 0x6e6bbd, 0x2, 0x0, 0x2}, {{@in6=@local, 0x4d3, 0x33}, 0x2, @in=@multicast1, 0x0, 0x4, 0x2, 0xc2, 0x0, 0x8, 0x401}}, 0xe8) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000001c0)={0x19c, 0x2, 0x2, 0x101, 0x70bd2a, 0x25dfdbfe, {0xc, 0x0, 0x5}, [@nested={0xfa, 0x61, 0x0, 0x1, [@typed={0x8, 0x7e, 0x0, 0x0, @uid=r10}, @generic="fda26ca18b26a93bbeb97e232f62eecd3dae47f4248c3b568cb09072ae4091e90912a57fb04e4d796e120443094a87b422b5e27f36199f55cd54121a67bbea708e220ecf98110d83b87d907dca0158d951cfe1104c094c41996f9c4320848d800af4c8d5395bf5ec62a227c8aaa450ee582b40833a2eeea97d3b59ef67966a752cd10068cb689e65a3242e08cc716ca123526e22c2254e7b6c6f26995846cc268e98fe7eaa8c70ccb8084aa4aa059155461ac2be2a52a7dae7c83da0e87e95375795381347852715762ab220861e29ca06c5a450940ccec59736f45200ac93d969e1b9d7815faa71c77d9209405a"]}, @generic="a4cc378e7db7def04fb60290c2380dad96b9ff0d657d792e15349218a6c202981a9427bf475cc6084f2e29bf8bef857466efe38b4dc645bd60bc970ecfbf9e88a08651ef8575630ce221ce924fc00c62d8207a39e52f0e13b49b797e40f6895a7f39d8c62d219303ef78c3e2e366afba6e2f39b07b9ecaf9e4dc", @typed={0xc, 0x7f, 0x0, 0x0, @u64=0xfffffffffffffe06}, @typed={0x4, 0xc}]}, 0x19c}, 0x1, 0x0, 0x0, 0x4}, 0x4000001) setsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f0000000000)={{{@in=@rand_addr=0x64010100, @in6=@ipv4={'\x00', '\xff\xff', @private=0xa010102}, 0x4e22, 0x4, 0x4e24, 0x7, 0x0, 0xa0, 0x20, 0x0, r8, r10}, {0xaf, 0x0, 0x2, 0x6, 0xd00, 0xffffffffffffffff, 0x7, 0x1f}, {0x100000001, 0x7f, 0x10000, 0x8000000000000001}, 0x7, 0x6e6bc0, 0x1, 0x1, 0x2, 0x1}, {{@in=@remote, 0x4d3, 0xff}, 0x2, @in6=@loopback, 0x3506, 0x4, 0x3, 0x29, 0x2, 0xda}}, 0xe8) r11 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') preadv(r11, &(0x7f0000000180), 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0xd, &(0x7f0000000340)=@raw=[@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xf17}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @map_fd={0x18, 0x5, 0x1, 0x0, r5}, @call={0x85, 0x0, 0x0, 0xaa}, @jmp={0x5, 0x0, 0xa, 0x9, 0x0, 0x20, 0x10}], &(0x7f00000003c0)='syzkaller\x00', 0x81, 0xa, &(0x7f0000000400)=""/10, 0x41100, 0x2, '\x00', r8, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x8, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000480)=[r11], &(0x7f00000004c0)=[{0x3, 0x2, 0x7, 0x9}, {0x0, 0x1, 0x6, 0x3}, {0x5, 0x2, 0xf, 0x3}, {0x3, 0x1, 0x0, 0x8}, {0x2, 0x3, 0xa, 0x3}, {0x5, 0x5, 0xd, 0x6}, {0x2, 0x3, 0x5, 0xb}, {0x2, 0x2, 0x8, 0x4}], 0x10, 0x2}, 0x90) r12 = socket$rds(0x15, 0x5, 0x0) bind$rds(r12, &(0x7f00000010c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$RDS_GET_MR(r12, 0x114, 0x2, &(0x7f0000001040)={{0x0}, 0x0}, 0x20) r13 = syz_pidfd_open(0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ppoll(&(0x7f0000000040)=[{r0, 0x95}, {r1, 0x71b1}, {r2, 0x5000}, {r3, 0x8004}, {r11, 0x249}, {r12, 0x8608}, {r13, 0x60c}], 0x7, &(0x7f0000000100)={r14, r15+10000000}, &(0x7f0000000140)={[0x5]}, 0x8) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f00000000c0)='./bus\x00', 0x2100d0, &(0x7f0000000100), 0x1, 0x4b9, &(0x7f0000000540)="$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") renameat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000200)='./bus\x00', 0x0) [ 76.941995][ T4054] loop2: detected capacity change from 0 to 512 [ 76.965399][ T4052] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 76.971671][ T4059] loop0: detected capacity change from 0 to 512 executing program 1: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xf6150000, 0x1000}, 0x20) r1 = socket$nl_audit(0x10, 0x3, 0x9) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="2800000035005700000000000000f0ff02ffffffe5000000100001800c001000080001"], 0x28}}, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000200)}, 0x20) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x5, 0x1, 0x7, 0x1120, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x0, 0x3}, 0x48) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r6, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) r7 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r7, 0x8918, &(0x7f0000000080)={@loopback={0x0, 0xff08}, 0x0, r8}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'syzkaller0\x00', 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in6=@private1, @in=@remote, 0x4e24, 0x0, 0x0, 0x0, 0x2, 0x80, 0x0, 0x3a, r9, r10}, {0x2, 0x9, 0x70, 0x2, 0x4, 0x0, 0x3, 0x7fffffffffffffff}, {0x7ff, 0x0, 0x100, 0x100000000}, 0x1, 0x6e6bbd, 0x2, 0x0, 0x2}, {{@in6=@local, 0x4d3, 0x33}, 0x2, @in=@multicast1, 0x0, 0x4, 0x2, 0xc2, 0x0, 0x8, 0x401}}, 0xe8) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000001c0)={0x19c, 0x2, 0x2, 0x101, 0x70bd2a, 0x25dfdbfe, {0xc, 0x0, 0x5}, [@nested={0xfa, 0x61, 0x0, 0x1, [@typed={0x8, 0x7e, 0x0, 0x0, @uid=r10}, @generic="fda26ca18b26a93bbeb97e232f62eecd3dae47f4248c3b568cb09072ae4091e90912a57fb04e4d796e120443094a87b422b5e27f36199f55cd54121a67bbea708e220ecf98110d83b87d907dca0158d951cfe1104c094c41996f9c4320848d800af4c8d5395bf5ec62a227c8aaa450ee582b40833a2eeea97d3b59ef67966a752cd10068cb689e65a3242e08cc716ca123526e22c2254e7b6c6f26995846cc268e98fe7eaa8c70ccb8084aa4aa059155461ac2be2a52a7dae7c83da0e87e95375795381347852715762ab220861e29ca06c5a450940ccec59736f45200ac93d969e1b9d7815faa71c77d9209405a"]}, @generic="a4cc378e7db7def04fb60290c2380dad96b9ff0d657d792e15349218a6c202981a9427bf475cc6084f2e29bf8bef857466efe38b4dc645bd60bc970ecfbf9e88a08651ef8575630ce221ce924fc00c62d8207a39e52f0e13b49b797e40f6895a7f39d8c62d219303ef78c3e2e366afba6e2f39b07b9ecaf9e4dc", @typed={0xc, 0x7f, 0x0, 0x0, @u64=0xfffffffffffffe06}, @typed={0x4, 0xc}]}, 0x19c}, 0x1, 0x0, 0x0, 0x4}, 0x4000001) setsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f0000000000)={{{@in=@rand_addr=0x64010100, @in6=@ipv4={'\x00', '\xff\xff', @private=0xa010102}, 0x4e22, 0x4, 0x4e24, 0x7, 0x0, 0xa0, 0x20, 0x0, r8, r10}, {0xaf, 0x0, 0x2, 0x6, 0xd00, 0xffffffffffffffff, 0x7, 0x1f}, {0x100000001, 0x7f, 0x10000, 0x8000000000000001}, 0x7, 0x6e6bc0, 0x1, 0x1, 0x2, 0x1}, {{@in=@remote, 0x4d3, 0xff}, 0x2, @in6=@loopback, 0x3506, 0x4, 0x3, 0x29, 0x2, 0xda}}, 0xe8) r11 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') preadv(r11, &(0x7f0000000180), 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0xd, &(0x7f0000000340)=@raw=[@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xf17}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @map_fd={0x18, 0x5, 0x1, 0x0, r5}, @call={0x85, 0x0, 0x0, 0xaa}, @jmp={0x5, 0x0, 0xa, 0x9, 0x0, 0x20, 0x10}], &(0x7f00000003c0)='syzkaller\x00', 0x81, 0xa, &(0x7f0000000400)=""/10, 0x41100, 0x2, '\x00', r8, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x8, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000480)=[r11], &(0x7f00000004c0)=[{0x3, 0x2, 0x7, 0x9}, {0x0, 0x1, 0x6, 0x3}, {0x5, 0x2, 0xf, 0x3}, {0x3, 0x1, 0x0, 0x8}, {0x2, 0x3, 0xa, 0x3}, {0x5, 0x5, 0xd, 0x6}, {0x2, 0x3, 0x5, 0xb}, {0x2, 0x2, 0x8, 0x4}], 0x10, 0x2}, 0x90) r12 = socket$rds(0x15, 0x5, 0x0) bind$rds(r12, &(0x7f00000010c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$RDS_GET_MR(r12, 0x114, 0x2, &(0x7f0000001040)={{0x0}, 0x0}, 0x20) r13 = syz_pidfd_open(0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ppoll(&(0x7f0000000040)=[{r0, 0x95}, {r1, 0x71b1}, {r2, 0x5000}, {r3, 0x8004}, {r11, 0x249}, {r12, 0x8608}, {r13, 0x60c}], 0x7, &(0x7f0000000100)={r14, r15+10000000}, &(0x7f0000000140)={[0x5]}, 0x8) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f00000000c0)='./bus\x00', 0x2100d0, &(0x7f0000000100), 0x1, 0x4b9, &(0x7f0000000540)="$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") renameat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000200)='./bus\x00', 0x0) [ 76.993491][ T4052] ext4 filesystem being mounted at /root/syzkaller-testdir3636980945/syzkaller.Qg79Ho/6/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 77.012932][ T3793] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. executing program 4: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockname$packet(r0, 0x0, &(0x7f0000000180)) executing program 2: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fsopen(&(0x7f0000000100)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r1, &(0x7f0000000140)='./file0\x00') openat2(r1, &(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x8}, 0x18) [ 77.047788][ T4066] loop1: detected capacity change from 0 to 512 [ 77.051759][ T4054] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 77.067565][ T4054] ext4 filesystem being mounted at /root/syzkaller-testdir2425205832/syzkaller.xiDwdI/8/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 77.084112][ T4059] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.stat\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000100), 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r0, 0x0) r1 = signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) move_mount(r0, &(0x7f00000000c0)='./file0\x00', r1, &(0x7f0000000180)='./file0\x00', 0x54) [ 77.092640][ T3776] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 77.106481][ T4059] ext4 filesystem being mounted at /root/syzkaller-testdir2163917739/syzkaller.mpqcH0/8/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 77.126975][ T3775] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 77.139520][ T4072] loop3: detected capacity change from 0 to 512 [ 77.145071][ T4066] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 77.163340][ T4066] ext4 filesystem being mounted at /root/syzkaller-testdir4100334086/syzkaller.wrzQRl/15/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 77.163532][ T3769] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) r0 = inotify_init1(0x0) r1 = open$dir(&(0x7f0000000080)='./file0/bus\x00', 0x0, 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x20) getdents64(r1, 0x0, 0x0) executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) r0 = inotify_init1(0x0) r1 = open$dir(&(0x7f0000000080)='./file0/bus\x00', 0x0, 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x20) getdents64(r1, 0x0, 0x0) executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000001c0)="d8000000180081064e81f782db44b904021d005c06007c07e8fe55a1040008400100142603600e120800060000000401a80008000800104003001100036010fab94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef52a98516277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db70100000040fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9701", 0xd8}], 0x1}, 0x0) [ 77.202324][ T4072] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 77.223936][ T4072] ext4 filesystem being mounted at /root/syzkaller-testdir2676061251/syzkaller.csB4Ho/14/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 77.239760][ T3800] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. executing program 4: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fsopen(&(0x7f0000000100)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r1, &(0x7f0000000140)='./file0\x00') openat2(r1, &(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x8}, 0x18) executing program 3: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fsopen(&(0x7f0000000100)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r1, &(0x7f0000000140)='./file0\x00') openat2(r1, &(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x8}, 0x18) executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000200)=0x632a, 0x4) setsockopt$inet6_int(r0, 0x29, 0x42, &(0x7f00000000c0)=0x7, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e26, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) recvmmsg(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2000, 0x0) executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xf6150000, 0x1000}, 0x20) r1 = socket$nl_audit(0x10, 0x3, 0x9) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="2800000035005700000000000000f0ff02ffffffe5000000100001800c001000080001"], 0x28}}, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000200)}, 0x20) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x5, 0x1, 0x7, 0x1120, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x0, 0x3}, 0x48) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r6, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) r7 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r7, 0x8918, &(0x7f0000000080)={@loopback={0x0, 0xff08}, 0x0, r8}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'syzkaller0\x00', 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in6=@private1, @in=@remote, 0x4e24, 0x0, 0x0, 0x0, 0x2, 0x80, 0x0, 0x3a, r9, r10}, {0x2, 0x9, 0x70, 0x2, 0x4, 0x0, 0x3, 0x7fffffffffffffff}, {0x7ff, 0x0, 0x100, 0x100000000}, 0x1, 0x6e6bbd, 0x2, 0x0, 0x2}, {{@in6=@local, 0x4d3, 0x33}, 0x2, @in=@multicast1, 0x0, 0x4, 0x2, 0xc2, 0x0, 0x8, 0x401}}, 0xe8) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000001c0)={0x19c, 0x2, 0x2, 0x101, 0x70bd2a, 0x25dfdbfe, {0xc, 0x0, 0x5}, [@nested={0xfa, 0x61, 0x0, 0x1, [@typed={0x8, 0x7e, 0x0, 0x0, @uid=r10}, @generic="fda26ca18b26a93bbeb97e232f62eecd3dae47f4248c3b568cb09072ae4091e90912a57fb04e4d796e120443094a87b422b5e27f36199f55cd54121a67bbea708e220ecf98110d83b87d907dca0158d951cfe1104c094c41996f9c4320848d800af4c8d5395bf5ec62a227c8aaa450ee582b40833a2eeea97d3b59ef67966a752cd10068cb689e65a3242e08cc716ca123526e22c2254e7b6c6f26995846cc268e98fe7eaa8c70ccb8084aa4aa059155461ac2be2a52a7dae7c83da0e87e95375795381347852715762ab220861e29ca06c5a450940ccec59736f45200ac93d969e1b9d7815faa71c77d9209405a"]}, @generic="a4cc378e7db7def04fb60290c2380dad96b9ff0d657d792e15349218a6c202981a9427bf475cc6084f2e29bf8bef857466efe38b4dc645bd60bc970ecfbf9e88a08651ef8575630ce221ce924fc00c62d8207a39e52f0e13b49b797e40f6895a7f39d8c62d219303ef78c3e2e366afba6e2f39b07b9ecaf9e4dc", @typed={0xc, 0x7f, 0x0, 0x0, @u64=0xfffffffffffffe06}, @typed={0x4, 0xc}]}, 0x19c}, 0x1, 0x0, 0x0, 0x4}, 0x4000001) setsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f0000000000)={{{@in=@rand_addr=0x64010100, @in6=@ipv4={'\x00', '\xff\xff', @private=0xa010102}, 0x4e22, 0x4, 0x4e24, 0x7, 0x0, 0xa0, 0x20, 0x0, r8, r10}, {0xaf, 0x0, 0x2, 0x6, 0xd00, 0xffffffffffffffff, 0x7, 0x1f}, {0x100000001, 0x7f, 0x10000, 0x8000000000000001}, 0x7, 0x6e6bc0, 0x1, 0x1, 0x2, 0x1}, {{@in=@remote, 0x4d3, 0xff}, 0x2, @in6=@loopback, 0x3506, 0x4, 0x3, 0x29, 0x2, 0xda}}, 0xe8) r11 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') preadv(r11, &(0x7f0000000180), 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0xd, &(0x7f0000000340)=@raw=[@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xf17}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @map_fd={0x18, 0x5, 0x1, 0x0, r5}, @call={0x85, 0x0, 0x0, 0xaa}, @jmp={0x5, 0x0, 0xa, 0x9, 0x0, 0x20, 0x10}], &(0x7f00000003c0)='syzkaller\x00', 0x81, 0xa, &(0x7f0000000400)=""/10, 0x41100, 0x2, '\x00', r8, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x8, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000480)=[r11], &(0x7f00000004c0)=[{0x3, 0x2, 0x7, 0x9}, {0x0, 0x1, 0x6, 0x3}, {0x5, 0x2, 0xf, 0x3}, {0x3, 0x1, 0x0, 0x8}, {0x2, 0x3, 0xa, 0x3}, {0x5, 0x5, 0xd, 0x6}, {0x2, 0x3, 0x5, 0xb}, {0x2, 0x2, 0x8, 0x4}], 0x10, 0x2}, 0x90) r12 = socket$rds(0x15, 0x5, 0x0) bind$rds(r12, &(0x7f00000010c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$RDS_GET_MR(r12, 0x114, 0x2, &(0x7f0000001040)={{0x0}, 0x0}, 0x20) r13 = syz_pidfd_open(0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ppoll(&(0x7f0000000040)=[{r0, 0x95}, {r1, 0x71b1}, {r2, 0x5000}, {r3, 0x8004}, {r11, 0x249}, {r12, 0x8608}, {r13, 0x60c}], 0x7, &(0x7f0000000100)={r14, r15+10000000}, &(0x7f0000000140)={[0x5]}, 0x8) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f00000000c0)='./bus\x00', 0x2100d0, &(0x7f0000000100), 0x1, 0x4b9, &(0x7f0000000540)="$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") renameat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000200)='./bus\x00', 0x0) executing program 2: r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, 0x0, &(0x7f0000000100)=@udp}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="c00000001900030100000000000000007f000001000000000000000000000000fc00000000000000000000000000000000000000000000000200200000000000", @ANYRES32=0xee00, @ANYBLOB], 0xc0}}, 0x0) executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6e) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000a40)=@raw={'raw\x00', 0x3c1, 0x3, 0x410, 0x278, 0x280, 0x280, 0x278, 0x280, 0x278, 0x365, 0x350, 0x340, 0x333, 0x7fffffe, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x278, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'syzkaller1\x00'}}, @common=@inet=@hashlimit1={{0x58}, {'syzkaller1\x00'}}]}, @common=@unspec=@NFQUEUE3={0x28}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x470) [ 77.270689][ T4085] netlink: 184 bytes leftover after parsing attributes in process `syz-executor.2'. [ 77.295644][ T3793] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. executing program 2: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xf6150000, 0x1000}, 0x20) r1 = socket$nl_audit(0x10, 0x3, 0x9) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="2800000035005700000000000000f0ff02ffffffe5000000100001800c001000080001"], 0x28}}, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000200)}, 0x20) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x5, 0x1, 0x7, 0x1120, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x0, 0x3}, 0x48) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r6, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) r7 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r7, 0x8918, &(0x7f0000000080)={@loopback={0x0, 0xff08}, 0x0, r8}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'syzkaller0\x00', 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in6=@private1, @in=@remote, 0x4e24, 0x0, 0x0, 0x0, 0x2, 0x80, 0x0, 0x3a, r9, r10}, {0x2, 0x9, 0x70, 0x2, 0x4, 0x0, 0x3, 0x7fffffffffffffff}, {0x7ff, 0x0, 0x100, 0x100000000}, 0x1, 0x6e6bbd, 0x2, 0x0, 0x2}, {{@in6=@local, 0x4d3, 0x33}, 0x2, @in=@multicast1, 0x0, 0x4, 0x2, 0xc2, 0x0, 0x8, 0x401}}, 0xe8) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000001c0)={0x19c, 0x2, 0x2, 0x101, 0x70bd2a, 0x25dfdbfe, {0xc, 0x0, 0x5}, [@nested={0xfa, 0x61, 0x0, 0x1, [@typed={0x8, 0x7e, 0x0, 0x0, @uid=r10}, @generic="fda26ca18b26a93bbeb97e232f62eecd3dae47f4248c3b568cb09072ae4091e90912a57fb04e4d796e120443094a87b422b5e27f36199f55cd54121a67bbea708e220ecf98110d83b87d907dca0158d951cfe1104c094c41996f9c4320848d800af4c8d5395bf5ec62a227c8aaa450ee582b40833a2eeea97d3b59ef67966a752cd10068cb689e65a3242e08cc716ca123526e22c2254e7b6c6f26995846cc268e98fe7eaa8c70ccb8084aa4aa059155461ac2be2a52a7dae7c83da0e87e95375795381347852715762ab220861e29ca06c5a450940ccec59736f45200ac93d969e1b9d7815faa71c77d9209405a"]}, @generic="a4cc378e7db7def04fb60290c2380dad96b9ff0d657d792e15349218a6c202981a9427bf475cc6084f2e29bf8bef857466efe38b4dc645bd60bc970ecfbf9e88a08651ef8575630ce221ce924fc00c62d8207a39e52f0e13b49b797e40f6895a7f39d8c62d219303ef78c3e2e366afba6e2f39b07b9ecaf9e4dc", @typed={0xc, 0x7f, 0x0, 0x0, @u64=0xfffffffffffffe06}, @typed={0x4, 0xc}]}, 0x19c}, 0x1, 0x0, 0x0, 0x4}, 0x4000001) setsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f0000000000)={{{@in=@rand_addr=0x64010100, @in6=@ipv4={'\x00', '\xff\xff', @private=0xa010102}, 0x4e22, 0x4, 0x4e24, 0x7, 0x0, 0xa0, 0x20, 0x0, r8, r10}, {0xaf, 0x0, 0x2, 0x6, 0xd00, 0xffffffffffffffff, 0x7, 0x1f}, {0x100000001, 0x7f, 0x10000, 0x8000000000000001}, 0x7, 0x6e6bc0, 0x1, 0x1, 0x2, 0x1}, {{@in=@remote, 0x4d3, 0xff}, 0x2, @in6=@loopback, 0x3506, 0x4, 0x3, 0x29, 0x2, 0xda}}, 0xe8) r11 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') preadv(r11, &(0x7f0000000180), 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0xd, &(0x7f0000000340)=@raw=[@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xf17}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @map_fd={0x18, 0x5, 0x1, 0x0, r5}, @call={0x85, 0x0, 0x0, 0xaa}, @jmp={0x5, 0x0, 0xa, 0x9, 0x0, 0x20, 0x10}], &(0x7f00000003c0)='syzkaller\x00', 0x81, 0xa, &(0x7f0000000400)=""/10, 0x41100, 0x2, '\x00', r8, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x8, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000480)=[r11], &(0x7f00000004c0)=[{0x3, 0x2, 0x7, 0x9}, {0x0, 0x1, 0x6, 0x3}, {0x5, 0x2, 0xf, 0x3}, {0x3, 0x1, 0x0, 0x8}, {0x2, 0x3, 0xa, 0x3}, {0x5, 0x5, 0xd, 0x6}, {0x2, 0x3, 0x5, 0xb}, {0x2, 0x2, 0x8, 0x4}], 0x10, 0x2}, 0x90) r12 = socket$rds(0x15, 0x5, 0x0) bind$rds(r12, &(0x7f00000010c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$RDS_GET_MR(r12, 0x114, 0x2, &(0x7f0000001040)={{0x0}, 0x0}, 0x20) r13 = syz_pidfd_open(0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ppoll(&(0x7f0000000040)=[{r0, 0x95}, {r1, 0x71b1}, {r2, 0x5000}, {r3, 0x8004}, {r11, 0x249}, {r12, 0x8608}, {r13, 0x60c}], 0x7, &(0x7f0000000100)={r14, r15+10000000}, &(0x7f0000000140)={[0x5]}, 0x8) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f00000000c0)='./bus\x00', 0x2100d0, &(0x7f0000000100), 0x1, 0x4b9, &(0x7f0000000540)="$eJzs3c9vG1kdAPDvTJLmx2Y3WdgDIGDLslBQtXbibqOqp3IBoaoSouLEoQ2JG0Wx4yh2ShN6SP8HJCpxgj+BAxIHpJ64c4Mbl3JAKlCBGiQORh5P0pDaSbRN7Srz+UijmTfP8fe9WPOe/XUyL4DCuhgRuxFxISLuRsRMfj7Jt7jR3TqPe/H84dLe84dLSbTbt/+RZPWdc3HoZzreyZ9zIiJ++L2InySvxm1u76wt1mrVzbxcbtU3ys3tnU9W64sr1ZXqeqWyML8wd+3K1cqZ9fXD+m+efXf15o9+/7uvPP3j7rd/1mnWdF53uB9nqdv1sYM4HaMRcfNNBBuCkbw/F4bdED6TNCI+FxEfZdf/TIxkryYAcJ612zPRnjlcBgDOuzTLgSVpKc8FTEealkrdHN4HMZXWGs3W5XuNrfXlbq5sNsbSe6u16lyeK5yNsaRTns+OX5YrR8pXIuL9iPj5+GRWLi01asvDfOMDAAX2zpH5/9/j3fkfADjnJobdAABg4Mz/AFA85n8AKB7zPwAUT8/5P9kdfEMAgIHx+R8Aisf8DwCF8oNbtzpbey+///Xy/e2ttcb9T5arzbVSfWuptNTY3CitNBor2T176ic9X63R2Jj/NLYelFvVZqvc3N65U29srbfuZPf1vlMdG0ivAIDjvP/hkz8nEbF7fTLb4tBaDuZqON/SYTcAGJqRYTcAGBqrfUFx+YwP9Fii95CJ/n8i9PhNtAYYhEtflP+HopL/h+KS/4fikv+H4mq3E2v+A0DByPEDx3//3+8WIZO+/wcAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAKDQprMtSUv5WuDTkaalUsS7ETEbY8m91Vp1LiLei4g/jY+Nd8rzw240APCa0r8l+fpfl2Y+nj5aeyH5z3i2j4if/vL2Lx4stlqb853z/zw433qcn68Mo/0AwEn25+n9eXzfi+cPl/a3Qbbn2Xe6i4t24u7lW7dmNEaz/USMRcTUv5K83NV5vzJyBvF3H0XEF3r1P8lyI7P5yqdH43divzvQ+On/xU+zuu6+87v4/Bm0BYrmSWf8udHr+kvjYrbvff1PZCPU69sf//ZeGf/Sg/FvpM/4d/G0MT79w/f71j2K+NJor/jJQfykT/yPTxn/L1/+6kf96tq/irgUveMfjlVu1TfKze2dyagvrlRXquuVysL8wty1K1cr5SxHXd7PVL/q79cvv3dc/6f6xJ84of/fOGX/f/3fuz/+2jHxv/X13q//B8fE78yJ3zxl/MWp3/ZevjuPv9yn/ye9/pdPGf/pX3eWT/lQAGAAmts7a4u1WnXz7T0Yfzua4cBBkQ6GPTIBb9rLi37YLQEAAAAAAAAAAAAAAPoZxL8TDbuPAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAnF//CwAA//9zztjU") renameat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000200)='./bus\x00', 0x0) executing program 0: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockname$packet(r0, 0x0, &(0x7f0000000180)) executing program 3: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xf6150000, 0x1000}, 0x20) r1 = socket$nl_audit(0x10, 0x3, 0x9) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="2800000035005700000000000000f0ff02ffffffe5000000100001800c001000080001"], 0x28}}, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000200)}, 0x20) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x5, 0x1, 0x7, 0x1120, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x0, 0x3}, 0x48) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r6, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) r7 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r7, 0x8918, &(0x7f0000000080)={@loopback={0x0, 0xff08}, 0x0, r8}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'syzkaller0\x00', 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in6=@private1, @in=@remote, 0x4e24, 0x0, 0x0, 0x0, 0x2, 0x80, 0x0, 0x3a, r9, r10}, {0x2, 0x9, 0x70, 0x2, 0x4, 0x0, 0x3, 0x7fffffffffffffff}, {0x7ff, 0x0, 0x100, 0x100000000}, 0x1, 0x6e6bbd, 0x2, 0x0, 0x2}, {{@in6=@local, 0x4d3, 0x33}, 0x2, @in=@multicast1, 0x0, 0x4, 0x2, 0xc2, 0x0, 0x8, 0x401}}, 0xe8) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000001c0)={0x19c, 0x2, 0x2, 0x101, 0x70bd2a, 0x25dfdbfe, {0xc, 0x0, 0x5}, [@nested={0xfa, 0x61, 0x0, 0x1, [@typed={0x8, 0x7e, 0x0, 0x0, @uid=r10}, @generic="fda26ca18b26a93bbeb97e232f62eecd3dae47f4248c3b568cb09072ae4091e90912a57fb04e4d796e120443094a87b422b5e27f36199f55cd54121a67bbea708e220ecf98110d83b87d907dca0158d951cfe1104c094c41996f9c4320848d800af4c8d5395bf5ec62a227c8aaa450ee582b40833a2eeea97d3b59ef67966a752cd10068cb689e65a3242e08cc716ca123526e22c2254e7b6c6f26995846cc268e98fe7eaa8c70ccb8084aa4aa059155461ac2be2a52a7dae7c83da0e87e95375795381347852715762ab220861e29ca06c5a450940ccec59736f45200ac93d969e1b9d7815faa71c77d9209405a"]}, @generic="a4cc378e7db7def04fb60290c2380dad96b9ff0d657d792e15349218a6c202981a9427bf475cc6084f2e29bf8bef857466efe38b4dc645bd60bc970ecfbf9e88a08651ef8575630ce221ce924fc00c62d8207a39e52f0e13b49b797e40f6895a7f39d8c62d219303ef78c3e2e366afba6e2f39b07b9ecaf9e4dc", @typed={0xc, 0x7f, 0x0, 0x0, @u64=0xfffffffffffffe06}, @typed={0x4, 0xc}]}, 0x19c}, 0x1, 0x0, 0x0, 0x4}, 0x4000001) setsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f0000000000)={{{@in=@rand_addr=0x64010100, @in6=@ipv4={'\x00', '\xff\xff', @private=0xa010102}, 0x4e22, 0x4, 0x4e24, 0x7, 0x0, 0xa0, 0x20, 0x0, r8, r10}, {0xaf, 0x0, 0x2, 0x6, 0xd00, 0xffffffffffffffff, 0x7, 0x1f}, {0x100000001, 0x7f, 0x10000, 0x8000000000000001}, 0x7, 0x6e6bc0, 0x1, 0x1, 0x2, 0x1}, {{@in=@remote, 0x4d3, 0xff}, 0x2, @in6=@loopback, 0x3506, 0x4, 0x3, 0x29, 0x2, 0xda}}, 0xe8) r11 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') preadv(r11, &(0x7f0000000180), 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0xd, &(0x7f0000000340)=@raw=[@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xf17}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @map_fd={0x18, 0x5, 0x1, 0x0, r5}, @call={0x85, 0x0, 0x0, 0xaa}, @jmp={0x5, 0x0, 0xa, 0x9, 0x0, 0x20, 0x10}], &(0x7f00000003c0)='syzkaller\x00', 0x81, 0xa, &(0x7f0000000400)=""/10, 0x41100, 0x2, '\x00', r8, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x8, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000480)=[r11], &(0x7f00000004c0)=[{0x3, 0x2, 0x7, 0x9}, {0x0, 0x1, 0x6, 0x3}, {0x5, 0x2, 0xf, 0x3}, {0x3, 0x1, 0x0, 0x8}, {0x2, 0x3, 0xa, 0x3}, {0x5, 0x5, 0xd, 0x6}, {0x2, 0x3, 0x5, 0xb}, {0x2, 0x2, 0x8, 0x4}], 0x10, 0x2}, 0x90) r12 = socket$rds(0x15, 0x5, 0x0) bind$rds(r12, &(0x7f00000010c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$RDS_GET_MR(r12, 0x114, 0x2, &(0x7f0000001040)={{0x0}, 0x0}, 0x20) r13 = syz_pidfd_open(0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ppoll(&(0x7f0000000040)=[{r0, 0x95}, {r1, 0x71b1}, {r2, 0x5000}, {r3, 0x8004}, {r11, 0x249}, {r12, 0x8608}, {r13, 0x60c}], 0x7, &(0x7f0000000100)={r14, r15+10000000}, &(0x7f0000000140)={[0x5]}, 0x8) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f00000000c0)='./bus\x00', 0x2100d0, &(0x7f0000000100), 0x1, 0x4b9, &(0x7f0000000540)="$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") renameat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000200)='./bus\x00', 0x0) executing program 1: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xf6150000, 0x1000}, 0x20) r1 = socket$nl_audit(0x10, 0x3, 0x9) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="2800000035005700000000000000f0ff02ffffffe5000000100001800c001000080001"], 0x28}}, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000200)}, 0x20) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x5, 0x1, 0x7, 0x1120, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x0, 0x3}, 0x48) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r6, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) r7 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r7, 0x8918, &(0x7f0000000080)={@loopback={0x0, 0xff08}, 0x0, r8}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'syzkaller0\x00', 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in6=@private1, @in=@remote, 0x4e24, 0x0, 0x0, 0x0, 0x2, 0x80, 0x0, 0x3a, r9, r10}, {0x2, 0x9, 0x70, 0x2, 0x4, 0x0, 0x3, 0x7fffffffffffffff}, {0x7ff, 0x0, 0x100, 0x100000000}, 0x1, 0x6e6bbd, 0x2, 0x0, 0x2}, {{@in6=@local, 0x4d3, 0x33}, 0x2, @in=@multicast1, 0x0, 0x4, 0x2, 0xc2, 0x0, 0x8, 0x401}}, 0xe8) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000001c0)={0x19c, 0x2, 0x2, 0x101, 0x70bd2a, 0x25dfdbfe, {0xc, 0x0, 0x5}, [@nested={0xfa, 0x61, 0x0, 0x1, [@typed={0x8, 0x7e, 0x0, 0x0, @uid=r10}, @generic="fda26ca18b26a93bbeb97e232f62eecd3dae47f4248c3b568cb09072ae4091e90912a57fb04e4d796e120443094a87b422b5e27f36199f55cd54121a67bbea708e220ecf98110d83b87d907dca0158d951cfe1104c094c41996f9c4320848d800af4c8d5395bf5ec62a227c8aaa450ee582b40833a2eeea97d3b59ef67966a752cd10068cb689e65a3242e08cc716ca123526e22c2254e7b6c6f26995846cc268e98fe7eaa8c70ccb8084aa4aa059155461ac2be2a52a7dae7c83da0e87e95375795381347852715762ab220861e29ca06c5a450940ccec59736f45200ac93d969e1b9d7815faa71c77d9209405a"]}, @generic="a4cc378e7db7def04fb60290c2380dad96b9ff0d657d792e15349218a6c202981a9427bf475cc6084f2e29bf8bef857466efe38b4dc645bd60bc970ecfbf9e88a08651ef8575630ce221ce924fc00c62d8207a39e52f0e13b49b797e40f6895a7f39d8c62d219303ef78c3e2e366afba6e2f39b07b9ecaf9e4dc", @typed={0xc, 0x7f, 0x0, 0x0, @u64=0xfffffffffffffe06}, @typed={0x4, 0xc}]}, 0x19c}, 0x1, 0x0, 0x0, 0x4}, 0x4000001) setsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f0000000000)={{{@in=@rand_addr=0x64010100, @in6=@ipv4={'\x00', '\xff\xff', @private=0xa010102}, 0x4e22, 0x4, 0x4e24, 0x7, 0x0, 0xa0, 0x20, 0x0, r8, r10}, {0xaf, 0x0, 0x2, 0x6, 0xd00, 0xffffffffffffffff, 0x7, 0x1f}, {0x100000001, 0x7f, 0x10000, 0x8000000000000001}, 0x7, 0x6e6bc0, 0x1, 0x1, 0x2, 0x1}, {{@in=@remote, 0x4d3, 0xff}, 0x2, @in6=@loopback, 0x3506, 0x4, 0x3, 0x29, 0x2, 0xda}}, 0xe8) r11 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') preadv(r11, &(0x7f0000000180), 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0xd, &(0x7f0000000340)=@raw=[@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xf17}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @map_fd={0x18, 0x5, 0x1, 0x0, r5}, @call={0x85, 0x0, 0x0, 0xaa}, @jmp={0x5, 0x0, 0xa, 0x9, 0x0, 0x20, 0x10}], &(0x7f00000003c0)='syzkaller\x00', 0x81, 0xa, &(0x7f0000000400)=""/10, 0x41100, 0x2, '\x00', r8, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x8, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000480)=[r11], &(0x7f00000004c0)=[{0x3, 0x2, 0x7, 0x9}, {0x0, 0x1, 0x6, 0x3}, {0x5, 0x2, 0xf, 0x3}, {0x3, 0x1, 0x0, 0x8}, {0x2, 0x3, 0xa, 0x3}, {0x5, 0x5, 0xd, 0x6}, {0x2, 0x3, 0x5, 0xb}, {0x2, 0x2, 0x8, 0x4}], 0x10, 0x2}, 0x90) r12 = socket$rds(0x15, 0x5, 0x0) bind$rds(r12, &(0x7f00000010c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$RDS_GET_MR(r12, 0x114, 0x2, &(0x7f0000001040)={{0x0}, 0x0}, 0x20) r13 = syz_pidfd_open(0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ppoll(&(0x7f0000000040)=[{r0, 0x95}, {r1, 0x71b1}, {r2, 0x5000}, {r3, 0x8004}, {r11, 0x249}, {r12, 0x8608}, {r13, 0x60c}], 0x7, &(0x7f0000000100)={r14, r15+10000000}, &(0x7f0000000140)={[0x5]}, 0x8) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f00000000c0)='./bus\x00', 0x2100d0, &(0x7f0000000100), 0x1, 0x4b9, &(0x7f0000000540)="$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") renameat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000200)='./bus\x00', 0x0) [ 77.355125][ T4092] loop4: detected capacity change from 0 to 512 [ 77.363537][ T4095] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 77.392504][ T4092] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. executing program 0: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xf6150000, 0x1000}, 0x20) r1 = socket$nl_audit(0x10, 0x3, 0x9) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="2800000035005700000000000000f0ff02ffffffe5000000100001800c001000080001"], 0x28}}, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000200)}, 0x20) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x5, 0x1, 0x7, 0x1120, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x0, 0x3}, 0x48) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r6, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) r7 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r7, 0x8918, &(0x7f0000000080)={@loopback={0x0, 0xff08}, 0x0, r8}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'syzkaller0\x00', 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in6=@private1, @in=@remote, 0x4e24, 0x0, 0x0, 0x0, 0x2, 0x80, 0x0, 0x3a, r9, r10}, {0x2, 0x9, 0x70, 0x2, 0x4, 0x0, 0x3, 0x7fffffffffffffff}, {0x7ff, 0x0, 0x100, 0x100000000}, 0x1, 0x6e6bbd, 0x2, 0x0, 0x2}, {{@in6=@local, 0x4d3, 0x33}, 0x2, @in=@multicast1, 0x0, 0x4, 0x2, 0xc2, 0x0, 0x8, 0x401}}, 0xe8) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000001c0)={0x19c, 0x2, 0x2, 0x101, 0x70bd2a, 0x25dfdbfe, {0xc, 0x0, 0x5}, [@nested={0xfa, 0x61, 0x0, 0x1, [@typed={0x8, 0x7e, 0x0, 0x0, @uid=r10}, @generic="fda26ca18b26a93bbeb97e232f62eecd3dae47f4248c3b568cb09072ae4091e90912a57fb04e4d796e120443094a87b422b5e27f36199f55cd54121a67bbea708e220ecf98110d83b87d907dca0158d951cfe1104c094c41996f9c4320848d800af4c8d5395bf5ec62a227c8aaa450ee582b40833a2eeea97d3b59ef67966a752cd10068cb689e65a3242e08cc716ca123526e22c2254e7b6c6f26995846cc268e98fe7eaa8c70ccb8084aa4aa059155461ac2be2a52a7dae7c83da0e87e95375795381347852715762ab220861e29ca06c5a450940ccec59736f45200ac93d969e1b9d7815faa71c77d9209405a"]}, @generic="a4cc378e7db7def04fb60290c2380dad96b9ff0d657d792e15349218a6c202981a9427bf475cc6084f2e29bf8bef857466efe38b4dc645bd60bc970ecfbf9e88a08651ef8575630ce221ce924fc00c62d8207a39e52f0e13b49b797e40f6895a7f39d8c62d219303ef78c3e2e366afba6e2f39b07b9ecaf9e4dc", @typed={0xc, 0x7f, 0x0, 0x0, @u64=0xfffffffffffffe06}, @typed={0x4, 0xc}]}, 0x19c}, 0x1, 0x0, 0x0, 0x4}, 0x4000001) setsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f0000000000)={{{@in=@rand_addr=0x64010100, @in6=@ipv4={'\x00', '\xff\xff', @private=0xa010102}, 0x4e22, 0x4, 0x4e24, 0x7, 0x0, 0xa0, 0x20, 0x0, r8, r10}, {0xaf, 0x0, 0x2, 0x6, 0xd00, 0xffffffffffffffff, 0x7, 0x1f}, {0x100000001, 0x7f, 0x10000, 0x8000000000000001}, 0x7, 0x6e6bc0, 0x1, 0x1, 0x2, 0x1}, {{@in=@remote, 0x4d3, 0xff}, 0x2, @in6=@loopback, 0x3506, 0x4, 0x3, 0x29, 0x2, 0xda}}, 0xe8) r11 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') preadv(r11, &(0x7f0000000180), 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0xd, &(0x7f0000000340)=@raw=[@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xf17}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @map_fd={0x18, 0x5, 0x1, 0x0, r5}, @call={0x85, 0x0, 0x0, 0xaa}, @jmp={0x5, 0x0, 0xa, 0x9, 0x0, 0x20, 0x10}], &(0x7f00000003c0)='syzkaller\x00', 0x81, 0xa, &(0x7f0000000400)=""/10, 0x41100, 0x2, '\x00', r8, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x8, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000480)=[r11], &(0x7f00000004c0)=[{0x3, 0x2, 0x7, 0x9}, {0x0, 0x1, 0x6, 0x3}, {0x5, 0x2, 0xf, 0x3}, {0x3, 0x1, 0x0, 0x8}, {0x2, 0x3, 0xa, 0x3}, {0x5, 0x5, 0xd, 0x6}, {0x2, 0x3, 0x5, 0xb}, {0x2, 0x2, 0x8, 0x4}], 0x10, 0x2}, 0x90) r12 = socket$rds(0x15, 0x5, 0x0) bind$rds(r12, &(0x7f00000010c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$RDS_GET_MR(r12, 0x114, 0x2, &(0x7f0000001040)={{0x0}, 0x0}, 0x20) r13 = syz_pidfd_open(0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ppoll(&(0x7f0000000040)=[{r0, 0x95}, {r1, 0x71b1}, {r2, 0x5000}, {r3, 0x8004}, {r11, 0x249}, {r12, 0x8608}, {r13, 0x60c}], 0x7, &(0x7f0000000100)={r14, r15+10000000}, &(0x7f0000000140)={[0x5]}, 0x8) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f00000000c0)='./bus\x00', 0x2100d0, &(0x7f0000000100), 0x1, 0x4b9, &(0x7f0000000540)="$eJzs3c9vG1kdAPDvTJLmx2Y3WdgDIGDLslBQtXbibqOqp3IBoaoSouLEoQ2JG0Wx4yh2ShN6SP8HJCpxgj+BAxIHpJ64c4Mbl3JAKlCBGiQORh5P0pDaSbRN7Srz+UijmTfP8fe9WPOe/XUyL4DCuhgRuxFxISLuRsRMfj7Jt7jR3TqPe/H84dLe84dLSbTbt/+RZPWdc3HoZzreyZ9zIiJ++L2InySvxm1u76wt1mrVzbxcbtU3ys3tnU9W64sr1ZXqeqWyML8wd+3K1cqZ9fXD+m+efXf15o9+/7uvPP3j7rd/1mnWdF53uB9nqdv1sYM4HaMRcfNNBBuCkbw/F4bdED6TNCI+FxEfZdf/TIxkryYAcJ612zPRnjlcBgDOuzTLgSVpKc8FTEealkrdHN4HMZXWGs3W5XuNrfXlbq5sNsbSe6u16lyeK5yNsaRTns+OX5YrR8pXIuL9iPj5+GRWLi01asvDfOMDAAX2zpH5/9/j3fkfADjnJobdAABg4Mz/AFA85n8AKB7zPwAUT8/5P9kdfEMAgIHx+R8Aisf8DwCF8oNbtzpbey+///Xy/e2ttcb9T5arzbVSfWuptNTY3CitNBor2T176ic9X63R2Jj/NLYelFvVZqvc3N65U29srbfuZPf1vlMdG0ivAIDjvP/hkz8nEbF7fTLb4tBaDuZqON/SYTcAGJqRYTcAGBqrfUFx+YwP9Fii95CJ/n8i9PhNtAYYhEtflP+HopL/h+KS/4fikv+H4mq3E2v+A0DByPEDx3//3+8WIZO+/wcAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAKDQprMtSUv5WuDTkaalUsS7ETEbY8m91Vp1LiLei4g/jY+Nd8rzw240APCa0r8l+fpfl2Y+nj5aeyH5z3i2j4if/vL2Lx4stlqb853z/zw433qcn68Mo/0AwEn25+n9eXzfi+cPl/a3Qbbn2Xe6i4t24u7lW7dmNEaz/USMRcTUv5K83NV5vzJyBvF3H0XEF3r1P8lyI7P5yqdH43divzvQ+On/xU+zuu6+87v4/Bm0BYrmSWf8udHr+kvjYrbvff1PZCPU69sf//ZeGf/Sg/FvpM/4d/G0MT79w/f71j2K+NJor/jJQfykT/yPTxn/L1/+6kf96tq/irgUveMfjlVu1TfKze2dyagvrlRXquuVysL8wty1K1cr5SxHXd7PVL/q79cvv3dc/6f6xJ84of/fOGX/f/3fuz/+2jHxv/X13q//B8fE78yJ3zxl/MWp3/ZevjuPv9yn/ye9/pdPGf/pX3eWT/lQAGAAmts7a4u1WnXz7T0Yfzua4cBBkQ6GPTIBb9rLi37YLQEAAAAAAAAAAAAAAPoZxL8TDbuPAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAnF//CwAA//9zztjU") renameat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000200)='./bus\x00', 0x0) [ 77.416641][ T4092] ext4 filesystem being mounted at /root/syzkaller-testdir3636980945/syzkaller.Qg79Ho/10/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 77.441504][ T4110] loop3: detected capacity change from 0 to 512 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xf6150000, 0x1000}, 0x20) r1 = socket$nl_audit(0x10, 0x3, 0x9) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="2800000035005700000000000000f0ff02ffffffe5000000100001800c001000080001"], 0x28}}, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000200)}, 0x20) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x5, 0x1, 0x7, 0x1120, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x0, 0x3}, 0x48) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r6, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) r7 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r7, 0x8918, &(0x7f0000000080)={@loopback={0x0, 0xff08}, 0x0, r8}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'syzkaller0\x00', 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in6=@private1, @in=@remote, 0x4e24, 0x0, 0x0, 0x0, 0x2, 0x80, 0x0, 0x3a, r9, r10}, {0x2, 0x9, 0x70, 0x2, 0x4, 0x0, 0x3, 0x7fffffffffffffff}, {0x7ff, 0x0, 0x100, 0x100000000}, 0x1, 0x6e6bbd, 0x2, 0x0, 0x2}, {{@in6=@local, 0x4d3, 0x33}, 0x2, @in=@multicast1, 0x0, 0x4, 0x2, 0xc2, 0x0, 0x8, 0x401}}, 0xe8) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000001c0)={0x19c, 0x2, 0x2, 0x101, 0x70bd2a, 0x25dfdbfe, {0xc, 0x0, 0x5}, [@nested={0xfa, 0x61, 0x0, 0x1, [@typed={0x8, 0x7e, 0x0, 0x0, @uid=r10}, @generic="fda26ca18b26a93bbeb97e232f62eecd3dae47f4248c3b568cb09072ae4091e90912a57fb04e4d796e120443094a87b422b5e27f36199f55cd54121a67bbea708e220ecf98110d83b87d907dca0158d951cfe1104c094c41996f9c4320848d800af4c8d5395bf5ec62a227c8aaa450ee582b40833a2eeea97d3b59ef67966a752cd10068cb689e65a3242e08cc716ca123526e22c2254e7b6c6f26995846cc268e98fe7eaa8c70ccb8084aa4aa059155461ac2be2a52a7dae7c83da0e87e95375795381347852715762ab220861e29ca06c5a450940ccec59736f45200ac93d969e1b9d7815faa71c77d9209405a"]}, @generic="a4cc378e7db7def04fb60290c2380dad96b9ff0d657d792e15349218a6c202981a9427bf475cc6084f2e29bf8bef857466efe38b4dc645bd60bc970ecfbf9e88a08651ef8575630ce221ce924fc00c62d8207a39e52f0e13b49b797e40f6895a7f39d8c62d219303ef78c3e2e366afba6e2f39b07b9ecaf9e4dc", @typed={0xc, 0x7f, 0x0, 0x0, @u64=0xfffffffffffffe06}, @typed={0x4, 0xc}]}, 0x19c}, 0x1, 0x0, 0x0, 0x4}, 0x4000001) setsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f0000000000)={{{@in=@rand_addr=0x64010100, @in6=@ipv4={'\x00', '\xff\xff', @private=0xa010102}, 0x4e22, 0x4, 0x4e24, 0x7, 0x0, 0xa0, 0x20, 0x0, r8, r10}, {0xaf, 0x0, 0x2, 0x6, 0xd00, 0xffffffffffffffff, 0x7, 0x1f}, {0x100000001, 0x7f, 0x10000, 0x8000000000000001}, 0x7, 0x6e6bc0, 0x1, 0x1, 0x2, 0x1}, {{@in=@remote, 0x4d3, 0xff}, 0x2, @in6=@loopback, 0x3506, 0x4, 0x3, 0x29, 0x2, 0xda}}, 0xe8) r11 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') preadv(r11, &(0x7f0000000180), 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0xd, &(0x7f0000000340)=@raw=[@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xf17}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @map_fd={0x18, 0x5, 0x1, 0x0, r5}, @call={0x85, 0x0, 0x0, 0xaa}, @jmp={0x5, 0x0, 0xa, 0x9, 0x0, 0x20, 0x10}], &(0x7f00000003c0)='syzkaller\x00', 0x81, 0xa, &(0x7f0000000400)=""/10, 0x41100, 0x2, '\x00', r8, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x8, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000480)=[r11], &(0x7f00000004c0)=[{0x3, 0x2, 0x7, 0x9}, {0x0, 0x1, 0x6, 0x3}, {0x5, 0x2, 0xf, 0x3}, {0x3, 0x1, 0x0, 0x8}, {0x2, 0x3, 0xa, 0x3}, {0x5, 0x5, 0xd, 0x6}, {0x2, 0x3, 0x5, 0xb}, {0x2, 0x2, 0x8, 0x4}], 0x10, 0x2}, 0x90) r12 = socket$rds(0x15, 0x5, 0x0) bind$rds(r12, &(0x7f00000010c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$RDS_GET_MR(r12, 0x114, 0x2, &(0x7f0000001040)={{0x0}, 0x0}, 0x20) r13 = syz_pidfd_open(0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ppoll(&(0x7f0000000040)=[{r0, 0x95}, {r1, 0x71b1}, {r2, 0x5000}, {r3, 0x8004}, {r11, 0x249}, {r12, 0x8608}, {r13, 0x60c}], 0x7, &(0x7f0000000100)={r14, r15+10000000}, &(0x7f0000000140)={[0x5]}, 0x8) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f00000000c0)='./bus\x00', 0x2100d0, &(0x7f0000000100), 0x1, 0x4b9, &(0x7f0000000540)="$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") renameat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000200)='./bus\x00', 0x0) [ 77.464833][ T4111] loop1: detected capacity change from 0 to 512 [ 77.471887][ T4106] loop2: detected capacity change from 0 to 512 [ 77.494679][ T4110] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. executing program 3: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xf6150000, 0x1000}, 0x20) r1 = socket$nl_audit(0x10, 0x3, 0x9) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="2800000035005700000000000000f0ff02ffffffe5000000100001800c001000080001"], 0x28}}, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000200)}, 0x20) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x5, 0x1, 0x7, 0x1120, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x0, 0x3}, 0x48) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r6, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) r7 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r7, 0x8918, &(0x7f0000000080)={@loopback={0x0, 0xff08}, 0x0, r8}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'syzkaller0\x00', 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in6=@private1, @in=@remote, 0x4e24, 0x0, 0x0, 0x0, 0x2, 0x80, 0x0, 0x3a, r9, r10}, {0x2, 0x9, 0x70, 0x2, 0x4, 0x0, 0x3, 0x7fffffffffffffff}, {0x7ff, 0x0, 0x100, 0x100000000}, 0x1, 0x6e6bbd, 0x2, 0x0, 0x2}, {{@in6=@local, 0x4d3, 0x33}, 0x2, @in=@multicast1, 0x0, 0x4, 0x2, 0xc2, 0x0, 0x8, 0x401}}, 0xe8) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000001c0)={0x19c, 0x2, 0x2, 0x101, 0x70bd2a, 0x25dfdbfe, {0xc, 0x0, 0x5}, [@nested={0xfa, 0x61, 0x0, 0x1, [@typed={0x8, 0x7e, 0x0, 0x0, @uid=r10}, @generic="fda26ca18b26a93bbeb97e232f62eecd3dae47f4248c3b568cb09072ae4091e90912a57fb04e4d796e120443094a87b422b5e27f36199f55cd54121a67bbea708e220ecf98110d83b87d907dca0158d951cfe1104c094c41996f9c4320848d800af4c8d5395bf5ec62a227c8aaa450ee582b40833a2eeea97d3b59ef67966a752cd10068cb689e65a3242e08cc716ca123526e22c2254e7b6c6f26995846cc268e98fe7eaa8c70ccb8084aa4aa059155461ac2be2a52a7dae7c83da0e87e95375795381347852715762ab220861e29ca06c5a450940ccec59736f45200ac93d969e1b9d7815faa71c77d9209405a"]}, @generic="a4cc378e7db7def04fb60290c2380dad96b9ff0d657d792e15349218a6c202981a9427bf475cc6084f2e29bf8bef857466efe38b4dc645bd60bc970ecfbf9e88a08651ef8575630ce221ce924fc00c62d8207a39e52f0e13b49b797e40f6895a7f39d8c62d219303ef78c3e2e366afba6e2f39b07b9ecaf9e4dc", @typed={0xc, 0x7f, 0x0, 0x0, @u64=0xfffffffffffffe06}, @typed={0x4, 0xc}]}, 0x19c}, 0x1, 0x0, 0x0, 0x4}, 0x4000001) setsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f0000000000)={{{@in=@rand_addr=0x64010100, @in6=@ipv4={'\x00', '\xff\xff', @private=0xa010102}, 0x4e22, 0x4, 0x4e24, 0x7, 0x0, 0xa0, 0x20, 0x0, r8, r10}, {0xaf, 0x0, 0x2, 0x6, 0xd00, 0xffffffffffffffff, 0x7, 0x1f}, {0x100000001, 0x7f, 0x10000, 0x8000000000000001}, 0x7, 0x6e6bc0, 0x1, 0x1, 0x2, 0x1}, {{@in=@remote, 0x4d3, 0xff}, 0x2, @in6=@loopback, 0x3506, 0x4, 0x3, 0x29, 0x2, 0xda}}, 0xe8) r11 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') preadv(r11, &(0x7f0000000180), 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0xd, &(0x7f0000000340)=@raw=[@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xf17}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @map_fd={0x18, 0x5, 0x1, 0x0, r5}, @call={0x85, 0x0, 0x0, 0xaa}, @jmp={0x5, 0x0, 0xa, 0x9, 0x0, 0x20, 0x10}], &(0x7f00000003c0)='syzkaller\x00', 0x81, 0xa, &(0x7f0000000400)=""/10, 0x41100, 0x2, '\x00', r8, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x8, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000480)=[r11], &(0x7f00000004c0)=[{0x3, 0x2, 0x7, 0x9}, {0x0, 0x1, 0x6, 0x3}, {0x5, 0x2, 0xf, 0x3}, {0x3, 0x1, 0x0, 0x8}, {0x2, 0x3, 0xa, 0x3}, {0x5, 0x5, 0xd, 0x6}, {0x2, 0x3, 0x5, 0xb}, {0x2, 0x2, 0x8, 0x4}], 0x10, 0x2}, 0x90) r12 = socket$rds(0x15, 0x5, 0x0) bind$rds(r12, &(0x7f00000010c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$RDS_GET_MR(r12, 0x114, 0x2, &(0x7f0000001040)={{0x0}, 0x0}, 0x20) r13 = syz_pidfd_open(0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ppoll(&(0x7f0000000040)=[{r0, 0x95}, {r1, 0x71b1}, {r2, 0x5000}, {r3, 0x8004}, {r11, 0x249}, {r12, 0x8608}, {r13, 0x60c}], 0x7, &(0x7f0000000100)={r14, r15+10000000}, &(0x7f0000000140)={[0x5]}, 0x8) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f00000000c0)='./bus\x00', 0x2100d0, &(0x7f0000000100), 0x1, 0x4b9, &(0x7f0000000540)="$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") renameat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000200)='./bus\x00', 0x0) [ 77.510024][ T4106] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 77.515622][ T4110] ext4 filesystem being mounted at /root/syzkaller-testdir2676061251/syzkaller.csB4Ho/16/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 77.528076][ T4115] loop0: detected capacity change from 0 to 512 [ 77.537817][ T4106] ext4 filesystem being mounted at /root/syzkaller-testdir2425205832/syzkaller.xiDwdI/12/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 77.545367][ T3776] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. executing program 2: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xf6150000, 0x1000}, 0x20) r1 = socket$nl_audit(0x10, 0x3, 0x9) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="2800000035005700000000000000f0ff02ffffffe5000000100001800c001000080001"], 0x28}}, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000200)}, 0x20) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x5, 0x1, 0x7, 0x1120, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x0, 0x3}, 0x48) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r6, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) r7 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r7, 0x8918, &(0x7f0000000080)={@loopback={0x0, 0xff08}, 0x0, r8}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'syzkaller0\x00', 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in6=@private1, @in=@remote, 0x4e24, 0x0, 0x0, 0x0, 0x2, 0x80, 0x0, 0x3a, r9, r10}, {0x2, 0x9, 0x70, 0x2, 0x4, 0x0, 0x3, 0x7fffffffffffffff}, {0x7ff, 0x0, 0x100, 0x100000000}, 0x1, 0x6e6bbd, 0x2, 0x0, 0x2}, {{@in6=@local, 0x4d3, 0x33}, 0x2, @in=@multicast1, 0x0, 0x4, 0x2, 0xc2, 0x0, 0x8, 0x401}}, 0xe8) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000001c0)={0x19c, 0x2, 0x2, 0x101, 0x70bd2a, 0x25dfdbfe, {0xc, 0x0, 0x5}, [@nested={0xfa, 0x61, 0x0, 0x1, [@typed={0x8, 0x7e, 0x0, 0x0, @uid=r10}, @generic="fda26ca18b26a93bbeb97e232f62eecd3dae47f4248c3b568cb09072ae4091e90912a57fb04e4d796e120443094a87b422b5e27f36199f55cd54121a67bbea708e220ecf98110d83b87d907dca0158d951cfe1104c094c41996f9c4320848d800af4c8d5395bf5ec62a227c8aaa450ee582b40833a2eeea97d3b59ef67966a752cd10068cb689e65a3242e08cc716ca123526e22c2254e7b6c6f26995846cc268e98fe7eaa8c70ccb8084aa4aa059155461ac2be2a52a7dae7c83da0e87e95375795381347852715762ab220861e29ca06c5a450940ccec59736f45200ac93d969e1b9d7815faa71c77d9209405a"]}, @generic="a4cc378e7db7def04fb60290c2380dad96b9ff0d657d792e15349218a6c202981a9427bf475cc6084f2e29bf8bef857466efe38b4dc645bd60bc970ecfbf9e88a08651ef8575630ce221ce924fc00c62d8207a39e52f0e13b49b797e40f6895a7f39d8c62d219303ef78c3e2e366afba6e2f39b07b9ecaf9e4dc", @typed={0xc, 0x7f, 0x0, 0x0, @u64=0xfffffffffffffe06}, @typed={0x4, 0xc}]}, 0x19c}, 0x1, 0x0, 0x0, 0x4}, 0x4000001) setsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f0000000000)={{{@in=@rand_addr=0x64010100, @in6=@ipv4={'\x00', '\xff\xff', @private=0xa010102}, 0x4e22, 0x4, 0x4e24, 0x7, 0x0, 0xa0, 0x20, 0x0, r8, r10}, {0xaf, 0x0, 0x2, 0x6, 0xd00, 0xffffffffffffffff, 0x7, 0x1f}, {0x100000001, 0x7f, 0x10000, 0x8000000000000001}, 0x7, 0x6e6bc0, 0x1, 0x1, 0x2, 0x1}, {{@in=@remote, 0x4d3, 0xff}, 0x2, @in6=@loopback, 0x3506, 0x4, 0x3, 0x29, 0x2, 0xda}}, 0xe8) r11 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') preadv(r11, &(0x7f0000000180), 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0xd, &(0x7f0000000340)=@raw=[@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xf17}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @map_fd={0x18, 0x5, 0x1, 0x0, r5}, @call={0x85, 0x0, 0x0, 0xaa}, @jmp={0x5, 0x0, 0xa, 0x9, 0x0, 0x20, 0x10}], &(0x7f00000003c0)='syzkaller\x00', 0x81, 0xa, &(0x7f0000000400)=""/10, 0x41100, 0x2, '\x00', r8, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x8, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000480)=[r11], &(0x7f00000004c0)=[{0x3, 0x2, 0x7, 0x9}, {0x0, 0x1, 0x6, 0x3}, {0x5, 0x2, 0xf, 0x3}, {0x3, 0x1, 0x0, 0x8}, {0x2, 0x3, 0xa, 0x3}, {0x5, 0x5, 0xd, 0x6}, {0x2, 0x3, 0x5, 0xb}, {0x2, 0x2, 0x8, 0x4}], 0x10, 0x2}, 0x90) r12 = socket$rds(0x15, 0x5, 0x0) bind$rds(r12, &(0x7f00000010c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$RDS_GET_MR(r12, 0x114, 0x2, &(0x7f0000001040)={{0x0}, 0x0}, 0x20) r13 = syz_pidfd_open(0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ppoll(&(0x7f0000000040)=[{r0, 0x95}, {r1, 0x71b1}, {r2, 0x5000}, {r3, 0x8004}, {r11, 0x249}, {r12, 0x8608}, {r13, 0x60c}], 0x7, &(0x7f0000000100)={r14, r15+10000000}, &(0x7f0000000140)={[0x5]}, 0x8) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f00000000c0)='./bus\x00', 0x2100d0, &(0x7f0000000100), 0x1, 0x4b9, &(0x7f0000000540)="$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") renameat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000200)='./bus\x00', 0x0) [ 77.579569][ T4111] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 77.592631][ T3793] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 77.599835][ T4111] ext4 filesystem being mounted at /root/syzkaller-testdir4100334086/syzkaller.wrzQRl/17/bus supports timestamps until 2038-01-19 (0x7fffffff) executing program 1: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xf6150000, 0x1000}, 0x20) r1 = socket$nl_audit(0x10, 0x3, 0x9) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="2800000035005700000000000000f0ff02ffffffe5000000100001800c001000080001"], 0x28}}, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000200)}, 0x20) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x5, 0x1, 0x7, 0x1120, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x0, 0x3}, 0x48) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r6, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) r7 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r7, 0x8918, &(0x7f0000000080)={@loopback={0x0, 0xff08}, 0x0, r8}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'syzkaller0\x00', 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in6=@private1, @in=@remote, 0x4e24, 0x0, 0x0, 0x0, 0x2, 0x80, 0x0, 0x3a, r9, r10}, {0x2, 0x9, 0x70, 0x2, 0x4, 0x0, 0x3, 0x7fffffffffffffff}, {0x7ff, 0x0, 0x100, 0x100000000}, 0x1, 0x6e6bbd, 0x2, 0x0, 0x2}, {{@in6=@local, 0x4d3, 0x33}, 0x2, @in=@multicast1, 0x0, 0x4, 0x2, 0xc2, 0x0, 0x8, 0x401}}, 0xe8) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000001c0)={0x19c, 0x2, 0x2, 0x101, 0x70bd2a, 0x25dfdbfe, {0xc, 0x0, 0x5}, [@nested={0xfa, 0x61, 0x0, 0x1, [@typed={0x8, 0x7e, 0x0, 0x0, @uid=r10}, @generic="fda26ca18b26a93bbeb97e232f62eecd3dae47f4248c3b568cb09072ae4091e90912a57fb04e4d796e120443094a87b422b5e27f36199f55cd54121a67bbea708e220ecf98110d83b87d907dca0158d951cfe1104c094c41996f9c4320848d800af4c8d5395bf5ec62a227c8aaa450ee582b40833a2eeea97d3b59ef67966a752cd10068cb689e65a3242e08cc716ca123526e22c2254e7b6c6f26995846cc268e98fe7eaa8c70ccb8084aa4aa059155461ac2be2a52a7dae7c83da0e87e95375795381347852715762ab220861e29ca06c5a450940ccec59736f45200ac93d969e1b9d7815faa71c77d9209405a"]}, @generic="a4cc378e7db7def04fb60290c2380dad96b9ff0d657d792e15349218a6c202981a9427bf475cc6084f2e29bf8bef857466efe38b4dc645bd60bc970ecfbf9e88a08651ef8575630ce221ce924fc00c62d8207a39e52f0e13b49b797e40f6895a7f39d8c62d219303ef78c3e2e366afba6e2f39b07b9ecaf9e4dc", @typed={0xc, 0x7f, 0x0, 0x0, @u64=0xfffffffffffffe06}, @typed={0x4, 0xc}]}, 0x19c}, 0x1, 0x0, 0x0, 0x4}, 0x4000001) setsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f0000000000)={{{@in=@rand_addr=0x64010100, @in6=@ipv4={'\x00', '\xff\xff', @private=0xa010102}, 0x4e22, 0x4, 0x4e24, 0x7, 0x0, 0xa0, 0x20, 0x0, r8, r10}, {0xaf, 0x0, 0x2, 0x6, 0xd00, 0xffffffffffffffff, 0x7, 0x1f}, {0x100000001, 0x7f, 0x10000, 0x8000000000000001}, 0x7, 0x6e6bc0, 0x1, 0x1, 0x2, 0x1}, {{@in=@remote, 0x4d3, 0xff}, 0x2, @in6=@loopback, 0x3506, 0x4, 0x3, 0x29, 0x2, 0xda}}, 0xe8) r11 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') preadv(r11, &(0x7f0000000180), 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0xd, &(0x7f0000000340)=@raw=[@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xf17}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @map_fd={0x18, 0x5, 0x1, 0x0, r5}, @call={0x85, 0x0, 0x0, 0xaa}, @jmp={0x5, 0x0, 0xa, 0x9, 0x0, 0x20, 0x10}], &(0x7f00000003c0)='syzkaller\x00', 0x81, 0xa, &(0x7f0000000400)=""/10, 0x41100, 0x2, '\x00', r8, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x8, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000480)=[r11], &(0x7f00000004c0)=[{0x3, 0x2, 0x7, 0x9}, {0x0, 0x1, 0x6, 0x3}, {0x5, 0x2, 0xf, 0x3}, {0x3, 0x1, 0x0, 0x8}, {0x2, 0x3, 0xa, 0x3}, {0x5, 0x5, 0xd, 0x6}, {0x2, 0x3, 0x5, 0xb}, {0x2, 0x2, 0x8, 0x4}], 0x10, 0x2}, 0x90) r12 = socket$rds(0x15, 0x5, 0x0) bind$rds(r12, &(0x7f00000010c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$RDS_GET_MR(r12, 0x114, 0x2, &(0x7f0000001040)={{0x0}, 0x0}, 0x20) r13 = syz_pidfd_open(0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ppoll(&(0x7f0000000040)=[{r0, 0x95}, {r1, 0x71b1}, {r2, 0x5000}, {r3, 0x8004}, {r11, 0x249}, {r12, 0x8608}, {r13, 0x60c}], 0x7, &(0x7f0000000100)={r14, r15+10000000}, &(0x7f0000000140)={[0x5]}, 0x8) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f00000000c0)='./bus\x00', 0x2100d0, &(0x7f0000000100), 0x1, 0x4b9, &(0x7f0000000540)="$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") renameat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000200)='./bus\x00', 0x0) [ 77.623946][ T3776] ================================================================== [ 77.634042][ T3776] BUG: KCSAN: data-race in __lru_add_drain_all / deactivate_file_folio [ 77.634946][ T4115] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 77.642294][ T3776] [ 77.642304][ T3776] read-write to 0xffff888237d2ad08 of 1 bytes by task 3793 on cpu 1: [ 77.654861][ T4115] ext4 filesystem being mounted at /root/syzkaller-testdir2163917739/syzkaller.mpqcH0/13/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 77.656993][ T3776] deactivate_file_folio+0x66/0x160 [ 77.684759][ T3776] mapping_try_invalidate+0x2be/0x3e0 [ 77.690155][ T3776] invalidate_mapping_pages+0x27/0x40 [ 77.695548][ T3776] invalidate_bdev+0x65/0x80 [ 77.700151][ T3776] ext4_put_super+0x51b/0x7e0 [ 77.704841][ T3776] generic_shutdown_super+0xde/0x210 [ 77.710131][ T3776] kill_block_super+0x2a/0x70 [ 77.714793][ T3776] ext4_kill_sb+0x44/0x80 [ 77.719114][ T3776] deactivate_locked_super+0x7d/0x1c0 [ 77.724475][ T3776] deactivate_super+0x9f/0xb0 [ 77.729167][ T3776] cleanup_mnt+0x272/0x2e0 [ 77.733566][ T3776] __cleanup_mnt+0x19/0x20 [ 77.737969][ T3776] task_work_run+0x13a/0x1a0 [ 77.742627][ T3776] syscall_exit_to_user_mode+0xbe/0x130 [ 77.748152][ T3776] do_syscall_64+0xda/0x1d0 [ 77.752635][ T3776] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 77.758508][ T3776] [ 77.761504][ T3776] read to 0xffff888237d2ad08 of 1 bytes by task 3776 on cpu 0: [ 77.769035][ T3776] __lru_add_drain_all+0x1a2/0x420 [ 77.774220][ T3776] lru_add_drain_all+0x10/0x20 [ 77.778965][ T3776] invalidate_bdev+0x54/0x80 [ 77.783540][ T3776] ext4_put_super+0x51b/0x7e0 [ 77.788201][ T3776] generic_shutdown_super+0xde/0x210 [ 77.793480][ T3776] kill_block_super+0x2a/0x70 [ 77.798144][ T3776] ext4_kill_sb+0x44/0x80 [ 77.802450][ T3776] deactivate_locked_super+0x7d/0x1c0 [ 77.807813][ T3776] deactivate_super+0x9f/0xb0 [ 77.812482][ T3776] cleanup_mnt+0x272/0x2e0 [ 77.816882][ T3776] __cleanup_mnt+0x19/0x20 [ 77.821282][ T3776] task_work_run+0x13a/0x1a0 [ 77.825855][ T3776] syscall_exit_to_user_mode+0xbe/0x130 [ 77.831379][ T3776] do_syscall_64+0xda/0x1d0 [ 77.835863][ T3776] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 77.841736][ T3776] [ 77.844040][ T3776] value changed: 0x01 -> 0x02 [ 77.848687][ T3776] [ 77.850985][ T3776] Reported by Kernel Concurrency Sanitizer on: [ 77.857108][ T3776] CPU: 0 PID: 3776 Comm: syz-executor.4 Not tainted 6.9.0-rc6-syzkaller-00113-g49a73b1652c5 #0 [ 77.867491][ T3776] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 77.877524][ T3776] ================================================================== [ 77.889372][ T3775] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 77.899182][ T3800] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 77.899217][ T3769] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 77.951871][ T4123] loop3: detected capacity change from 0 to 512 [ 77.973602][ T4125] loop4: detected capacity change from 0 to 512 [ 77.996832][ T4131] loop1: detected capacity change from 0 to 512 [ 77.999418][ T4129] loop2: detected capacity change from 0 to 512 [ 78.007952][ T4123] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 78.030144][ T4123] ext4 filesystem being mounted at /root/syzkaller-testdir2676061251/syzkaller.csB4Ho/17/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 78.056981][ T4125] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 78.076521][ T3793] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 78.078400][ T4131] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 78.101434][ T4125] ext4 filesystem being mounted at /root/syzkaller-testdir3636980945/syzkaller.Qg79Ho/11/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 78.118596][ T4131] ext4 filesystem being mounted at /root/syzkaller-testdir4100334086/syzkaller.wrzQRl/18/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 78.143860][ T3776] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 78.167070][ T4129] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 78.190079][ T3800] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 78.199635][ T4129] ext4 filesystem being mounted at /root/syzkaller-testdir2425205832/syzkaller.xiDwdI/13/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 78.226305][ T3775] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 78.249169][ T4147] syz-executor.0 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 78.283423][ T28] kauditd_printk_skb: 51 callbacks suppressed [ 78.283454][ T28] audit: type=1400 audit(1714682593.894:186): avc: denied { read write } for pid=4143 comm="syz-executor.0" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 78.313588][ T28] audit: type=1400 audit(1714682593.894:187): avc: denied { open } for pid=4143 comm="syz-executor.0" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 78.337441][ T28] audit: type=1400 audit(1714682593.894:188): avc: denied { create } for pid=4143 comm="syz-executor.0" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 78.409168][ T28] audit: type=1400 audit(1714682593.904:189): avc: denied { create } for pid=4143 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 78.450011][ T28] audit: type=1400 audit(1714682594.064:190): avc: denied { ioctl } for pid=4143 comm="syz-executor.0" path="socket:[4924]" dev="sockfs" ino=4924 ioctlcmd=0x9401 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1