[ 6.848123][ T1473] 8021q: adding VLAN 0 to HW filter on device bond0 [ 6.851732][ T1473] eql: remember to turn off Van-Jacobson compression on your slave devices Starting sshd: OK syzkaller syzkaller login: [ 13.183918][ T24] kauditd_printk_skb: 56 callbacks suppressed [ 13.183927][ T24] audit: type=1400 audit(1661564745.024:72): avc: denied { transition } for pid=1632 comm="sshd" path="/bin/sh" dev="sda1" ino=73 scontext=system_u:system_r:initrc_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 13.189309][ T24] audit: type=1400 audit(1661564745.024:73): avc: denied { write } for pid=1632 comm="sh" path="pipe:[15038]" dev="pipefs" ino=15038 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:initrc_t tclass=fifo_file permissive=1 Warning: Permanently added '10.128.1.49' (ECDSA) to the list of known hosts. 2022/08/27 01:45:51 fuzzer started 2022/08/27 01:45:51 dialing manager at 10.128.0.163:36319 [ 20.178689][ T24] audit: type=1400 audit(1661564752.014:74): avc: denied { mounton } for pid=1803 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1136 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 20.182953][ T1803] cgroup: Unknown subsys name 'net' [ 20.201479][ T24] audit: type=1400 audit(1661564752.014:75): avc: denied { mount } for pid=1803 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 20.228775][ T24] audit: type=1400 audit(1661564752.054:76): avc: denied { unmount } for pid=1803 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 20.333228][ T1803] cgroup: Unknown subsys name 'rlimit' 2022/08/27 01:45:52 syscalls: 2753 2022/08/27 01:45:52 code coverage: enabled 2022/08/27 01:45:52 comparison tracing: enabled 2022/08/27 01:45:52 extra coverage: enabled 2022/08/27 01:45:52 delay kcov mmap: enabled 2022/08/27 01:45:52 setuid sandbox: enabled 2022/08/27 01:45:52 namespace sandbox: enabled 2022/08/27 01:45:52 Android sandbox: enabled 2022/08/27 01:45:52 fault injection: enabled 2022/08/27 01:45:52 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2022/08/27 01:45:52 net packet injection: enabled 2022/08/27 01:45:52 net device setup: enabled 2022/08/27 01:45:52 concurrency sanitizer: enabled 2022/08/27 01:45:52 devlink PCI setup: PCI device 0000:00:10.0 is not available 2022/08/27 01:45:52 USB emulation: /dev/raw-gadget does not exist 2022/08/27 01:45:52 hci packet injection: /dev/vhci does not exist 2022/08/27 01:45:52 wifi device emulation: /sys/class/mac80211_hwsim/ does not exist 2022/08/27 01:45:52 802.15.4 emulation: enabled [ 20.452911][ T24] audit: type=1400 audit(1661564752.294:77): avc: denied { mounton } for pid=1803 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 20.479018][ T24] audit: type=1400 audit(1661564752.294:78): avc: denied { mount } for pid=1803 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 20.502414][ T24] audit: type=1400 audit(1661564752.294:79): avc: denied { create } for pid=1803 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 20.522946][ T24] audit: type=1400 audit(1661564752.294:80): avc: denied { write } for pid=1803 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 20.543300][ T24] audit: type=1400 audit(1661564752.294:81): avc: denied { read } for pid=1803 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 2022/08/27 01:45:52 suppressing KCSAN reports in functions: 'ext4_free_inodes_count' 'xas_clear_mark' 2022/08/27 01:45:52 fetching corpus: 0, signal 0/2000 (executing program) 2022/08/27 01:45:52 fetching corpus: 45, signal 19500/22491 (executing program) 2022/08/27 01:45:52 fetching corpus: 95, signal 30015/33627 (executing program) 2022/08/27 01:45:52 fetching corpus: 145, signal 38558/42530 (executing program) 2022/08/27 01:45:52 fetching corpus: 195, signal 42117/46586 (executing program) 2022/08/27 01:45:52 fetching corpus: 245, signal 46189/50938 (executing program) 2022/08/27 01:45:52 fetching corpus: 295, signal 50830/55493 (executing program) 2022/08/27 01:45:53 fetching corpus: 345, signal 53856/58513 (executing program) 2022/08/27 01:45:53 fetching corpus: 395, signal 56919/61406 (executing program) 2022/08/27 01:45:53 fetching corpus: 445, signal 58955/63396 (executing program) 2022/08/27 01:45:53 fetching corpus: 495, signal 62359/66237 (executing program) 2022/08/27 01:45:53 fetching corpus: 545, signal 64561/68106 (executing program) 2022/08/27 01:45:53 fetching corpus: 595, signal 67141/70083 (executing program) 2022/08/27 01:45:53 fetching corpus: 645, signal 69086/71552 (executing program) 2022/08/27 01:45:53 fetching corpus: 695, signal 71499/73180 (executing program) 2022/08/27 01:45:53 fetching corpus: 745, signal 73061/74203 (executing program) 2022/08/27 01:45:53 fetching corpus: 783, signal 74628/75125 (executing program) 2022/08/27 01:45:53 fetching corpus: 783, signal 74628/75157 (executing program) 2022/08/27 01:45:53 fetching corpus: 783, signal 74628/75184 (executing program) 2022/08/27 01:45:53 fetching corpus: 783, signal 74631/75216 (executing program) 2022/08/27 01:45:53 fetching corpus: 783, signal 74633/75247 (executing program) 2022/08/27 01:45:53 fetching corpus: 783, signal 74633/75279 (executing program) 2022/08/27 01:45:53 fetching corpus: 783, signal 74633/75310 (executing program) 2022/08/27 01:45:53 fetching corpus: 783, signal 74633/75354 (executing program) 2022/08/27 01:45:53 fetching corpus: 783, signal 74633/75378 (executing program) 2022/08/27 01:45:53 fetching corpus: 784, signal 74745/75522 (executing program) 2022/08/27 01:45:53 fetching corpus: 784, signal 74745/75540 (executing program) 2022/08/27 01:45:53 fetching corpus: 784, signal 74745/75563 (executing program) 2022/08/27 01:45:53 fetching corpus: 784, signal 74745/75599 (executing program) 2022/08/27 01:45:53 fetching corpus: 785, signal 74756/75639 (executing program) 2022/08/27 01:45:53 fetching corpus: 785, signal 74756/75670 (executing program) 2022/08/27 01:45:53 fetching corpus: 785, signal 74756/75699 (executing program) 2022/08/27 01:45:53 fetching corpus: 785, signal 74756/75727 (executing program) 2022/08/27 01:45:53 fetching corpus: 785, signal 74756/75762 (executing program) 2022/08/27 01:45:53 fetching corpus: 785, signal 74756/75793 (executing program) 2022/08/27 01:45:53 fetching corpus: 785, signal 74756/75821 (executing program) 2022/08/27 01:45:53 fetching corpus: 785, signal 74764/75855 (executing program) 2022/08/27 01:45:53 fetching corpus: 785, signal 74764/75874 (executing program) 2022/08/27 01:45:53 fetching corpus: 785, signal 74764/75874 (executing program) 2022/08/27 01:45:55 starting 6 fuzzer processes 01:45:55 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x1c, r1, 0xa03, 0x0, 0x0, {}, [@L2TP_ATTR_SESSION_ID={0x8}]}, 0x1c}}, 0x0) 01:45:55 executing program 5: r0 = syz_io_uring_setup(0x27a, &(0x7f00000002c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000eeb000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000080)=0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x20, r4, 0xb21, 0x0, 0x0, {{}, {@void, @void, @val={0xc}}}}, 0x20}}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000003c0)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000700)=""/4096, 0x1000}], 0x1}}, 0x0) io_uring_enter(r0, 0x3d1b, 0x0, 0x0, 0x0, 0x0) 01:45:55 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0), 0x2a0002, 0x0) r1 = eventfd2(0x0, 0x0) poll(&(0x7f0000000100)=[{r0}, {r1}], 0x2, 0x0) 01:45:55 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000100)='sys_exit\x00', r0}, 0x10) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x4, 0x0, 0x0) 01:45:55 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='oom_adj\x00') writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1) preadv(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/96, 0x60}], 0x1, 0x80000000, 0x0) 01:45:55 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002800)='/proc/cpuinfo\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000680)=[{&(0x7f0000000080)=""/148, 0x94}], 0x1, 0x948, 0x0) [ 23.659185][ T24] audit: type=1400 audit(1661564755.494:82): avc: denied { execmem } for pid=1807 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 23.735998][ T24] audit: type=1400 audit(1661564755.564:83): avc: denied { read } for pid=1810 comm="syz-executor.5" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 24.053692][ T1810] chnl_net:caif_netlink_parms(): no params data found [ 24.173292][ T1820] chnl_net:caif_netlink_parms(): no params data found [ 24.193447][ T1826] chnl_net:caif_netlink_parms(): no params data found [ 24.201632][ T1810] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.208814][ T1810] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.216273][ T1810] device bridge_slave_0 entered promiscuous mode [ 24.227009][ T1810] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.234092][ T1810] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.241824][ T1810] device bridge_slave_1 entered promiscuous mode [ 24.272798][ T1824] chnl_net:caif_netlink_parms(): no params data found [ 24.295035][ T1810] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 24.316070][ T1810] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 24.393983][ T1820] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.401214][ T1820] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.408821][ T1820] device bridge_slave_0 entered promiscuous mode [ 24.415845][ T1826] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.423060][ T1826] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.430709][ T1826] device bridge_slave_0 entered promiscuous mode [ 24.439693][ T1826] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.446807][ T1826] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.454277][ T1826] device bridge_slave_1 entered promiscuous mode [ 24.461705][ T1810] team0: Port device team_slave_0 added [ 24.477553][ T1820] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.484662][ T1820] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.492373][ T1820] device bridge_slave_1 entered promiscuous mode [ 24.510679][ T1810] team0: Port device team_slave_1 added [ 24.516484][ T1824] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.523566][ T1824] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.531248][ T1824] device bridge_slave_0 entered promiscuous mode [ 24.539750][ T1839] chnl_net:caif_netlink_parms(): no params data found [ 24.553221][ T1820] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 24.562357][ T1852] chnl_net:caif_netlink_parms(): no params data found [ 24.579559][ T1824] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.586645][ T1824] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.594306][ T1824] device bridge_slave_1 entered promiscuous mode [ 24.604094][ T1820] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 24.620831][ T1826] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 24.636517][ T1810] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 24.643480][ T1810] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 24.669386][ T1810] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 24.692872][ T1820] team0: Port device team_slave_0 added [ 24.701537][ T1826] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 24.711013][ T1810] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 24.718024][ T1810] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 24.743935][ T1810] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 24.755751][ T1824] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 24.765467][ T1820] team0: Port device team_slave_1 added [ 24.786081][ T1824] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 24.830834][ T1826] team0: Port device team_slave_0 added [ 24.836770][ T1820] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 24.843741][ T1820] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 24.869698][ T1820] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 24.893201][ T1810] device hsr_slave_0 entered promiscuous mode [ 24.900142][ T1810] device hsr_slave_1 entered promiscuous mode [ 24.907695][ T1826] team0: Port device team_slave_1 added [ 24.921415][ T1852] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.928537][ T1852] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.936092][ T1852] device bridge_slave_0 entered promiscuous mode [ 24.943145][ T1820] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 24.950128][ T1820] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 24.976018][ T1820] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 24.991245][ T1824] team0: Port device team_slave_0 added [ 25.007493][ T1852] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.014651][ T1852] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.022390][ T1852] device bridge_slave_1 entered promiscuous mode [ 25.030252][ T1839] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.037327][ T1839] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.044958][ T1839] device bridge_slave_0 entered promiscuous mode [ 25.057239][ T1824] team0: Port device team_slave_1 added [ 25.063271][ T1826] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 25.070223][ T1826] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 25.096275][ T1826] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 25.115509][ T1839] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.122583][ T1839] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.130069][ T1839] device bridge_slave_1 entered promiscuous mode [ 25.141373][ T1826] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 25.148339][ T1826] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 25.174229][ T1826] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 25.206587][ T1824] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 25.213566][ T1824] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 25.239431][ T1824] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 25.251331][ T1852] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 25.262320][ T1820] device hsr_slave_0 entered promiscuous mode [ 25.269587][ T1820] device hsr_slave_1 entered promiscuous mode [ 25.276330][ T1820] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 25.284643][ T1820] Cannot create hsr debugfs directory [ 25.300567][ T1824] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 25.307616][ T1824] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 25.333529][ T1824] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 25.345293][ T1852] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 25.357586][ T1839] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 25.373555][ T1826] device hsr_slave_0 entered promiscuous mode [ 25.380264][ T1826] device hsr_slave_1 entered promiscuous mode [ 25.386724][ T1826] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 25.394314][ T1826] Cannot create hsr debugfs directory [ 25.415011][ T1839] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 25.447531][ T1852] team0: Port device team_slave_0 added [ 25.454199][ T1852] team0: Port device team_slave_1 added [ 25.463836][ T1824] device hsr_slave_0 entered promiscuous mode [ 25.470395][ T1824] device hsr_slave_1 entered promiscuous mode [ 25.476995][ T1824] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 25.484608][ T1824] Cannot create hsr debugfs directory [ 25.494140][ T1839] team0: Port device team_slave_0 added [ 25.518300][ T1839] team0: Port device team_slave_1 added [ 25.546676][ T1852] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 25.553705][ T1852] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 25.579597][ T1852] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 25.603058][ T1852] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 25.610308][ T1852] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 25.636217][ T1852] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 25.663465][ T1839] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 25.670462][ T1839] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 25.696424][ T1839] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 25.721641][ T1839] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 25.728744][ T1839] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 25.754711][ T1839] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 25.773097][ T1852] device hsr_slave_0 entered promiscuous mode [ 25.779459][ T1852] device hsr_slave_1 entered promiscuous mode [ 25.786642][ T1852] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 25.794218][ T1852] Cannot create hsr debugfs directory [ 25.800794][ T1820] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 25.810581][ T1820] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 25.859577][ T1820] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 25.873410][ T1839] device hsr_slave_0 entered promiscuous mode [ 25.880419][ T1839] device hsr_slave_1 entered promiscuous mode [ 25.888318][ T1839] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 25.896057][ T1839] Cannot create hsr debugfs directory [ 25.904485][ T1820] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 25.931689][ T1810] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 25.956078][ T1810] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 25.965473][ T1810] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 25.976298][ T1810] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 26.002684][ T1826] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 26.018928][ T1826] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 26.033140][ T1826] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 26.054060][ T1826] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 26.086960][ T1824] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 26.096818][ T1824] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 26.106231][ T1824] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 26.120201][ T1820] 8021q: adding VLAN 0 to HW filter on device bond0 [ 26.133878][ T1824] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 26.153042][ T1852] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 26.168139][ T1852] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 26.179610][ T1810] 8021q: adding VLAN 0 to HW filter on device bond0 [ 26.187734][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 26.196505][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 26.207026][ T1820] 8021q: adding VLAN 0 to HW filter on device team0 [ 26.220299][ T1852] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 26.242703][ T1839] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 26.257088][ T1826] 8021q: adding VLAN 0 to HW filter on device bond0 [ 26.267079][ T1810] 8021q: adding VLAN 0 to HW filter on device team0 [ 26.274616][ T1852] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 26.285342][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 26.293939][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 26.302532][ T1910] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.309595][ T1910] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.317454][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 26.326065][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 26.334572][ T1910] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.341595][ T1910] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.349314][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 26.349642][ T24] kauditd_printk_skb: 4 callbacks suppressed [ 26.349666][ T24] audit: type=1400 audit(1661564758.184:88): avc: denied { remove_name } for pid=1418 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 26.357216][ T1910] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 26.362684][ T24] audit: type=1400 audit(1661564758.184:89): avc: denied { rename } for pid=1418 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 26.387440][ T1839] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 26.426820][ T1826] 8021q: adding VLAN 0 to HW filter on device team0 [ 26.449807][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 26.457878][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 26.465798][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 26.473506][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 26.482185][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 26.490733][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 26.499031][ T1912] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.506282][ T1912] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.514042][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 26.522800][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 26.531286][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 26.539645][ T1912] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.546756][ T1912] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.554547][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 26.563020][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 26.571751][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 26.580392][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 26.588860][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 26.597482][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 26.606223][ T1839] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 26.618180][ T1839] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 26.632256][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 26.640105][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 26.648019][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 26.656339][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 26.669002][ T1820] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 26.680142][ T1820] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 26.694164][ T1904] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 26.702523][ T1904] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 26.710705][ T1904] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 26.719361][ T1904] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 26.727988][ T1904] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 26.735622][ T1904] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 26.743098][ T1904] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 26.751496][ T1904] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 26.759966][ T1904] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.767107][ T1904] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.774851][ T1904] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 26.782775][ T1904] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 26.808735][ T1824] 8021q: adding VLAN 0 to HW filter on device bond0 [ 26.816785][ T1899] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 26.826098][ T1899] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 26.834564][ T1899] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.842111][ T1899] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.850319][ T1899] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 26.859236][ T1899] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 26.868006][ T1899] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 26.876461][ T1899] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 26.884885][ T1899] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 26.893615][ T1899] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 26.902250][ T1899] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 26.910598][ T1899] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 26.919360][ T1899] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 26.927509][ T1899] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 26.935752][ T1899] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 26.944263][ T1899] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 26.975703][ T1826] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 26.985263][ T1820] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 26.995948][ T1824] 8021q: adding VLAN 0 to HW filter on device team0 [ 27.003366][ T1899] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 27.011403][ T1899] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 27.020346][ T1899] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 27.028722][ T1899] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 27.036454][ T1899] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 27.045938][ T1899] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 27.054157][ T1899] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 27.085018][ T1810] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 27.101114][ T1839] 8021q: adding VLAN 0 to HW filter on device bond0 [ 27.109255][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 27.117850][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 27.127566][ T1912] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.134806][ T1912] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.142920][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 27.151285][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 27.159844][ T1912] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.166908][ T1912] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.174783][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 27.183814][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 27.192559][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 27.200914][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 27.209481][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 27.217871][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 27.226540][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 27.234873][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 27.243229][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 27.252675][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 27.262986][ T1852] 8021q: adding VLAN 0 to HW filter on device bond0 [ 27.271186][ T1824] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 27.291052][ T1839] 8021q: adding VLAN 0 to HW filter on device team0 [ 27.307446][ T1852] 8021q: adding VLAN 0 to HW filter on device team0 [ 27.315472][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 27.323624][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 27.331884][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 27.339564][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 27.347083][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 27.354642][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 27.362122][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 27.369788][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 27.377726][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 27.385453][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 27.394902][ T1810] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 27.403495][ T1826] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 27.428770][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 27.437940][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 27.446717][ T1908] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.453920][ T1908] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.462129][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 27.470771][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 27.479305][ T1908] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.486350][ T1908] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.494054][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 27.502943][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 27.511623][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 27.520052][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 27.528775][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 27.536396][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 27.556566][ T1824] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 27.569354][ T1839] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 27.579802][ T1839] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 27.593014][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 27.600888][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 27.609256][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 27.617786][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 27.626571][ T1915] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.633639][ T1915] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.641384][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 27.650007][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 27.658412][ T1915] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.665479][ T1915] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.673709][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 27.682694][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 27.692001][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 27.700569][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 27.709301][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 27.717793][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 27.726560][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 27.734972][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 27.743505][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 27.751991][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 27.765123][ T1852] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 27.775589][ T1852] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 27.798361][ T1899] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 27.806736][ T1899] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 27.822670][ T1899] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 27.830387][ T1899] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 27.838912][ T1899] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 27.847546][ T1899] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 27.856008][ T1899] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 27.864399][ T1899] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 27.873245][ T1899] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 27.881777][ T1899] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 27.890459][ T1899] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 27.902041][ T1839] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 27.913704][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 27.921741][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 27.936337][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 27.957374][ T1852] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 27.970147][ T1904] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 27.982143][ T1904] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 28.008181][ T1820] device veth0_vlan entered promiscuous mode [ 28.026183][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 28.035054][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 28.044483][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 28.053559][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 28.062767][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 28.070638][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 28.082436][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 28.090984][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 28.113201][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 28.132671][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 28.145529][ T1820] device veth1_vlan entered promiscuous mode [ 28.156843][ T1899] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 28.166296][ T1899] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 28.196801][ T1899] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 28.221608][ T1820] device veth0_macvtap entered promiscuous mode [ 28.248673][ T1899] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 28.263106][ T1899] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 28.271725][ T1899] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 28.286022][ T1820] device veth1_macvtap entered promiscuous mode [ 28.299619][ T1839] device veth0_vlan entered promiscuous mode [ 28.306715][ T1899] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 28.315178][ T1899] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 28.328256][ T1899] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 28.336528][ T1899] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 28.347477][ T1826] device veth0_vlan entered promiscuous mode [ 28.361160][ T1826] device veth1_vlan entered promiscuous mode [ 28.372257][ T1899] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 28.380260][ T1899] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 28.388352][ T1899] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 28.396861][ T1899] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 28.405825][ T1899] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 28.415133][ T1899] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 28.423478][ T1899] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 28.431840][ T1839] device veth1_vlan entered promiscuous mode [ 28.441776][ T1810] device veth0_vlan entered promiscuous mode [ 28.457234][ T1820] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 28.465703][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 28.474130][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 28.483226][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 28.491445][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 28.500343][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 28.508898][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 28.538972][ T1839] device veth0_macvtap entered promiscuous mode [ 28.546740][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 28.555064][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 28.563112][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 28.570984][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 28.578832][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 28.587698][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 28.596582][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 28.604975][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 28.613897][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 28.622025][ T1824] device veth0_vlan entered promiscuous mode [ 28.631338][ T1820] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 28.638858][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 28.647531][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 28.656949][ T1839] device veth1_macvtap entered promiscuous mode [ 28.670002][ T1826] device veth0_macvtap entered promiscuous mode [ 28.679220][ T1810] device veth1_vlan entered promiscuous mode [ 28.690387][ T1820] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 28.699373][ T1820] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 28.708262][ T1820] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 28.717072][ T1820] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 28.730491][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 28.739631][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 28.747756][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 28.757122][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 28.768405][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 28.780345][ T1839] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 28.790832][ T1839] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 28.802636][ T1839] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 28.811159][ T1826] device veth1_macvtap entered promiscuous mode [ 28.825371][ T1904] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 28.833692][ T1904] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 28.841909][ T1904] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 28.851343][ T1904] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 28.860780][ T1824] device veth1_vlan entered promiscuous mode [ 28.868221][ T1839] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 28.878955][ T1839] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 28.894101][ T1839] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 28.913328][ T1839] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 28.922320][ T1839] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 28.931020][ T1839] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 28.939766][ T1839] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 28.958125][ T1826] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 28.968826][ T1826] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 28.978676][ T1826] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 28.989109][ T1826] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 29.001718][ T1826] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 29.015724][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 29.024269][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 29.032447][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 29.041317][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 29.050039][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 29.058767][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 29.067507][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 29.076584][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 29.086358][ T1810] device veth0_macvtap entered promiscuous mode [ 29.094959][ T1810] device veth1_macvtap entered promiscuous mode [ 29.102514][ T1826] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 29.113061][ T1826] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 29.122929][ T1826] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 29.133403][ T1826] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 29.145256][ T1826] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 29.160236][ T1899] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 29.168553][ T1899] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 29.177453][ T1899] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 29.186640][ T1899] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 29.197323][ T1826] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.206157][ T1826] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.215013][ T1826] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.223831][ T1826] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.245776][ T24] audit: type=1400 audit(1661564761.084:90): avc: denied { mounton } for pid=1820 comm="syz-executor.0" path="/dev/binderfs" dev="devtmpfs" ino=450 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 29.276141][ T1824] device veth0_macvtap entered promiscuous mode [ 29.287700][ T1810] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 29.288698][ T24] audit: type=1400 audit(1661564761.124:91): avc: denied { read write } for pid=1820 comm="syz-executor.0" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 29.298177][ T1810] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 29.298190][ T1810] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 29.337601][ T24] audit: type=1400 audit(1661564761.164:92): avc: denied { open } for pid=1820 comm="syz-executor.0" path="/dev/loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 29.343225][ T1810] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 29.343246][ T1810] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 01:46:01 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x1c, r1, 0xa03, 0x0, 0x0, {}, [@L2TP_ATTR_SESSION_ID={0x8}]}, 0x1c}}, 0x0) [ 29.368170][ T24] audit: type=1400 audit(1661564761.164:93): avc: denied { ioctl } for pid=1820 comm="syz-executor.0" path="/dev/loop0" dev="devtmpfs" ino=100 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 29.377930][ T1810] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 29.383093][ T1810] batman_adv: batadv0: Interface activated: batadv_slave_0 01:46:01 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x1c, r1, 0xa03, 0x0, 0x0, {}, [@L2TP_ATTR_SESSION_ID={0x8}]}, 0x1c}}, 0x0) 01:46:01 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x1c, r1, 0xa03, 0x0, 0x0, {}, [@L2TP_ATTR_SESSION_ID={0x8}]}, 0x1c}}, 0x0) [ 29.441739][ T1810] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 29.452427][ T1810] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 29.462456][ T1810] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 29.472999][ T1810] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 29.482837][ T1810] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 01:46:01 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x10000, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000200008000f8000020004000000000000000000001000000000000000200000001000600000000000000000000000000800029351971f153595a4b414c4c4552202046415433322020200e1fbe777cac22c0740b56b40ebb0700cd105eebf032e4cd16cd19ebfe54686973206973206e6f74206120626f6f7461626c65206469736b2e2020506c6561736520696e73657274206120626f6f7461626c6520666c6f70707920616e640d0a707265737320616e79206b657920746f2074727920616761696e202e2e2e200d0a0000000000", 0xe0}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aa5252614100"/64, 0x40, 0x1e0}, {&(0x7f0000010200)="00000000727241610300000009000000000000000000000000000000000055aa", 0x20, 0x3e0}, {&(0x7f0000010300)="eb58906d6b66732e66617400020820000200008000f8000020004000000000000000000001000000000000000200000001000600000000000000000000000000800029351971f153595a4b414c4c4552202046415433322020200e1fbe777cac22c0740b56b40ebb0700cd105eebf032e4cd16cd19ebfe54686973206973206e6f74206120626f6f7461626c65206469736b2e2020506c6561736520696e73657274206120626f6f7461626c6520666c6f70707920616e640d0a707265737320616e79206b657920746f2074727920616761696e202e2e2e200d0a0000000000", 0xe0, 0xc00}, {&(0x7f0000010400)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0xde0}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0fffffff0fffffff0fffffff0f0700000008000000ffffff0fffffff0f00"/64, 0x40, 0x4000}, {&(0x7f0000010600)="f8ffff0fffffff0ff8ffff0fffffff0fffffff0fffffff0f0700000008000000ffffff0fffffff0f00"/64, 0x40, 0x4200}, {&(0x7f0000010700)="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", 0x120, 0x4400}, {&(0x7f0000010900)="2e202020202020202020201000b6e970325132510000e97032510300000000002e2e2020202020202020201000b6e970325132510000e970325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020202000b6e970325132510000e970325104001a040000", 0x80, 0x5400}, {&(0x7f0000010a00)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x6400}, {&(0x7f0000010f00)='syzkallers\x00'/32, 0x20, 0x7400}, {&(0x7f0000011000)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallers\x00'/128, 0x80, 0xb400}], 0x0, &(0x7f0000011100)) [ 29.493332][ T1810] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 29.507147][ T1810] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 29.514680][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 29.533515][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 29.536991][ T2013] loop0: detected capacity change from 0 to 180 [ 29.542630][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 29.548989][ T24] audit: type=1400 audit(1661564761.384:94): avc: denied { mounton } for pid=2012 comm="syz-executor.0" path="/root/syzkaller-testdir1227688367/syzkaller.f5VksJ/4/file0" dev="sda1" ino=1156 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 29.558342][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 29.583955][ T2013] loop0: 01:46:01 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x10000, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000200008000f8000020004000000000000000000001000000000000000200000001000600000000000000000000000000800029351971f153595a4b414c4c4552202046415433322020200e1fbe777cac22c0740b56b40ebb0700cd105eebf032e4cd16cd19ebfe54686973206973206e6f74206120626f6f7461626c65206469736b2e2020506c6561736520696e73657274206120626f6f7461626c6520666c6f70707920616e640d0a707265737320616e79206b657920746f2074727920616761696e202e2e2e200d0a0000000000", 0xe0}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aa5252614100"/64, 0x40, 0x1e0}, {&(0x7f0000010200)="00000000727241610300000009000000000000000000000000000000000055aa", 0x20, 0x3e0}, {&(0x7f0000010300)="eb58906d6b66732e66617400020820000200008000f8000020004000000000000000000001000000000000000200000001000600000000000000000000000000800029351971f153595a4b414c4c4552202046415433322020200e1fbe777cac22c0740b56b40ebb0700cd105eebf032e4cd16cd19ebfe54686973206973206e6f74206120626f6f7461626c65206469736b2e2020506c6561736520696e73657274206120626f6f7461626c6520666c6f70707920616e640d0a707265737320616e79206b657920746f2074727920616761696e202e2e2e200d0a0000000000", 0xe0, 0xc00}, {&(0x7f0000010400)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0xde0}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0fffffff0fffffff0fffffff0f0700000008000000ffffff0fffffff0f00"/64, 0x40, 0x4000}, {&(0x7f0000010600)="f8ffff0fffffff0ff8ffff0fffffff0fffffff0fffffff0f0700000008000000ffffff0fffffff0f00"/64, 0x40, 0x4200}, {&(0x7f0000010700)="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", 0x120, 0x4400}, {&(0x7f0000010900)="2e202020202020202020201000b6e970325132510000e97032510300000000002e2e2020202020202020201000b6e970325132510000e970325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020202000b6e970325132510000e970325104001a040000", 0x80, 0x5400}, {&(0x7f0000010a00)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x6400}, {&(0x7f0000010f00)='syzkallers\x00'/32, 0x20, 0x7400}, {&(0x7f0000011000)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallers\x00'/128, 0x80, 0xb400}], 0x0, &(0x7f0000011100)) [ 29.591269][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 29.603604][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 29.609050][ T24] audit: type=1400 audit(1661564761.444:95): avc: denied { mount } for pid=2012 comm="syz-executor.0" name="/" dev="loop0" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dosfs_t tclass=filesystem permissive=1 [ 29.613438][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 29.639296][ T24] audit: type=1400 audit(1661564761.474:96): avc: denied { unmount } for pid=1820 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dosfs_t tclass=filesystem permissive=1 [ 29.653085][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 29.673098][ T2015] loop0: detected capacity change from 0 to 180 [ 29.674779][ T1840] I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 29.688550][ T1840] Buffer I/O error on dev loop0, logical block 0, async page read [ 29.704694][ T1824] device veth1_macvtap entered promiscuous mode [ 29.719670][ T1852] device veth0_vlan entered promiscuous mode [ 29.731536][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready 01:46:01 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x10000, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000200008000f8000020004000000000000000000001000000000000000200000001000600000000000000000000000000800029351971f153595a4b414c4c4552202046415433322020200e1fbe777cac22c0740b56b40ebb0700cd105eebf032e4cd16cd19ebfe54686973206973206e6f74206120626f6f7461626c65206469736b2e2020506c6561736520696e73657274206120626f6f7461626c6520666c6f70707920616e640d0a707265737320616e79206b657920746f2074727920616761696e202e2e2e200d0a0000000000", 0xe0}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aa5252614100"/64, 0x40, 0x1e0}, {&(0x7f0000010200)="00000000727241610300000009000000000000000000000000000000000055aa", 0x20, 0x3e0}, {&(0x7f0000010300)="eb58906d6b66732e66617400020820000200008000f8000020004000000000000000000001000000000000000200000001000600000000000000000000000000800029351971f153595a4b414c4c4552202046415433322020200e1fbe777cac22c0740b56b40ebb0700cd105eebf032e4cd16cd19ebfe54686973206973206e6f74206120626f6f7461626c65206469736b2e2020506c6561736520696e73657274206120626f6f7461626c6520666c6f70707920616e640d0a707265737320616e79206b657920746f2074727920616761696e202e2e2e200d0a0000000000", 0xe0, 0xc00}, {&(0x7f0000010400)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0xde0}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0fffffff0fffffff0fffffff0f0700000008000000ffffff0fffffff0f00"/64, 0x40, 0x4000}, {&(0x7f0000010600)="f8ffff0fffffff0ff8ffff0fffffff0fffffff0fffffff0f0700000008000000ffffff0fffffff0f00"/64, 0x40, 0x4200}, {&(0x7f0000010700)="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", 0x120, 0x4400}, {&(0x7f0000010900)="2e202020202020202020201000b6e970325132510000e97032510300000000002e2e2020202020202020201000b6e970325132510000e970325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020202000b6e970325132510000e970325104001a040000", 0x80, 0x5400}, {&(0x7f0000010a00)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x6400}, {&(0x7f0000010f00)='syzkallers\x00'/32, 0x20, 0x7400}, {&(0x7f0000011000)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallers\x00'/128, 0x80, 0xb400}], 0x0, &(0x7f0000011100)) 01:46:01 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000100)='sys_exit\x00', r0}, 0x10) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x4, 0x0, 0x0) [ 29.732440][ T24] audit: type=1400 audit(1661564761.574:97): avc: denied { bpf } for pid=2016 comm="syz-executor.2" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 29.740015][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 29.769181][ T1840] loop0: [ 29.792569][ T2019] loop0: detected capacity change from 0 to 180 [ 29.797759][ T1840] I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 29.808454][ T1840] Buffer I/O error on dev loop0, logical block 0, async page read [ 29.817022][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 29.827072][ T1840] loop0: [ 29.847288][ T1810] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.856558][ T1810] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.865314][ T1810] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.874054][ T1810] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.894055][ T1852] device veth1_vlan entered promiscuous mode [ 29.923902][ T1824] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 29.934572][ T1824] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 29.945514][ T1824] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 29.956093][ T1824] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 29.967477][ T1824] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 29.978052][ T1824] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 29.990201][ T1824] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 30.002416][ T1824] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 30.015111][ T1824] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 30.041655][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 30.053833][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 30.062517][ T2024] syz-executor.3 (2024): /proc/2023/oom_adj is deprecated, please use /proc/2023/oom_score_adj instead. [ 30.091007][ T1824] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 30.101690][ T1824] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 30.111728][ T1824] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 30.122191][ T1824] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 30.132300][ T1824] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 30.143217][ T1824] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 30.154235][ T1824] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 30.165038][ T1824] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 30.177455][ T1824] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 30.188407][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 30.197269][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 30.216583][ T1852] device veth0_macvtap entered promiscuous mode [ 30.226491][ T1824] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.235510][ T1824] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.244236][ T1824] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.253016][ T1824] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.265250][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 30.273851][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 30.283339][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready 01:46:02 executing program 5: r0 = syz_io_uring_setup(0x27a, &(0x7f00000002c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000eeb000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000080)=0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x20, r4, 0xb21, 0x0, 0x0, {{}, {@void, @void, @val={0xc}}}}, 0x20}}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000003c0)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000700)=""/4096, 0x1000}], 0x1}}, 0x0) io_uring_enter(r0, 0x3d1b, 0x0, 0x0, 0x0, 0x0) [ 30.293022][ T1852] device veth1_macvtap entered promiscuous mode [ 30.322929][ T1852] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 30.333689][ T1852] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 30.343525][ T1852] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 30.355691][ T1852] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 30.366287][ T1852] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 30.378118][ T1852] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 30.388233][ T1852] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 30.398759][ T1852] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 30.409886][ T1852] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 30.420487][ T1852] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 30.431715][ T1852] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 30.445293][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 30.454391][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 30.463251][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 30.476970][ T1852] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 30.487536][ T1852] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 30.497402][ T1852] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 30.507889][ T1852] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 30.517725][ T1852] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 30.528379][ T1852] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 30.538224][ T1852] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 30.548657][ T1852] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 30.558664][ T1852] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 30.569210][ T1852] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 30.581902][ T1852] batman_adv: batadv0: Interface activated: batadv_slave_1 01:46:02 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0), 0x2a0002, 0x0) r1 = eventfd2(0x0, 0x0) poll(&(0x7f0000000100)=[{r0}, {r1}], 0x2, 0x0) 01:46:02 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x10000, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000200008000f8000020004000000000000000000001000000000000000200000001000600000000000000000000000000800029351971f153595a4b414c4c4552202046415433322020200e1fbe777cac22c0740b56b40ebb0700cd105eebf032e4cd16cd19ebfe54686973206973206e6f74206120626f6f7461626c65206469736b2e2020506c6561736520696e73657274206120626f6f7461626c6520666c6f70707920616e640d0a707265737320616e79206b657920746f2074727920616761696e202e2e2e200d0a0000000000", 0xe0}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aa5252614100"/64, 0x40, 0x1e0}, {&(0x7f0000010200)="00000000727241610300000009000000000000000000000000000000000055aa", 0x20, 0x3e0}, {&(0x7f0000010300)="eb58906d6b66732e66617400020820000200008000f8000020004000000000000000000001000000000000000200000001000600000000000000000000000000800029351971f153595a4b414c4c4552202046415433322020200e1fbe777cac22c0740b56b40ebb0700cd105eebf032e4cd16cd19ebfe54686973206973206e6f74206120626f6f7461626c65206469736b2e2020506c6561736520696e73657274206120626f6f7461626c6520666c6f70707920616e640d0a707265737320616e79206b657920746f2074727920616761696e202e2e2e200d0a0000000000", 0xe0, 0xc00}, {&(0x7f0000010400)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0xde0}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0fffffff0fffffff0fffffff0f0700000008000000ffffff0fffffff0f00"/64, 0x40, 0x4000}, {&(0x7f0000010600)="f8ffff0fffffff0ff8ffff0fffffff0fffffff0fffffff0f0700000008000000ffffff0fffffff0f00"/64, 0x40, 0x4200}, {&(0x7f0000010700)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000b6e970325132510000e970325103000000000041660069006c00650031000f00100000ffffffffffffffffffff0000ffffffff46494c45312020202020202000b6e970325132510000e970325105000a00000041660069006c00650032000f00140000ffffffffffffffffffff0000ffffffff46494c45322020202020202000b6e970325132510000e970325106002823000041660069006c0065002e000f00d263006f006c0064000000ffff0000ffffffff46494c457e312020434f4c2000b7e970325132510000e9703251090064000000", 0x120, 0x4400}, {&(0x7f0000010900)="2e202020202020202020201000b6e970325132510000e97032510300000000002e2e2020202020202020201000b6e970325132510000e970325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020202000b6e970325132510000e970325104001a040000", 0x80, 0x5400}, {&(0x7f0000010a00)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x6400}, {&(0x7f0000010f00)='syzkallers\x00'/32, 0x20, 0x7400}, {&(0x7f0000011000)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallers\x00'/128, 0x80, 0xb400}], 0x0, &(0x7f0000011100)) 01:46:02 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000100)='sys_exit\x00', r0}, 0x10) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x4, 0x0, 0x0) [ 30.592786][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 30.601476][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 30.618835][ T1852] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.628142][ T1852] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.637160][ T1852] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.645966][ T1852] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.655338][ T1824] ================================================================== [ 30.663434][ T1824] BUG: KCSAN: data-race in fsnotify / fsnotify_detach_mark [ 30.670655][ T1824] [ 30.672972][ T1824] write to 0xffff8881040f0e04 of 4 bytes by task 1840 on cpu 0: [ 30.680608][ T1824] fsnotify_detach_mark+0xdd/0x180 [ 30.686420][ T1824] fsnotify_destroy_mark+0xae/0x1c0 [ 30.691635][ T1824] __se_sys_inotify_rm_watch+0xf7/0x170 [ 30.697179][ T1824] __x64_sys_inotify_rm_watch+0x2d/0x40 [ 30.702727][ T1824] do_syscall_64+0x2b/0x70 [ 30.707589][ T1824] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 30.714016][ T1824] [ 30.716332][ T1824] read to 0xffff8881040f0e04 of 4 bytes by task 1824 on cpu 1: [ 30.723877][ T1824] fsnotify+0x12f8/0x1550 [ 30.728212][ T1824] __fsnotify_parent+0x30b/0x470 [ 30.733154][ T1824] __fput+0x1d7/0x510 [ 30.737146][ T1824] ____fput+0x11/0x20 [ 30.741397][ T1824] task_work_run+0x8e/0x110 [ 30.745904][ T1824] exit_to_user_mode_loop+0x124/0x130 [ 30.751369][ T1824] syscall_exit_to_user_mode+0x6a/0x90 [ 30.756837][ T1824] do_syscall_64+0x37/0x70 [ 30.761257][ T1824] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 30.767153][ T1824] [ 30.769474][ T1824] value changed: 0x00000003 -> 0x00000000 [ 30.775197][ T1824] [ 30.777514][ T1824] Reported by Kernel Concurrency Sanitizer on: [ 30.783997][ T1824] CPU: 1 PID: 1824 Comm: syz-executor.1 Not tainted 6.0.0-rc2-syzkaller-00248-ge022620b5d05-dirty #0 [ 30.795452][ T1824] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 30.805625][ T1824] ================================================================== [ 30.815145][ T2040] loop0: detected capacity change from 0 to 180 [ 30.835957][ T2040] loop0: 01:46:02 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002800)='/proc/cpuinfo\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000680)=[{&(0x7f0000000080)=""/148, 0x94}], 0x1, 0x948, 0x0) 01:46:02 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='oom_adj\x00') writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1) preadv(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/96, 0x60}], 0x1, 0x80000000, 0x0) 01:46:02 executing program 5: r0 = syz_io_uring_setup(0x27a, &(0x7f00000002c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000eeb000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000080)=0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x20, r4, 0xb21, 0x0, 0x0, {{}, {@void, @void, @val={0xc}}}}, 0x20}}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000003c0)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000700)=""/4096, 0x1000}], 0x1}}, 0x0) io_uring_enter(r0, 0x3d1b, 0x0, 0x0, 0x0, 0x0) 01:46:02 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0), 0x2a0002, 0x0) r1 = eventfd2(0x0, 0x0) poll(&(0x7f0000000100)=[{r0}, {r1}], 0x2, 0x0) 01:46:02 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000100)='sys_exit\x00', r0}, 0x10) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x4, 0x0, 0x0) 01:46:02 executing program 0: r0 = syz_io_uring_setup(0x27a, &(0x7f00000002c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000eeb000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000080)=0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x20, r4, 0xb21, 0x0, 0x0, {{}, {@void, @void, @val={0xc}}}}, 0x20}}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000003c0)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000700)=""/4096, 0x1000}], 0x1}}, 0x0) io_uring_enter(r0, 0x3d1b, 0x0, 0x0, 0x0, 0x0) 01:46:02 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='oom_adj\x00') writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1) preadv(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/96, 0x60}], 0x1, 0x80000000, 0x0) 01:46:02 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0), 0x2a0002, 0x0) r1 = eventfd2(0x0, 0x0) poll(&(0x7f0000000100)=[{r0}, {r1}], 0x2, 0x0) 01:46:02 executing program 5: r0 = syz_io_uring_setup(0x27a, &(0x7f00000002c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000eeb000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000080)=0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x20, r4, 0xb21, 0x0, 0x0, {{}, {@void, @void, @val={0xc}}}}, 0x20}}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000003c0)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000700)=""/4096, 0x1000}], 0x1}}, 0x0) io_uring_enter(r0, 0x3d1b, 0x0, 0x0, 0x0, 0x0) 01:46:02 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002800)='/proc/cpuinfo\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000680)=[{&(0x7f0000000080)=""/148, 0x94}], 0x1, 0x948, 0x0) 01:46:02 executing program 0: r0 = syz_io_uring_setup(0x27a, &(0x7f00000002c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000eeb000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000080)=0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x20, r4, 0xb21, 0x0, 0x0, {{}, {@void, @void, @val={0xc}}}}, 0x20}}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000003c0)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000700)=""/4096, 0x1000}], 0x1}}, 0x0) io_uring_enter(r0, 0x3d1b, 0x0, 0x0, 0x0, 0x0) 01:46:02 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002800)='/proc/cpuinfo\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000680)=[{&(0x7f0000000080)=""/148, 0x94}], 0x1, 0x948, 0x0) 01:46:02 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='oom_adj\x00') writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1) preadv(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/96, 0x60}], 0x1, 0x80000000, 0x0) 01:46:02 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002800)='/proc/cpuinfo\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000680)=[{&(0x7f0000000080)=""/148, 0x94}], 0x1, 0x948, 0x0) 01:46:02 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='oom_adj\x00') writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1) preadv(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/96, 0x60}], 0x1, 0x80000000, 0x0) 01:46:02 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000100)='sys_exit\x00', r0}, 0x10) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x4, 0x0, 0x0) 01:46:02 executing program 0: r0 = syz_io_uring_setup(0x27a, &(0x7f00000002c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000eeb000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000080)=0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x20, r4, 0xb21, 0x0, 0x0, {{}, {@void, @void, @val={0xc}}}}, 0x20}}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000003c0)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000700)=""/4096, 0x1000}], 0x1}}, 0x0) io_uring_enter(r0, 0x3d1b, 0x0, 0x0, 0x0, 0x0) 01:46:02 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$bt_hci(r0, 0x0, 0x3, &(0x7f00000000c0)=""/191, &(0x7f0000000180)=0xbf) 01:46:02 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002800)='/proc/cpuinfo\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000680)=[{&(0x7f0000000080)=""/148, 0x94}], 0x1, 0x948, 0x0) 01:46:02 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000100)='sys_exit\x00', r0}, 0x10) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x4, 0x0, 0x0) 01:46:02 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002800)='/proc/cpuinfo\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000680)=[{&(0x7f0000000080)=""/148, 0x94}], 0x1, 0x948, 0x0) 01:46:02 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$bt_hci(r0, 0x0, 0x3, &(0x7f00000000c0)=""/191, &(0x7f0000000180)=0xbf) 01:46:02 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000100)='sys_exit\x00', r0}, 0x10) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x4, 0x0, 0x0) 01:46:02 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$bt_hci(r0, 0x0, 0x3, &(0x7f00000000c0)=""/191, &(0x7f0000000180)=0xbf) 01:46:02 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='oom_adj\x00') writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1) preadv(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/96, 0x60}], 0x1, 0x80000000, 0x0) 01:46:02 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$bt_hci(r0, 0x0, 0x3, &(0x7f00000000c0)=""/191, &(0x7f0000000180)=0xbf) 01:46:02 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='oom_adj\x00') writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1) preadv(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/96, 0x60}], 0x1, 0x80000000, 0x0) 01:46:03 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$bt_hci(r0, 0x0, 0x3, &(0x7f00000000c0)=""/191, &(0x7f0000000180)=0xbf) 01:46:03 executing program 4: unshare(0x2040400) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_pktinfo(r0, 0x11, 0x8, 0x0, 0x0) 01:46:03 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) close(r2) r3 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_buf(r3, 0x29, 0x39, &(0x7f0000e86000)="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", 0x118) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000001340)="e6", 0x1}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xcbf, 0x80000001}, 0x14) splice(r0, 0x0, r3, 0x0, 0xfd5c, 0x0) 01:46:03 executing program 3: r0 = open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r1 = syz_io_uring_setup(0x2de7, &(0x7f0000001600), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ff8000/0x8000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000000)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000280)=@IORING_OP_WRITE={0x17, 0x0, 0x2004, @fd=r0, 0x0, 0x0}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0x5) setuid(r5) io_uring_enter(r1, 0x2ff, 0x0, 0x0, 0x0, 0x0) 01:46:03 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r0, 0x2288, &(0x7f0000000080)) 01:46:03 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = dup(r0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, 0x0) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0xfffe}]}) 01:46:03 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) close(r2) r3 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_buf(r3, 0x29, 0x39, &(0x7f0000e86000)="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", 0x118) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000001340)="e6", 0x1}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xcbf, 0x80000001}, 0x14) splice(r0, 0x0, r3, 0x0, 0xfd5c, 0x0) 01:46:03 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r0, 0x2288, &(0x7f0000000080)) 01:46:03 executing program 4: unshare(0x2040400) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_pktinfo(r0, 0x11, 0x8, 0x0, 0x0) 01:46:03 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$bt_hci(r0, 0x0, 0x3, &(0x7f00000000c0)=""/191, &(0x7f0000000180)=0xbf) 01:46:03 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = dup(r0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, 0x0) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0xfffe}]}) 01:46:03 executing program 4: unshare(0x2040400) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_pktinfo(r0, 0x11, 0x8, 0x0, 0x0) 01:46:03 executing program 3: r0 = open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r1 = syz_io_uring_setup(0x2de7, &(0x7f0000001600), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ff8000/0x8000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000000)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000280)=@IORING_OP_WRITE={0x17, 0x0, 0x2004, @fd=r0, 0x0, 0x0}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0x5) setuid(r5) io_uring_enter(r1, 0x2ff, 0x0, 0x0, 0x0, 0x0) 01:46:03 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) close(r2) r3 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_buf(r3, 0x29, 0x39, &(0x7f0000e86000)="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", 0x118) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000001340)="e6", 0x1}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xcbf, 0x80000001}, 0x14) splice(r0, 0x0, r3, 0x0, 0xfd5c, 0x0) 01:46:03 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$bt_hci(r0, 0x0, 0x3, &(0x7f00000000c0)=""/191, &(0x7f0000000180)=0xbf) 01:46:03 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r0, 0x2288, &(0x7f0000000080)) 01:46:03 executing program 4: unshare(0x2040400) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_pktinfo(r0, 0x11, 0x8, 0x0, 0x0) 01:46:03 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = dup(r0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, 0x0) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0xfffe}]}) 01:46:03 executing program 3: r0 = open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r1 = syz_io_uring_setup(0x2de7, &(0x7f0000001600), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ff8000/0x8000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000000)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000280)=@IORING_OP_WRITE={0x17, 0x0, 0x2004, @fd=r0, 0x0, 0x0}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0x5) setuid(r5) io_uring_enter(r1, 0x2ff, 0x0, 0x0, 0x0, 0x0) 01:46:03 executing program 2: r0 = open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r1 = syz_io_uring_setup(0x2de7, &(0x7f0000001600), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ff8000/0x8000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000000)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000280)=@IORING_OP_WRITE={0x17, 0x0, 0x2004, @fd=r0, 0x0, 0x0}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0x5) setuid(r5) io_uring_enter(r1, 0x2ff, 0x0, 0x0, 0x0, 0x0) 01:46:03 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) close(r2) r3 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_buf(r3, 0x29, 0x39, &(0x7f0000e86000)="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", 0x118) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000001340)="e6", 0x1}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xcbf, 0x80000001}, 0x14) splice(r0, 0x0, r3, 0x0, 0xfd5c, 0x0) 01:46:03 executing program 4: r0 = open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r1 = syz_io_uring_setup(0x2de7, &(0x7f0000001600), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ff8000/0x8000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000000)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000280)=@IORING_OP_WRITE={0x17, 0x0, 0x2004, @fd=r0, 0x0, 0x0}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0x5) setuid(r5) io_uring_enter(r1, 0x2ff, 0x0, 0x0, 0x0, 0x0) 01:46:03 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r0, 0x2288, &(0x7f0000000080)) 01:46:03 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = dup(r0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, 0x0) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0xfffe}]}) 01:46:03 executing program 2: r0 = open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r1 = syz_io_uring_setup(0x2de7, &(0x7f0000001600), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ff8000/0x8000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000000)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000280)=@IORING_OP_WRITE={0x17, 0x0, 0x2004, @fd=r0, 0x0, 0x0}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0x5) setuid(r5) io_uring_enter(r1, 0x2ff, 0x0, 0x0, 0x0, 0x0) 01:46:03 executing program 3: r0 = open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r1 = syz_io_uring_setup(0x2de7, &(0x7f0000001600), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ff8000/0x8000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000000)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000280)=@IORING_OP_WRITE={0x17, 0x0, 0x2004, @fd=r0, 0x0, 0x0}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0x5) setuid(r5) io_uring_enter(r1, 0x2ff, 0x0, 0x0, 0x0, 0x0) 01:46:03 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = dup(r0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, 0x0) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0xfffe}]}) 01:46:03 executing program 4: r0 = open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r1 = syz_io_uring_setup(0x2de7, &(0x7f0000001600), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ff8000/0x8000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000000)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000280)=@IORING_OP_WRITE={0x17, 0x0, 0x2004, @fd=r0, 0x0, 0x0}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0x5) setuid(r5) io_uring_enter(r1, 0x2ff, 0x0, 0x0, 0x0, 0x0) 01:46:03 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r0, 0x2288, &(0x7f0000000080)) 01:46:03 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) close(r2) r3 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_buf(r3, 0x29, 0x39, &(0x7f0000e86000)="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", 0x118) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000001340)="e6", 0x1}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xcbf, 0x80000001}, 0x14) splice(r0, 0x0, r3, 0x0, 0xfd5c, 0x0) 01:46:03 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = dup(r0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, 0x0) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0xfffe}]}) 01:46:03 executing program 2: r0 = open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r1 = syz_io_uring_setup(0x2de7, &(0x7f0000001600), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ff8000/0x8000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000000)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000280)=@IORING_OP_WRITE={0x17, 0x0, 0x2004, @fd=r0, 0x0, 0x0}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0x5) setuid(r5) io_uring_enter(r1, 0x2ff, 0x0, 0x0, 0x0, 0x0) 01:46:03 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) close(r2) r3 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_buf(r3, 0x29, 0x39, &(0x7f0000e86000)="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", 0x118) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000001340)="e6", 0x1}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xcbf, 0x80000001}, 0x14) splice(r0, 0x0, r3, 0x0, 0xfd5c, 0x0) 01:46:03 executing program 4: r0 = open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r1 = syz_io_uring_setup(0x2de7, &(0x7f0000001600), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ff8000/0x8000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000000)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000280)=@IORING_OP_WRITE={0x17, 0x0, 0x2004, @fd=r0, 0x0, 0x0}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0x5) setuid(r5) io_uring_enter(r1, 0x2ff, 0x0, 0x0, 0x0, 0x0) 01:46:03 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) close(r2) r3 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_buf(r3, 0x29, 0x39, &(0x7f0000e86000)="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", 0x118) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000001340)="e6", 0x1}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xcbf, 0x80000001}, 0x14) splice(r0, 0x0, r3, 0x0, 0xfd5c, 0x0) 01:46:03 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = dup(r0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, 0x0) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0xfffe}]}) 01:46:03 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r0, 0x2288, &(0x7f0000000080)) 01:46:03 executing program 2: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) close(r2) r3 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_buf(r3, 0x29, 0x39, &(0x7f0000e86000)="0022040000ffffebfffffffeffffff0700000000ff000207835eeb1317b208feefaf234b4ff8b4cc4c39bdc8451792b903f4b7d8c8cf2153622652328c19ef68234f905557c4070000008735e9ab2f77c62e0a5cdd2cf9984c070400000000000003ff23353d8b2fc6a3ae1ebfcb49004a3ccd3560ae01010000079c60ed7449b842f3e253be8a62b37f820fe75a9ea937ea4efbfb9b4a128f2dbe2837496d00ad7765abaac2ec0f91c88a1ea1ff6ee308c72febedcf00798d41991ac25bb6fce2220c25ea380c7e112ab358c3a6bd8a59c100000001b4e82cb03419544a3988bc226a85abe6eb60cd7cf8d103d38c31c7c86d16c4d86cbe4ab390c092d077ce70590fbbd4f8bf4d6ab1cea6dbe9d4a54c17aac0db6e3845", 0x118) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000001340)="e6", 0x1}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xcbf, 0x80000001}, 0x14) splice(r0, 0x0, r3, 0x0, 0xfd5c, 0x0) 01:46:03 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) close(r2) r3 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_buf(r3, 0x29, 0x39, &(0x7f0000e86000)="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", 0x118) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000001340)="e6", 0x1}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xcbf, 0x80000001}, 0x14) splice(r0, 0x0, r3, 0x0, 0xfd5c, 0x0) 01:46:03 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) close(r2) r3 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_buf(r3, 0x29, 0x39, &(0x7f0000e86000)="0022040000ffffebfffffffeffffff0700000000ff000207835eeb1317b208feefaf234b4ff8b4cc4c39bdc8451792b903f4b7d8c8cf2153622652328c19ef68234f905557c4070000008735e9ab2f77c62e0a5cdd2cf9984c070400000000000003ff23353d8b2fc6a3ae1ebfcb49004a3ccd3560ae01010000079c60ed7449b842f3e253be8a62b37f820fe75a9ea937ea4efbfb9b4a128f2dbe2837496d00ad7765abaac2ec0f91c88a1ea1ff6ee308c72febedcf00798d41991ac25bb6fce2220c25ea380c7e112ab358c3a6bd8a59c100000001b4e82cb03419544a3988bc226a85abe6eb60cd7cf8d103d38c31c7c86d16c4d86cbe4ab390c092d077ce70590fbbd4f8bf4d6ab1cea6dbe9d4a54c17aac0db6e3845", 0x118) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000001340)="e6", 0x1}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xcbf, 0x80000001}, 0x14) splice(r0, 0x0, r3, 0x0, 0xfd5c, 0x0) 01:46:03 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x10, 0x52}, [@ldst={0x5}]}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xffffffffffffffcc}, 0x48) 01:46:03 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) close(r2) r3 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_buf(r3, 0x29, 0x39, &(0x7f0000e86000)="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", 0x118) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000001340)="e6", 0x1}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xcbf, 0x80000001}, 0x14) splice(r0, 0x0, r3, 0x0, 0xfd5c, 0x0) 01:46:03 executing program 2: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) close(r2) r3 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_buf(r3, 0x29, 0x39, &(0x7f0000e86000)="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", 0x118) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000001340)="e6", 0x1}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xcbf, 0x80000001}, 0x14) splice(r0, 0x0, r3, 0x0, 0xfd5c, 0x0) 01:46:03 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@func_proto={0x0, 0x0, 0x0, 0x2, 0x2}, @var={0x2, 0x0, 0x0, 0xe, 0x2}]}, {0x0, [0x0, 0x2e]}}, &(0x7f00000005c0)=""/180, 0x38, 0xb4, 0x1}, 0x20) 01:46:03 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x10, 0x52}, [@ldst={0x5}]}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xffffffffffffffcc}, 0x48) 01:46:03 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r0, 0x2288, &(0x7f0000000080)) [ 31.493794][ T2171] syz-executor.0 (2171) used greatest stack depth: 11376 bytes left 01:46:03 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x9, 0x10001, 0x1, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xa, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x46, 0x0, 0x0, 0x2}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @exit]}, &(0x7f0000000000)='GPL\x00', 0x4, 0xda, &(0x7f0000000340)=""/218, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 01:46:03 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$sock_int(r0, 0x1, 0xe, 0x0, 0x0) 01:46:03 executing program 2: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) close(r2) r3 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_buf(r3, 0x29, 0x39, &(0x7f0000e86000)="0022040000ffffebfffffffeffffff0700000000ff000207835eeb1317b208feefaf234b4ff8b4cc4c39bdc8451792b903f4b7d8c8cf2153622652328c19ef68234f905557c4070000008735e9ab2f77c62e0a5cdd2cf9984c070400000000000003ff23353d8b2fc6a3ae1ebfcb49004a3ccd3560ae01010000079c60ed7449b842f3e253be8a62b37f820fe75a9ea937ea4efbfb9b4a128f2dbe2837496d00ad7765abaac2ec0f91c88a1ea1ff6ee308c72febedcf00798d41991ac25bb6fce2220c25ea380c7e112ab358c3a6bd8a59c100000001b4e82cb03419544a3988bc226a85abe6eb60cd7cf8d103d38c31c7c86d16c4d86cbe4ab390c092d077ce70590fbbd4f8bf4d6ab1cea6dbe9d4a54c17aac0db6e3845", 0x118) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000001340)="e6", 0x1}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xcbf, 0x80000001}, 0x14) splice(r0, 0x0, r3, 0x0, 0xfd5c, 0x0) 01:46:03 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x10, 0x52}, [@ldst={0x5}]}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xffffffffffffffcc}, 0x48) 01:46:03 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@func_proto={0x0, 0x0, 0x0, 0x2, 0x2}, @var={0x2, 0x0, 0x0, 0xe, 0x2}]}, {0x0, [0x0, 0x2e]}}, &(0x7f00000005c0)=""/180, 0x38, 0xb4, 0x1}, 0x20) 01:46:03 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x1, &(0x7f00000001c0)=0x7, 0x8) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x58, 0x2, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0x9000000}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}]}, 0x58}}, 0x0) 01:46:03 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@func_proto={0x0, 0x0, 0x0, 0x2, 0x2}, @var={0x2, 0x0, 0x0, 0xe, 0x2}]}, {0x0, [0x0, 0x2e]}}, &(0x7f00000005c0)=""/180, 0x38, 0xb4, 0x1}, 0x20) 01:46:03 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x10, 0xffffffffffffffff, 0x8) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffdfffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000380), 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0, 0x1, 0x0, 0x0, 0x0, 0xe, '\x00', 0x0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x2}, 0x8, 0x10, &(0x7f0000000440)={0x2, 0x8, 0x101}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000780)=[r0, 0xffffffffffffffff, r2, 0xffffffffffffffff]}, 0x80) write$cgroup_int(r1, &(0x7f0000000200), 0x806000) 01:46:03 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$sock_int(r0, 0x1, 0xe, 0x0, 0x0) 01:46:03 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x9, 0x10001, 0x1, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xa, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x46, 0x0, 0x0, 0x2}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @exit]}, &(0x7f0000000000)='GPL\x00', 0x4, 0xda, &(0x7f0000000340)=""/218, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 01:46:03 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x10, 0x52}, [@ldst={0x5}]}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xffffffffffffffcc}, 0x48) 01:46:03 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@func_proto={0x0, 0x0, 0x0, 0x2, 0x2}, @var={0x2, 0x0, 0x0, 0xe, 0x2}]}, {0x0, [0x0, 0x2e]}}, &(0x7f00000005c0)=""/180, 0x38, 0xb4, 0x1}, 0x20) 01:46:03 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x1, &(0x7f00000001c0)=0x7, 0x8) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x58, 0x2, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0x9000000}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}]}, 0x58}}, 0x0) [ 31.595517][ T24] kauditd_printk_skb: 13 callbacks suppressed [ 31.595529][ T24] audit: type=1400 audit(1661564763.434:111): avc: denied { map_create } for pid=2200 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 01:46:03 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$sock_int(r0, 0x1, 0xe, 0x0, 0x0) 01:46:03 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x9, 0x10001, 0x1, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xa, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x46, 0x0, 0x0, 0x2}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @exit]}, &(0x7f0000000000)='GPL\x00', 0x4, 0xda, &(0x7f0000000340)=""/218, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 31.702478][ T24] audit: type=1400 audit(1661564763.464:112): avc: denied { map_read map_write } for pid=2200 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 31.723305][ T24] audit: type=1400 audit(1661564763.494:113): avc: denied { create } for pid=2209 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 31.744180][ T24] audit: type=1400 audit(1661564763.494:114): avc: denied { write } for pid=2209 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 31.744373][ C1] hrtimer: interrupt took 35563 ns [ 31.765043][ T24] audit: type=1400 audit(1661564763.504:115): avc: denied { open } for pid=2211 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 01:46:03 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x1, &(0x7f00000001c0)=0x7, 0x8) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x58, 0x2, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0x9000000}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}]}, 0x58}}, 0x0) 01:46:03 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x1, &(0x7f00000001c0)=0x7, 0x8) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x58, 0x2, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0x9000000}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}]}, 0x58}}, 0x0) 01:46:03 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x9, 0x10001, 0x1, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xa, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x46, 0x0, 0x0, 0x2}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @exit]}, &(0x7f0000000000)='GPL\x00', 0x4, 0xda, &(0x7f0000000340)=""/218, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 01:46:03 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="230000002000ffae00060c00080f02f78000000076018708548cabca07007d06a40000", 0x23}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) [ 31.789596][ T24] audit: type=1400 audit(1661564763.514:116): avc: denied { kernel } for pid=2211 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 31.839276][ T24] audit: type=1400 audit(1661564763.674:117): avc: denied { create } for pid=2234 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 01:46:03 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x10, 0xffffffffffffffff, 0x8) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffdfffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000380), 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0, 0x1, 0x0, 0x0, 0x0, 0xe, '\x00', 0x0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x2}, 0x8, 0x10, &(0x7f0000000440)={0x2, 0x8, 0x101}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000780)=[r0, 0xffffffffffffffff, r2, 0xffffffffffffffff]}, 0x80) write$cgroup_int(r1, &(0x7f0000000200), 0x806000) 01:46:03 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x9, 0x10001, 0x1, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xa, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x46, 0x0, 0x0, 0x2}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @exit]}, &(0x7f0000000000)='GPL\x00', 0x4, 0xda, &(0x7f0000000340)=""/218, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 01:46:03 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$sock_int(r0, 0x1, 0xe, 0x0, 0x0) 01:46:03 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x9, 0x10001, 0x1, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xa, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x46, 0x0, 0x0, 0x2}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @exit]}, &(0x7f0000000000)='GPL\x00', 0x4, 0xda, &(0x7f0000000340)=""/218, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 01:46:03 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="230000002000ffae00060c00080f02f78000000076018708548cabca07007d06a40000", 0x23}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) 01:46:03 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000780)=@acquire={0x20c, 0x17, 0x52d, 0x0, 0x0, {{@in=@private}, @in=@multicast1, {@in=@remote}, {{@in=@multicast2, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x40, 0x0, 0x0, 0xee01}}}, [@mark={0xc}, @extra_flags={0x8}, @tmpl={0x0, 0x5, [{{@in=@local}, 0x0, @in=@multicast1}, {{@in6=@mcast1}, 0x0, @in6=@dev}, {{@in=@dev}, 0x0, @in6=@loopback}, {{@in6=@loopback}, 0x0, @in=@empty}]}, @algo_auth={0x65, 0x1, {{'sha384-arm\x00'}, 0xe8, "99c156096903d82b88b5d1b399b092b70c58d2ae0fb36b36fde98a104f"}}, @algo_auth_trunc={0x4c, 0x14, {{'md5-generic\x00'}}}, @lastused={0xc}, @XFRMA_IF_ID={0x8}]}, 0x20c}}, 0x0) 01:46:03 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x10, 0xffffffffffffffff, 0x8) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffdfffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000380), 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0, 0x1, 0x0, 0x0, 0x0, 0xe, '\x00', 0x0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x2}, 0x8, 0x10, &(0x7f0000000440)={0x2, 0x8, 0x101}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000780)=[r0, 0xffffffffffffffff, r2, 0xffffffffffffffff]}, 0x80) write$cgroup_int(r1, &(0x7f0000000200), 0x806000) 01:46:03 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef000000000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000001c0)=@ipv4_deladdr={0x20, 0x15, 0x0, 0x0, 0x0, {}, [@IFA_FLAGS={0x8}]}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x49}, {&(0x7f0000000140)=""/85, 0x36c}, {&(0x7f0000000fc0)=""/4093, 0x29b}, {&(0x7f0000000400)=""/106, 0x6}, {&(0x7f0000000740)=""/73, 0x544}, {&(0x7f0000000200)=""/77, 0x2db}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa8}], 0xc4, &(0x7f0000000280)=""/191, 0x41, 0x40000000}}], 0x400000000000194, 0x0, &(0x7f0000003700)={0x77359400}) 01:46:03 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="230000002000ffae00060c00080f02f78000000076018708548cabca07007d06a40000", 0x23}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) [ 31.979594][ T24] audit: type=1400 audit(1661564763.814:118): avc: denied { create } for pid=2242 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 31.984634][ T2244] netlink: 208 bytes leftover after parsing attributes in process `syz-executor.5'. 01:46:03 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x9, 0x10001, 0x1, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xa, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x46, 0x0, 0x0, 0x2}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @exit]}, &(0x7f0000000000)='GPL\x00', 0x4, 0xda, &(0x7f0000000340)=""/218, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 01:46:03 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef000000000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000001c0)=@ipv4_deladdr={0x20, 0x15, 0x0, 0x0, 0x0, {}, [@IFA_FLAGS={0x8}]}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x49}, {&(0x7f0000000140)=""/85, 0x36c}, {&(0x7f0000000fc0)=""/4093, 0x29b}, {&(0x7f0000000400)=""/106, 0x6}, {&(0x7f0000000740)=""/73, 0x544}, {&(0x7f0000000200)=""/77, 0x2db}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa8}], 0xc4, &(0x7f0000000280)=""/191, 0x41, 0x40000000}}], 0x400000000000194, 0x0, &(0x7f0000003700)={0x77359400}) 01:46:03 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000780)=@acquire={0x20c, 0x17, 0x52d, 0x0, 0x0, {{@in=@private}, @in=@multicast1, {@in=@remote}, {{@in=@multicast2, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x40, 0x0, 0x0, 0xee01}}}, [@mark={0xc}, @extra_flags={0x8}, @tmpl={0x0, 0x5, [{{@in=@local}, 0x0, @in=@multicast1}, {{@in6=@mcast1}, 0x0, @in6=@dev}, {{@in=@dev}, 0x0, @in6=@loopback}, {{@in6=@loopback}, 0x0, @in=@empty}]}, @algo_auth={0x65, 0x1, {{'sha384-arm\x00'}, 0xe8, "99c156096903d82b88b5d1b399b092b70c58d2ae0fb36b36fde98a104f"}}, @algo_auth_trunc={0x4c, 0x14, {{'md5-generic\x00'}}}, @lastused={0xc}, @XFRMA_IF_ID={0x8}]}, 0x20c}}, 0x0) [ 32.075361][ T24] audit: type=1400 audit(1661564763.814:119): avc: denied { write } for pid=2242 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 32.096319][ T24] audit: type=1400 audit(1661564763.814:120): avc: denied { nlmsg_write } for pid=2242 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 32.115678][ T2258] netlink: 208 bytes leftover after parsing attributes in process `syz-executor.5'. 01:46:04 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x10, 0xffffffffffffffff, 0x8) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffdfffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000380), 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0, 0x1, 0x0, 0x0, 0x0, 0xe, '\x00', 0x0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x2}, 0x8, 0x10, &(0x7f0000000440)={0x2, 0x8, 0x101}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000780)=[r0, 0xffffffffffffffff, r2, 0xffffffffffffffff]}, 0x80) write$cgroup_int(r1, &(0x7f0000000200), 0x806000) 01:46:04 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="230000002000ffae00060c00080f02f78000000076018708548cabca07007d06a40000", 0x23}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) 01:46:04 executing program 0: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef000000000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000001c0)=@ipv4_deladdr={0x20, 0x15, 0x0, 0x0, 0x0, {}, [@IFA_FLAGS={0x8}]}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x49}, {&(0x7f0000000140)=""/85, 0x36c}, {&(0x7f0000000fc0)=""/4093, 0x29b}, {&(0x7f0000000400)=""/106, 0x6}, {&(0x7f0000000740)=""/73, 0x544}, {&(0x7f0000000200)=""/77, 0x2db}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa8}], 0xc4, &(0x7f0000000280)=""/191, 0x41, 0x40000000}}], 0x400000000000194, 0x0, &(0x7f0000003700)={0x77359400}) 01:46:04 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef000000000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000001c0)=@ipv4_deladdr={0x20, 0x15, 0x0, 0x0, 0x0, {}, [@IFA_FLAGS={0x8}]}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x49}, {&(0x7f0000000140)=""/85, 0x36c}, {&(0x7f0000000fc0)=""/4093, 0x29b}, {&(0x7f0000000400)=""/106, 0x6}, {&(0x7f0000000740)=""/73, 0x544}, {&(0x7f0000000200)=""/77, 0x2db}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa8}], 0xc4, &(0x7f0000000280)=""/191, 0x41, 0x40000000}}], 0x400000000000194, 0x0, &(0x7f0000003700)={0x77359400}) 01:46:04 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000780)=@acquire={0x20c, 0x17, 0x52d, 0x0, 0x0, {{@in=@private}, @in=@multicast1, {@in=@remote}, {{@in=@multicast2, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x40, 0x0, 0x0, 0xee01}}}, [@mark={0xc}, @extra_flags={0x8}, @tmpl={0x0, 0x5, [{{@in=@local}, 0x0, @in=@multicast1}, {{@in6=@mcast1}, 0x0, @in6=@dev}, {{@in=@dev}, 0x0, @in6=@loopback}, {{@in6=@loopback}, 0x0, @in=@empty}]}, @algo_auth={0x65, 0x1, {{'sha384-arm\x00'}, 0xe8, "99c156096903d82b88b5d1b399b092b70c58d2ae0fb36b36fde98a104f"}}, @algo_auth_trunc={0x4c, 0x14, {{'md5-generic\x00'}}}, @lastused={0xc}, @XFRMA_IF_ID={0x8}]}, 0x20c}}, 0x0) 01:46:04 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x10, 0xffffffffffffffff, 0x8) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffdfffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000380), 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0, 0x1, 0x0, 0x0, 0x0, 0xe, '\x00', 0x0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x2}, 0x8, 0x10, &(0x7f0000000440)={0x2, 0x8, 0x101}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000780)=[r0, 0xffffffffffffffff, r2, 0xffffffffffffffff]}, 0x80) write$cgroup_int(r1, &(0x7f0000000200), 0x806000) 01:46:04 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='loginuid\x00') writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)='4', 0x1}, {&(0x7f0000000100)="fd", 0x1}], 0x2) 01:46:04 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='loginuid\x00') writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)='4', 0x1}, {&(0x7f0000000100)="fd", 0x1}], 0x2) 01:46:04 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000780)=@acquire={0x20c, 0x17, 0x52d, 0x0, 0x0, {{@in=@private}, @in=@multicast1, {@in=@remote}, {{@in=@multicast2, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x40, 0x0, 0x0, 0xee01}}}, [@mark={0xc}, @extra_flags={0x8}, @tmpl={0x0, 0x5, [{{@in=@local}, 0x0, @in=@multicast1}, {{@in6=@mcast1}, 0x0, @in6=@dev}, {{@in=@dev}, 0x0, @in6=@loopback}, {{@in6=@loopback}, 0x0, @in=@empty}]}, @algo_auth={0x65, 0x1, {{'sha384-arm\x00'}, 0xe8, "99c156096903d82b88b5d1b399b092b70c58d2ae0fb36b36fde98a104f"}}, @algo_auth_trunc={0x4c, 0x14, {{'md5-generic\x00'}}}, @lastused={0xc}, @XFRMA_IF_ID={0x8}]}, 0x20c}}, 0x0) 01:46:04 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='loginuid\x00') writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)='4', 0x1}, {&(0x7f0000000100)="fd", 0x1}], 0x2) [ 32.277018][ T2268] netlink: 208 bytes leftover after parsing attributes in process `syz-executor.5'. 01:46:04 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef000000000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000001c0)=@ipv4_deladdr={0x20, 0x15, 0x0, 0x0, 0x0, {}, [@IFA_FLAGS={0x8}]}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x49}, {&(0x7f0000000140)=""/85, 0x36c}, {&(0x7f0000000fc0)=""/4093, 0x29b}, {&(0x7f0000000400)=""/106, 0x6}, {&(0x7f0000000740)=""/73, 0x544}, {&(0x7f0000000200)=""/77, 0x2db}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa8}], 0xc4, &(0x7f0000000280)=""/191, 0x41, 0x40000000}}], 0x400000000000194, 0x0, &(0x7f0000003700)={0x77359400}) 01:46:04 executing program 0: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef000000000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000001c0)=@ipv4_deladdr={0x20, 0x15, 0x0, 0x0, 0x0, {}, [@IFA_FLAGS={0x8}]}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x49}, {&(0x7f0000000140)=""/85, 0x36c}, {&(0x7f0000000fc0)=""/4093, 0x29b}, {&(0x7f0000000400)=""/106, 0x6}, {&(0x7f0000000740)=""/73, 0x544}, {&(0x7f0000000200)=""/77, 0x2db}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa8}], 0xc4, &(0x7f0000000280)=""/191, 0x41, 0x40000000}}], 0x400000000000194, 0x0, &(0x7f0000003700)={0x77359400}) [ 32.345388][ T2279] netlink: 208 bytes leftover after parsing attributes in process `syz-executor.5'. 01:46:04 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x10, 0xffffffffffffffff, 0x8) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffdfffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000380), 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0, 0x1, 0x0, 0x0, 0x0, 0xe, '\x00', 0x0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x2}, 0x8, 0x10, &(0x7f0000000440)={0x2, 0x8, 0x101}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000780)=[r0, 0xffffffffffffffff, r2, 0xffffffffffffffff]}, 0x80) write$cgroup_int(r1, &(0x7f0000000200), 0x806000) 01:46:04 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='loginuid\x00') writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)='4', 0x1}, {&(0x7f0000000100)="fd", 0x1}], 0x2) 01:46:04 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$l2tp6(r1, 0x0, 0x0, 0x2, 0x0, 0x0) sendto$llc(r0, &(0x7f0000000000)="ee", 0x1, 0x881, 0x0, 0x0) 01:46:04 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r0, 0xc018937e, &(0x7f0000000040)={{0x1, 0x1, 0x45}, './file0\x00'}) 01:46:04 executing program 0: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef000000000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000001c0)=@ipv4_deladdr={0x20, 0x15, 0x0, 0x0, 0x0, {}, [@IFA_FLAGS={0x8}]}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x49}, {&(0x7f0000000140)=""/85, 0x36c}, {&(0x7f0000000fc0)=""/4093, 0x29b}, {&(0x7f0000000400)=""/106, 0x6}, {&(0x7f0000000740)=""/73, 0x544}, {&(0x7f0000000200)=""/77, 0x2db}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa8}], 0xc4, &(0x7f0000000280)=""/191, 0x41, 0x40000000}}], 0x400000000000194, 0x0, &(0x7f0000003700)={0x77359400}) 01:46:04 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x10, 0xffffffffffffffff, 0x8) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffdfffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000380), 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0, 0x1, 0x0, 0x0, 0x0, 0xe, '\x00', 0x0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x2}, 0x8, 0x10, &(0x7f0000000440)={0x2, 0x8, 0x101}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000780)=[r0, 0xffffffffffffffff, r2, 0xffffffffffffffff]}, 0x80) write$cgroup_int(r1, &(0x7f0000000200), 0x806000) 01:46:04 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r0, 0xc018937e, &(0x7f0000000040)={{0x1, 0x1, 0x45}, './file0\x00'}) 01:46:04 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r0, 0xc018937e, &(0x7f0000000040)={{0x1, 0x1, 0x45}, './file0\x00'}) 01:46:04 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xe, 0x4, 0x4, 0x5, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r0, &(0x7f0000000080), &(0x7f0000000000), 0x2}, 0x20) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r1) 01:46:04 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$l2tp6(r1, 0x0, 0x0, 0x2, 0x0, 0x0) sendto$llc(r0, &(0x7f0000000000)="ee", 0x1, 0x881, 0x0, 0x0) 01:46:04 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r0, 0xc018937e, &(0x7f0000000040)={{0x1, 0x1, 0x45}, './file0\x00'}) 01:46:04 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r0, 0xc018937e, &(0x7f0000000040)={{0x1, 0x1, 0x45}, './file0\x00'}) 01:46:04 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r0, 0xc018937e, &(0x7f0000000040)={{0x1, 0x1, 0x45}, './file0\x00'}) 01:46:04 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$l2tp6(r1, 0x0, 0x0, 0x2, 0x0, 0x0) sendto$llc(r0, &(0x7f0000000000)="ee", 0x1, 0x881, 0x0, 0x0) 01:46:04 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xe, 0x4, 0x4, 0x5, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r0, &(0x7f0000000080), &(0x7f0000000000), 0x2}, 0x20) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r1) 01:46:04 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r0, 0xc018937e, &(0x7f0000000040)={{0x1, 0x1, 0x45}, './file0\x00'}) 01:46:04 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xe, 0x4, 0x4, 0x5, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r0, &(0x7f0000000080), &(0x7f0000000000), 0x2}, 0x20) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r1) 01:46:04 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xe, 0x4, 0x4, 0x5, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r0, &(0x7f0000000080), &(0x7f0000000000), 0x2}, 0x20) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r1) 01:46:04 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xe, 0x4, 0x4, 0x5, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r0, &(0x7f0000000080), &(0x7f0000000000), 0x2}, 0x20) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r1) 01:46:04 executing program 5: socketpair(0x1, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$l2tp6(r1, 0x0, 0x0, 0x2, 0x0, 0x0) sendto$llc(r0, &(0x7f0000000000)="ee", 0x1, 0x881, 0x0, 0x0) 01:46:04 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$l2tp6(r1, 0x0, 0x0, 0x2, 0x0, 0x0) sendto$llc(r0, &(0x7f0000000000)="ee", 0x1, 0x881, 0x0, 0x0) 01:46:04 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="180000000100080000000000e9ff000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='sys_exit\x00', r0}, 0x10) prctl$PR_SET_MM_MAP(0x21, 0xe, &(0x7f0000002500)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0}, 0x68) 01:46:04 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xe, 0x4, 0x4, 0x5, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r0, &(0x7f0000000080), &(0x7f0000000000), 0x2}, 0x20) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r1) 01:46:04 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="180000000100080000000000e9ff000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='sys_exit\x00', r0}, 0x10) prctl$PR_SET_MM_MAP(0x21, 0xe, &(0x7f0000002500)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0}, 0x68) 01:46:04 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="180000000100080000000000e9ff000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='sys_exit\x00', r0}, 0x10) prctl$PR_SET_MM_MAP(0x21, 0xe, &(0x7f0000002500)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0}, 0x68) 01:46:04 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="180000000100080000000000e9ff000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='sys_exit\x00', r0}, 0x10) prctl$PR_SET_MM_MAP(0x21, 0xe, &(0x7f0000002500)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0}, 0x68) 01:46:04 executing program 5: socketpair(0x1, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$l2tp6(r1, 0x0, 0x0, 0x2, 0x0, 0x0) sendto$llc(r0, &(0x7f0000000000)="ee", 0x1, 0x881, 0x0, 0x0) 01:46:04 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="180000000100080000000000e9ff000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='sys_exit\x00', r0}, 0x10) prctl$PR_SET_MM_MAP(0x21, 0xe, &(0x7f0000002500)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0}, 0x68) 01:46:04 executing program 1: capset(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) init_module(0x0, 0x0, 0x0) 01:46:04 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xe, 0x4, 0x4, 0x5, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r0, &(0x7f0000000080), &(0x7f0000000000), 0x2}, 0x20) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r1) 01:46:04 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xe, 0x4, 0x4, 0x5, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r0, &(0x7f0000000080), &(0x7f0000000000), 0x2}, 0x20) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r1) 01:46:04 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="180000000100080000000000e9ff000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='sys_exit\x00', r0}, 0x10) prctl$PR_SET_MM_MAP(0x21, 0xe, &(0x7f0000002500)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0}, 0x68) 01:46:04 executing program 1: capset(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) init_module(0x0, 0x0, 0x0) 01:46:04 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xe, 0x4, 0x4, 0x5, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r0, &(0x7f0000000080), &(0x7f0000000000), 0x2}, 0x20) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r1) 01:46:04 executing program 5: socketpair(0x1, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$l2tp6(r1, 0x0, 0x0, 0x2, 0x0, 0x0) sendto$llc(r0, &(0x7f0000000000)="ee", 0x1, 0x881, 0x0, 0x0) 01:46:04 executing program 1: capset(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) init_module(0x0, 0x0, 0x0) 01:46:04 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="180000000100080000000000e9ff000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='sys_exit\x00', r0}, 0x10) prctl$PR_SET_MM_MAP(0x21, 0xe, &(0x7f0000002500)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0}, 0x68) 01:46:04 executing program 1: capset(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) init_module(0x0, 0x0, 0x0) 01:46:04 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) connect$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x0, 0x2, 0x2, {0xa, 0x0, @empty}}, 0x32) 01:46:04 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0x14, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendto$inet(r1, &(0x7f0000000000)='6', 0x1, 0x0, 0x0, 0x0) splice(r1, 0x0, r0, 0x0, 0x40009, 0x0) 01:46:04 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) connect$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x0, 0x2, 0x2, {0xa, 0x0, @empty}}, 0x32) 01:46:04 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xe, 0x4, 0x4, 0x5, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r0, &(0x7f0000000080), &(0x7f0000000000), 0x2}, 0x20) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r1) 01:46:04 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0x14, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendto$inet(r1, &(0x7f0000000000)='6', 0x1, 0x0, 0x0, 0x0) splice(r1, 0x0, r0, 0x0, 0x40009, 0x0) 01:46:04 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0xa) connect$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x0, 0x2, 0x2, {0xa, 0x0, @empty}}, 0x32) 01:46:04 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) connect$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x0, 0x2, 0x2, {0xa, 0x0, @empty}}, 0x32) 01:46:04 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0x14, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendto$inet(r1, &(0x7f0000000000)='6', 0x1, 0x0, 0x0, 0x0) splice(r1, 0x0, r0, 0x0, 0x40009, 0x0) 01:46:04 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0xa) connect$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x0, 0x2, 0x2, {0xa, 0x0, @empty}}, 0x32) 01:46:04 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540), 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f00000000c0)=@gcm_128={{0x303, 0x38}, "f45a467cef8db20c", "f4133c00d895e9d5fb08a848e66013e9", "1700", "fb486d4e2dcefee8"}, 0x28) setsockopt$sock_timeval(r0, 0x29, 0x48, &(0x7f0000000040)={0x0, 0xea60}, 0x10) 01:46:05 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) connect$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x0, 0x2, 0x2, {0xa, 0x0, @empty}}, 0x32) 01:46:05 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0x14, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendto$inet(r1, &(0x7f0000000000)='6', 0x1, 0x0, 0x0, 0x0) splice(r1, 0x0, r0, 0x0, 0x40009, 0x0) 01:46:05 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0x14, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendto$inet(r1, &(0x7f0000000000)='6', 0x1, 0x0, 0x0, 0x0) splice(r1, 0x0, r0, 0x0, 0x40009, 0x0) 01:46:05 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0x14, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendto$inet(r1, &(0x7f0000000000)='6', 0x1, 0x0, 0x0, 0x0) splice(r1, 0x0, r0, 0x0, 0x40009, 0x0) 01:46:05 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0xa) connect$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x0, 0x2, 0x2, {0xa, 0x0, @empty}}, 0x32) 01:46:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{0x0, 0x0, 0x100}], 0x0, &(0x7f0000000440)) 01:46:05 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0x14, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendto$inet(r1, &(0x7f0000000000)='6', 0x1, 0x0, 0x0, 0x0) splice(r1, 0x0, r0, 0x0, 0x40009, 0x0) 01:46:05 executing program 5: set_mempolicy(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000440)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}, 0x1060000, 0x7fffffff}}}, 0x90) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) 01:46:05 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0x9, 0x384c, 0x40, 0x4}, 0x48) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000100)={r0, &(0x7f0000000000), 0x0}, 0x20) 01:46:05 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x8) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000001c0)={@dev, @rand_addr=' \x01\x00', @loopback={0x0, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301ea}) 01:46:05 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="03000000130000002300", 0xa, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {0x0}, {0x0}], 0x0, &(0x7f0000013800)) [ 33.233866][ T2409] loop3: detected capacity change from 0 to 1 [ 33.263673][ T2409] EXT4-fs (loop3): unable to read superblock 01:46:05 executing program 5: set_mempolicy(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000440)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}, 0x1060000, 0x7fffffff}}}, 0x90) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) 01:46:05 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540), 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f00000000c0)=@gcm_128={{0x303, 0x38}, "f45a467cef8db20c", "f4133c00d895e9d5fb08a848e66013e9", "1700", "fb486d4e2dcefee8"}, 0x28) setsockopt$sock_timeval(r0, 0x29, 0x48, &(0x7f0000000040)={0x0, 0xea60}, 0x10) 01:46:05 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x8) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000001c0)={@dev, @rand_addr=' \x01\x00', @loopback={0x0, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301ea}) 01:46:05 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0x9, 0x384c, 0x40, 0x4}, 0x48) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000100)={r0, &(0x7f0000000000), 0x0}, 0x20) 01:46:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{0x0, 0x0, 0x100}], 0x0, &(0x7f0000000440)) 01:46:05 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0x9, 0x384c, 0x40, 0x4}, 0x48) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000100)={r0, &(0x7f0000000000), 0x0}, 0x20) 01:46:05 executing program 5: set_mempolicy(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000440)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}, 0x1060000, 0x7fffffff}}}, 0x90) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) 01:46:05 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x8) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000001c0)={@dev, @rand_addr=' \x01\x00', @loopback={0x0, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301ea}) [ 33.327404][ T2429] loop0: detected capacity change from 0 to 512 [ 33.336918][ T2431] loop3: detected capacity change from 0 to 1 [ 33.337317][ T2088] I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 33.352314][ T2088] Buffer I/O error on dev loop3, logical block 0, async page read 01:46:05 executing program 5: set_mempolicy(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000440)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}, 0x1060000, 0x7fffffff}}}, 0x90) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) 01:46:05 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x8) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000001c0)={@dev, @rand_addr=' \x01\x00', @loopback={0x0, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c301ea}) 01:46:05 executing program 1: set_mempolicy(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000440)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}, 0x1060000, 0x7fffffff}}}, 0x90) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) [ 33.382692][ T2431] EXT4-fs (loop3): unable to read superblock [ 33.399217][ T2429] EXT4-fs error (device loop0): __ext4_fill_super:5244: inode #2: comm syz-executor.0: iget: root inode unallocated [ 33.422166][ T2429] EXT4-fs (loop0): get root inode failed [ 33.427891][ T2429] EXT4-fs (loop0): mount failed 01:46:05 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="03000000130000002300", 0xa, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {0x0}, {0x0}], 0x0, &(0x7f0000013800)) 01:46:05 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0x9, 0x384c, 0x40, 0x4}, 0x48) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000100)={r0, &(0x7f0000000000), 0x0}, 0x20) 01:46:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{0x0, 0x0, 0x100}], 0x0, &(0x7f0000000440)) 01:46:05 executing program 5: set_mempolicy(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000440)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}, 0x1060000, 0x7fffffff}}}, 0x90) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) 01:46:05 executing program 1: set_mempolicy(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000440)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}, 0x1060000, 0x7fffffff}}}, 0x90) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) 01:46:05 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540), 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f00000000c0)=@gcm_128={{0x303, 0x38}, "f45a467cef8db20c", "f4133c00d895e9d5fb08a848e66013e9", "1700", "fb486d4e2dcefee8"}, 0x28) setsockopt$sock_timeval(r0, 0x29, 0x48, &(0x7f0000000040)={0x0, 0xea60}, 0x10) 01:46:05 executing program 1: set_mempolicy(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000440)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}, 0x1060000, 0x7fffffff}}}, 0x90) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) 01:46:05 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="03000000130000002300", 0xa, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {0x0}, {0x0}], 0x0, &(0x7f0000013800)) 01:46:06 executing program 5: set_mempolicy(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000440)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}, 0x1060000, 0x7fffffff}}}, 0x90) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) 01:46:06 executing program 1: r0 = epoll_create1(0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "2af01e1d113c81fcf7603ca5a8d500"}) r2 = syz_open_pts(r1, 0x0) r3 = dup3(r2, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000000140)) ioctl$TCSETS(r3, 0x5402, &(0x7f00000000c0)={0x500, 0x0, 0x0, 0x0, 0x0, "03a21a00"}) 01:46:06 executing program 5: set_mempolicy(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000440)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}, 0x1060000, 0x7fffffff}}}, 0x90) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) [ 34.127416][ T2466] loop3: detected capacity change from 0 to 1 [ 34.144193][ T2466] EXT4-fs (loop3): unable to read superblock 01:46:06 executing program 5: unshare(0xa040400) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) pwrite64(r0, 0x0, 0x0, 0x0) [ 34.189198][ T2481] loop0: detected capacity change from 0 to 512 [ 34.215798][ T2485] loop4: detected capacity change from 0 to 512 [ 34.238191][ T2485] EXT4-fs error (device loop4): __ext4_fill_super:5244: inode #2: comm syz-executor.4: iget: root inode unallocated [ 34.270823][ T2485] EXT4-fs (loop4): get root inode failed [ 34.276532][ T2485] EXT4-fs (loop4): mount failed [ 34.294050][ T2481] EXT4-fs error (device loop0): __ext4_fill_super:5244: inode #2: comm syz-executor.0: iget: root inode unallocated [ 34.308299][ T2481] EXT4-fs (loop0): get root inode failed [ 34.314064][ T2481] EXT4-fs (loop0): mount failed 01:46:06 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="03000000130000002300", 0xa, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {0x0}, {0x0}], 0x0, &(0x7f0000013800)) 01:46:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{0x0, 0x0, 0x100}], 0x0, &(0x7f0000000440)) 01:46:06 executing program 5: unshare(0xa040400) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) pwrite64(r0, 0x0, 0x0, 0x0) 01:46:06 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540), 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f00000000c0)=@gcm_128={{0x303, 0x38}, "f45a467cef8db20c", "f4133c00d895e9d5fb08a848e66013e9", "1700", "fb486d4e2dcefee8"}, 0x28) setsockopt$sock_timeval(r0, 0x29, 0x48, &(0x7f0000000040)={0x0, 0xea60}, 0x10) 01:46:06 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="03000000130000002300", 0xa, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {0x0}, {0x0}], 0x0, &(0x7f0000013800)) 01:46:06 executing program 5: unshare(0xa040400) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) pwrite64(r0, 0x0, 0x0, 0x0) 01:46:06 executing program 5: unshare(0xa040400) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) pwrite64(r0, 0x0, 0x0, 0x0) [ 34.979652][ T2500] loop3: detected capacity change from 0 to 1 [ 34.993493][ T2500] EXT4-fs (loop3): unable to read superblock 01:46:06 executing program 1: r0 = epoll_create1(0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "2af01e1d113c81fcf7603ca5a8d500"}) r2 = syz_open_pts(r1, 0x0) r3 = dup3(r2, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000000140)) ioctl$TCSETS(r3, 0x5402, &(0x7f00000000c0)={0x500, 0x0, 0x0, 0x0, 0x0, "03a21a00"}) 01:46:06 executing program 3: r0 = epoll_create1(0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "2af01e1d113c81fcf7603ca5a8d500"}) r2 = syz_open_pts(r1, 0x0) r3 = dup3(r2, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000000140)) ioctl$TCSETS(r3, 0x5402, &(0x7f00000000c0)={0x500, 0x0, 0x0, 0x0, 0x0, "03a21a00"}) 01:46:06 executing program 5: r0 = epoll_create1(0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "2af01e1d113c81fcf7603ca5a8d500"}) r2 = syz_open_pts(r1, 0x0) r3 = dup3(r2, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000000140)) ioctl$TCSETS(r3, 0x5402, &(0x7f00000000c0)={0x500, 0x0, 0x0, 0x0, 0x0, "03a21a00"}) [ 35.055427][ T2516] loop0: detected capacity change from 0 to 512 [ 35.064714][ T2518] loop4: detected capacity change from 0 to 512 [ 35.095189][ T2518] EXT4-fs error (device loop4): __ext4_fill_super:5244: inode #2: comm syz-executor.4: iget: root inode unallocated [ 35.109334][ T2516] EXT4-fs error (device loop0): __ext4_fill_super:5244: inode #2: comm syz-executor.0: iget: root inode unallocated [ 35.142019][ T2516] EXT4-fs (loop0): get root inode failed [ 35.143151][ T2518] EXT4-fs (loop4): get root inode failed [ 35.147674][ T2516] EXT4-fs (loop0): mount failed [ 35.158220][ T2518] EXT4-fs (loop4): mount failed 01:46:07 executing program 2: r0 = epoll_create1(0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "2af01e1d113c81fcf7603ca5a8d500"}) r2 = syz_open_pts(r1, 0x0) r3 = dup3(r2, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000000140)) ioctl$TCSETS(r3, 0x5402, &(0x7f00000000c0)={0x500, 0x0, 0x0, 0x0, 0x0, "03a21a00"}) 01:46:07 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="03000000130000002300", 0xa, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {0x0}, {0x0}], 0x0, &(0x7f0000013800)) 01:46:07 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="03000000130000002300", 0xa, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {0x0}, {0x0}], 0x0, &(0x7f0000013800)) 01:46:07 executing program 3: r0 = epoll_create1(0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "2af01e1d113c81fcf7603ca5a8d500"}) r2 = syz_open_pts(r1, 0x0) r3 = dup3(r2, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000000140)) ioctl$TCSETS(r3, 0x5402, &(0x7f00000000c0)={0x500, 0x0, 0x0, 0x0, 0x0, "03a21a00"}) 01:46:07 executing program 1: r0 = epoll_create1(0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "2af01e1d113c81fcf7603ca5a8d500"}) r2 = syz_open_pts(r1, 0x0) r3 = dup3(r2, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000000140)) ioctl$TCSETS(r3, 0x5402, &(0x7f00000000c0)={0x500, 0x0, 0x0, 0x0, 0x0, "03a21a00"}) [ 35.891481][ T2549] loop0: detected capacity change from 0 to 512 [ 35.902944][ T2549] EXT4-fs error (device loop0): __ext4_fill_super:5244: inode #2: comm syz-executor.0: iget: root inode unallocated [ 35.926062][ T2552] loop4: detected capacity change from 0 to 512 [ 35.928678][ T2549] EXT4-fs (loop0): get root inode failed 01:46:07 executing program 5: r0 = epoll_create1(0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "2af01e1d113c81fcf7603ca5a8d500"}) r2 = syz_open_pts(r1, 0x0) r3 = dup3(r2, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000000140)) ioctl$TCSETS(r3, 0x5402, &(0x7f00000000c0)={0x500, 0x0, 0x0, 0x0, 0x0, "03a21a00"}) [ 35.938316][ T2549] EXT4-fs (loop0): mount failed [ 35.987857][ T2552] EXT4-fs error (device loop4): __ext4_fill_super:5244: inode #2: comm syz-executor.4: iget: root inode unallocated [ 36.004424][ T2552] EXT4-fs (loop4): get root inode failed [ 36.010082][ T2552] EXT4-fs (loop4): mount failed 01:46:07 executing program 2: r0 = epoll_create1(0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "2af01e1d113c81fcf7603ca5a8d500"}) r2 = syz_open_pts(r1, 0x0) r3 = dup3(r2, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000000140)) ioctl$TCSETS(r3, 0x5402, &(0x7f00000000c0)={0x500, 0x0, 0x0, 0x0, 0x0, "03a21a00"}) 01:46:08 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x38, 0x10, 0x80b, 0x0, 0x0, {}, [@IFLA_AF_SPEC={0x10, 0x1a, 0x0, 0x1, [@AF_INET6={0xc, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x2}]}]}, @IFLA_GROUP={0x8}]}, 0x38}}, 0x0) 01:46:08 executing program 4: r0 = socket(0x10, 0x80002, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000000000d00000000080000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000280)='netlink_extack\x00', r1}, 0x10) sendmsg$nl_route(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000015c0)=@newlink={0x20, 0x10, 0x401}, 0x20}}, 0x0) 01:46:08 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x38, 0x10, 0x80b, 0x0, 0x0, {}, [@IFLA_AF_SPEC={0x10, 0x1a, 0x0, 0x1, [@AF_INET6={0xc, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x2}]}]}, @IFLA_GROUP={0x8}]}, 0x38}}, 0x0) 01:46:08 executing program 4: r0 = socket(0x10, 0x80002, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000000000d00000000080000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000280)='netlink_extack\x00', r1}, 0x10) sendmsg$nl_route(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000015c0)=@newlink={0x20, 0x10, 0x401}, 0x20}}, 0x0) 01:46:08 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x38, 0x10, 0x80b, 0x0, 0x0, {}, [@IFLA_AF_SPEC={0x10, 0x1a, 0x0, 0x1, [@AF_INET6={0xc, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x2}]}]}, @IFLA_GROUP={0x8}]}, 0x38}}, 0x0) 01:46:08 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x38, 0x10, 0x80b, 0x0, 0x0, {}, [@IFLA_AF_SPEC={0x10, 0x1a, 0x0, 0x1, [@AF_INET6={0xc, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x2}]}]}, @IFLA_GROUP={0x8}]}, 0x38}}, 0x0) 01:46:08 executing program 4: r0 = socket(0x10, 0x80002, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000000000d00000000080000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000280)='netlink_extack\x00', r1}, 0x10) sendmsg$nl_route(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000015c0)=@newlink={0x20, 0x10, 0x401}, 0x20}}, 0x0) 01:46:08 executing program 0: r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0xa00000000000000, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x1, 0x990, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000e00], 0x0, 0x0, &(0x7f0000000e00)=ANY=[@ANYBLOB="00000000000000000000020000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000b00000000000000000062726964676530000000000000000000766c616e300000000000000000000000736974300000000000000000000000007465716c3000000000000000000000000000000000000000000000000180c20000000000000000000000b8080000b808000030090000616d6f6e6700000000000000000000000000000000000000000000000200000020080000000c000000000000000a000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005849000000000000000000000000000000000000000000000000000000000000000c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001ead800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e10000000000000000000000000000000000000000000000000000000000000000000000000000b4b918d3e29a2e2c4dc5171e3544000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000440a00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f18a0afe99350000210000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001a000000000000000000000000000075fc2431191e6a0f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008c7f8f1b44f0000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000009abde2255a00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffff90400000000000000000000000000000000000000000000000000000000000000000000000000000000000000f2573bd04a33000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ea18fde51d55aaab000000000000000000000500000000000000000000000000000000000000003f7f1c000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001d00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003fc95bb0000000000000000000000000000000000000000000000000000000000006000000000000000000000000000000000000000000000000d3d2e85100000000000000000000000000000000000000000000000000000000006e666c6f670000001100000000000000000000000000000000000000000000005080000000000000000000000000000000000000a600a9e85725d89818472e65aba21d9bbc1b20e8331c6fd24a5aceaeefe102e42a013ac2c00eeb782c34eab997013e0506220c21a44cc58ff5bc83d5e4066c7700"/2448]}, 0xa08) 01:46:08 executing program 3: r0 = epoll_create1(0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "2af01e1d113c81fcf7603ca5a8d500"}) r2 = syz_open_pts(r1, 0x0) r3 = dup3(r2, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000000140)) ioctl$TCSETS(r3, 0x5402, &(0x7f00000000c0)={0x500, 0x0, 0x0, 0x0, 0x0, "03a21a00"}) 01:46:08 executing program 1: r0 = epoll_create1(0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "2af01e1d113c81fcf7603ca5a8d500"}) r2 = syz_open_pts(r1, 0x0) r3 = dup3(r2, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000000140)) ioctl$TCSETS(r3, 0x5402, &(0x7f00000000c0)={0x500, 0x0, 0x0, 0x0, 0x0, "03a21a00"}) 01:46:08 executing program 5: r0 = epoll_create1(0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "2af01e1d113c81fcf7603ca5a8d500"}) r2 = syz_open_pts(r1, 0x0) r3 = dup3(r2, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000000140)) ioctl$TCSETS(r3, 0x5402, &(0x7f00000000c0)={0x500, 0x0, 0x0, 0x0, 0x0, "03a21a00"}) 01:46:08 executing program 2: r0 = epoll_create1(0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "2af01e1d113c81fcf7603ca5a8d500"}) r2 = syz_open_pts(r1, 0x0) r3 = dup3(r2, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000000140)) ioctl$TCSETS(r3, 0x5402, &(0x7f00000000c0)={0x500, 0x0, 0x0, 0x0, 0x0, "03a21a00"}) 01:46:08 executing program 4: r0 = socket(0x10, 0x80002, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000000000d00000000080000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000280)='netlink_extack\x00', r1}, 0x10) sendmsg$nl_route(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000015c0)=@newlink={0x20, 0x10, 0x401}, 0x20}}, 0x0) 01:46:08 executing program 0: r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0xa00000000000000, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x1, 0x990, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000e00], 0x0, 0x0, &(0x7f0000000e00)=ANY=[@ANYBLOB="00000000000000000000020000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000b00000000000000000062726964676530000000000000000000766c616e300000000000000000000000736974300000000000000000000000007465716c3000000000000000000000000000000000000000000000000180c20000000000000000000000b8080000b808000030090000616d6f6e6700000000000000000000000000000000000000000000000200000020080000000c000000000000000a000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005849000000000000000000000000000000000000000000000000000000000000000c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001ead800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e10000000000000000000000000000000000000000000000000000000000000000000000000000b4b918d3e29a2e2c4dc5171e3544000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000440a00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f18a0afe99350000210000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001a000000000000000000000000000075fc2431191e6a0f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008c7f8f1b44f0000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000009abde2255a00000000000000000000000000000000000000000000000000000000000000000000000000000000000