syzkaller syzkaller login: [ 17.238730][ T25] kauditd_printk_skb: 63 callbacks suppressed [ 17.238738][ T25] audit: type=1400 audit(1686371896.402:76): avc: denied { transition } for pid=2937 comm="sshd" path="/bin/sh" dev="sda1" ino=89 scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 17.242532][ T25] audit: type=1400 audit(1686371896.402:77): avc: denied { noatsecure } for pid=2937 comm="sshd" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 17.249291][ T25] audit: type=1400 audit(1686371896.412:78): avc: denied { write } for pid=2937 comm="sh" path="pipe:[12233]" dev="pipefs" ino=12233 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 17.252973][ T25] audit: type=1400 audit(1686371896.412:79): avc: denied { rlimitinh } for pid=2937 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 17.255500][ T25] audit: type=1400 audit(1686371896.412:80): avc: denied { siginh } for pid=2937 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '10.128.1.169' (ECDSA) to the list of known hosts. 2023/06/10 04:38:23 fuzzer started 2023/06/10 04:38:23 dialing manager at 10.128.0.163:30015 [ 24.752338][ T25] audit: type=1400 audit(1686371903.912:81): avc: denied { mounton } for pid=3045 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 24.753175][ T3045] cgroup: Unknown subsys name 'net' [ 24.775040][ T25] audit: type=1400 audit(1686371903.912:82): avc: denied { mount } for pid=3045 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 24.802371][ T25] audit: type=1400 audit(1686371903.942:83): avc: denied { unmount } for pid=3045 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 24.906080][ T3045] cgroup: Unknown subsys name 'rlimit' [ 24.914814][ T25] audit: type=1400 audit(1686371904.082:84): avc: denied { read } for pid=2727 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 2023/06/10 04:38:24 syscalls: 2854 2023/06/10 04:38:24 code coverage: enabled 2023/06/10 04:38:24 comparison tracing: enabled 2023/06/10 04:38:24 extra coverage: enabled 2023/06/10 04:38:24 delay kcov mmap: enabled 2023/06/10 04:38:24 setuid sandbox: enabled 2023/06/10 04:38:24 namespace sandbox: enabled 2023/06/10 04:38:24 Android sandbox: enabled 2023/06/10 04:38:24 fault injection: enabled 2023/06/10 04:38:24 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2023/06/10 04:38:24 net packet injection: enabled 2023/06/10 04:38:24 net device setup: enabled 2023/06/10 04:38:24 concurrency sanitizer: enabled 2023/06/10 04:38:24 devlink PCI setup: PCI device 0000:00:10.0 is not available 2023/06/10 04:38:24 NIC VF setup: PCI device 0000:00:11.0 is not available 2023/06/10 04:38:24 USB emulation: /dev/raw-gadget does not exist 2023/06/10 04:38:24 hci packet injection: /dev/vhci does not exist 2023/06/10 04:38:24 wifi device emulation: /sys/class/mac80211_hwsim/ does not exist 2023/06/10 04:38:24 802.15.4 emulation: enabled 2023/06/10 04:38:24 suppressing KCSAN reports in functions: 'pcpu_alloc' 'do_sys_poll' 'can_send' '__xa_clear_mark' 2023/06/10 04:38:24 fetching corpus: 0, signal 0/2000 (executing program) [ 25.025632][ T25] audit: type=1400 audit(1686371904.192:85): avc: denied { mounton } for pid=3045 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 25.050437][ T25] audit: type=1400 audit(1686371904.192:86): avc: denied { mount } for pid=3045 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 25.073828][ T25] audit: type=1400 audit(1686371904.192:87): avc: denied { create } for pid=3045 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 25.094432][ T25] audit: type=1400 audit(1686371904.192:88): avc: denied { write } for pid=3045 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 2023/06/10 04:38:24 fetching corpus: 50, signal 17553/20933 (executing program) [ 25.114773][ T25] audit: type=1400 audit(1686371904.192:89): avc: denied { read } for pid=3045 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 2023/06/10 04:38:24 fetching corpus: 100, signal 26218/30786 (executing program) 2023/06/10 04:38:24 fetching corpus: 150, signal 34455/39934 (executing program) 2023/06/10 04:38:24 fetching corpus: 200, signal 43824/49857 (executing program) 2023/06/10 04:38:24 fetching corpus: 250, signal 48593/55358 (executing program) 2023/06/10 04:38:24 fetching corpus: 300, signal 54366/61518 (executing program) 2023/06/10 04:38:24 fetching corpus: 350, signal 57171/64949 (executing program) 2023/06/10 04:38:25 fetching corpus: 400, signal 62370/70334 (executing program) 2023/06/10 04:38:25 fetching corpus: 450, signal 65897/74164 (executing program) 2023/06/10 04:38:25 fetching corpus: 500, signal 69197/77676 (executing program) 2023/06/10 04:38:25 fetching corpus: 550, signal 71321/80151 (executing program) 2023/06/10 04:38:25 fetching corpus: 600, signal 74748/83525 (executing program) 2023/06/10 04:38:25 fetching corpus: 650, signal 76749/85715 (executing program) 2023/06/10 04:38:25 fetching corpus: 700, signal 78268/87455 (executing program) 2023/06/10 04:38:25 fetching corpus: 750, signal 80565/89740 (executing program) 2023/06/10 04:38:26 fetching corpus: 798, signal 82736/91809 (executing program) 2023/06/10 04:38:26 fetching corpus: 848, signal 84707/93702 (executing program) 2023/06/10 04:38:26 fetching corpus: 898, signal 86150/95148 (executing program) 2023/06/10 04:38:26 fetching corpus: 948, signal 88637/97221 (executing program) 2023/06/10 04:38:26 fetching corpus: 997, signal 91738/99608 (executing program) 2023/06/10 04:38:26 fetching corpus: 1047, signal 92800/100627 (executing program) 2023/06/10 04:38:26 fetching corpus: 1097, signal 94510/101941 (executing program) 2023/06/10 04:38:26 fetching corpus: 1146, signal 95677/102895 (executing program) 2023/06/10 04:38:27 fetching corpus: 1196, signal 97056/104008 (executing program) 2023/06/10 04:38:27 fetching corpus: 1246, signal 98361/104984 (executing program) 2023/06/10 04:38:27 fetching corpus: 1296, signal 99624/105907 (executing program) 2023/06/10 04:38:27 fetching corpus: 1346, signal 102209/107402 (executing program) 2023/06/10 04:38:27 fetching corpus: 1396, signal 103573/108252 (executing program) 2023/06/10 04:38:27 fetching corpus: 1446, signal 105576/109315 (executing program) 2023/06/10 04:38:27 fetching corpus: 1496, signal 106579/109904 (executing program) 2023/06/10 04:38:28 fetching corpus: 1546, signal 107887/110560 (executing program) 2023/06/10 04:38:28 fetching corpus: 1594, signal 109347/111250 (executing program) 2023/06/10 04:38:28 fetching corpus: 1627, signal 110251/111656 (executing program) 2023/06/10 04:38:28 fetching corpus: 1627, signal 110251/111697 (executing program) 2023/06/10 04:38:28 fetching corpus: 1627, signal 110251/111732 (executing program) 2023/06/10 04:38:28 fetching corpus: 1627, signal 110251/111784 (executing program) 2023/06/10 04:38:28 fetching corpus: 1627, signal 110251/111842 (executing program) 2023/06/10 04:38:28 fetching corpus: 1627, signal 110251/111889 (executing program) 2023/06/10 04:38:28 fetching corpus: 1627, signal 110251/111938 (executing program) 2023/06/10 04:38:28 fetching corpus: 1627, signal 110251/111978 (executing program) 2023/06/10 04:38:28 fetching corpus: 1627, signal 110251/112031 (executing program) 2023/06/10 04:38:28 fetching corpus: 1627, signal 110251/112087 (executing program) 2023/06/10 04:38:28 fetching corpus: 1627, signal 110251/112141 (executing program) 2023/06/10 04:38:28 fetching corpus: 1627, signal 110251/112183 (executing program) 2023/06/10 04:38:28 fetching corpus: 1627, signal 110252/112227 (executing program) 2023/06/10 04:38:28 fetching corpus: 1627, signal 110252/112265 (executing program) 2023/06/10 04:38:28 fetching corpus: 1627, signal 110252/112298 (executing program) 2023/06/10 04:38:28 fetching corpus: 1627, signal 110252/112330 (executing program) 2023/06/10 04:38:28 fetching corpus: 1627, signal 110252/112370 (executing program) 2023/06/10 04:38:28 fetching corpus: 1627, signal 110252/112402 (executing program) 2023/06/10 04:38:28 fetching corpus: 1627, signal 110252/112449 (executing program) 2023/06/10 04:38:28 fetching corpus: 1627, signal 110252/112491 (executing program) 2023/06/10 04:38:28 fetching corpus: 1627, signal 110252/112533 (executing program) 2023/06/10 04:38:28 fetching corpus: 1627, signal 110252/112584 (executing program) 2023/06/10 04:38:28 fetching corpus: 1627, signal 110252/112623 (executing program) 2023/06/10 04:38:28 fetching corpus: 1627, signal 110252/112634 (executing program) 2023/06/10 04:38:28 fetching corpus: 1627, signal 110252/112634 (executing program) 2023/06/10 04:38:30 starting 6 fuzzer processes 04:38:30 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc) sendmsg$AUDIT_LIST_RULES(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x10}, 0x10}}, 0x0) 04:38:30 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001380)={0x3, 0x6, &(0x7f0000000040)=@framed={{}, [@jmp={0x5, 0x0, 0x2, 0x0, 0x0, 0x2}, @jmp={0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x11}, @exit]}, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 04:38:30 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$igmp6(0xa, 0x3, 0x2) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000000)={@empty, 0x0, r2}) 04:38:30 executing program 2: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x100) r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x8002, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000340)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) sendmsg$inet(r1, &(0x7f0000000300)={&(0x7f0000000140)={0x2, 0x4001, @private=0xa010101}, 0x10, 0x0}, 0x4008001) ioctl$BTRFS_IOC_GET_FEATURES(0xffffffffffffffff, 0x80189439, &(0x7f0000000280)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x14e20}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = creat(0x0, 0x0) r6 = dup2(r5, r5) ioctl$BLKGETSIZE(r6, 0x40081271, &(0x7f0000003c00)) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='devtmpfs\x00', 0x4, &(0x7f0000000440)=',\x15\x00') sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = openat$cgroup(r7, &(0x7f0000000240)='syz1\x00', 0x200002, 0x0) r9 = openat$cgroup_int(r8, &(0x7f0000000a40)='memory.high\x00', 0x2, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000006680), 0x50200, 0x0) write$cgroup_int(r9, &(0x7f0000000140), 0x12) 04:38:30 executing program 4: r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x6, 0x0, &(0x7f0000000200)) [ 30.899417][ T3044] memfd_create() without MFD_EXEC nor MFD_NOEXEC_SEAL, pid=3044 'syz-fuzzer' 04:38:30 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000001c0), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_NEIGHBORS(r1, &(0x7f0000004340)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x24, r2, 0x331, 0x0, 0x0, {0x8}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_HARD_IFINDEX={0x8}]}, 0x24}}, 0x0) [ 31.043338][ T25] audit: type=1400 audit(1686371910.202:90): avc: denied { execmem } for pid=3056 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 31.114648][ T25] audit: type=1400 audit(1686371910.272:91): avc: denied { read } for pid=3058 comm="syz-executor.1" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 31.135966][ T25] audit: type=1400 audit(1686371910.272:92): avc: denied { open } for pid=3058 comm="syz-executor.1" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 31.159380][ T25] audit: type=1400 audit(1686371910.272:93): avc: denied { mounton } for pid=3058 comm="syz-executor.1" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 31.180912][ T25] audit: type=1400 audit(1686371910.272:94): avc: denied { module_request } for pid=3058 comm="syz-executor.1" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 31.259716][ T25] audit: type=1400 audit(1686371910.292:95): avc: denied { sys_module } for pid=3058 comm="syz-executor.1" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 31.371241][ T3058] chnl_net:caif_netlink_parms(): no params data found [ 31.401784][ T3061] chnl_net:caif_netlink_parms(): no params data found [ 31.472990][ T3058] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.480129][ T3058] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.487312][ T3058] bridge_slave_0: entered allmulticast mode [ 31.493547][ T3058] bridge_slave_0: entered promiscuous mode [ 31.513887][ T3058] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.520949][ T3058] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.528195][ T3058] bridge_slave_1: entered allmulticast mode [ 31.534689][ T3058] bridge_slave_1: entered promiscuous mode [ 31.580075][ T3058] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 31.597153][ T3058] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 31.606245][ T3061] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.613278][ T3061] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.620423][ T3061] bridge_slave_0: entered allmulticast mode [ 31.626846][ T3061] bridge_slave_0: entered promiscuous mode [ 31.655621][ T3061] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.662776][ T3061] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.670032][ T3061] bridge_slave_1: entered allmulticast mode [ 31.676325][ T3061] bridge_slave_1: entered promiscuous mode [ 31.695154][ T3058] team0: Port device team_slave_0 added [ 31.716300][ T3076] chnl_net:caif_netlink_parms(): no params data found [ 31.724861][ T3058] team0: Port device team_slave_1 added [ 31.738447][ T3061] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 31.752177][ T3061] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 31.812234][ T3058] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 31.819255][ T3058] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 31.845279][ T3058] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 31.855559][ T25] audit: type=1400 audit(1686371911.022:96): avc: denied { append } for pid=2727 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 31.856499][ T3061] team0: Port device team_slave_0 added [ 31.877797][ T25] audit: type=1400 audit(1686371911.022:97): avc: denied { open } for pid=2727 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 31.905755][ T25] audit: type=1400 audit(1686371911.022:98): avc: denied { getattr } for pid=2727 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 31.932081][ T3075] chnl_net:caif_netlink_parms(): no params data found [ 31.940545][ T3058] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 31.947492][ T3058] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 31.973372][ T3058] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 31.984480][ T3061] team0: Port device team_slave_1 added [ 31.999137][ T3076] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.006252][ T3076] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.013448][ T3076] bridge_slave_0: entered allmulticast mode [ 32.019789][ T3076] bridge_slave_0: entered promiscuous mode [ 32.028878][ T3076] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.035968][ T3076] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.043055][ T3076] bridge_slave_1: entered allmulticast mode [ 32.049480][ T3076] bridge_slave_1: entered promiscuous mode [ 32.061951][ T3078] chnl_net:caif_netlink_parms(): no params data found [ 32.076300][ T3060] chnl_net:caif_netlink_parms(): no params data found [ 32.100561][ T3061] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 32.107520][ T3061] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 32.133475][ T3061] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 32.156417][ T3076] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 32.167900][ T3061] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 32.174876][ T3061] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 32.200969][ T3061] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 32.219836][ T3058] hsr_slave_0: entered promiscuous mode [ 32.225759][ T3058] hsr_slave_1: entered promiscuous mode [ 32.232494][ T3076] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 32.276956][ T3075] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.283982][ T3075] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.291248][ T3075] bridge_slave_0: entered allmulticast mode [ 32.297621][ T3075] bridge_slave_0: entered promiscuous mode [ 32.315389][ T3076] team0: Port device team_slave_0 added [ 32.329331][ T3075] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.336446][ T3075] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.343548][ T3075] bridge_slave_1: entered allmulticast mode [ 32.349958][ T3075] bridge_slave_1: entered promiscuous mode [ 32.359973][ T3060] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.367036][ T3060] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.374768][ T3060] bridge_slave_0: entered allmulticast mode [ 32.381040][ T3060] bridge_slave_0: entered promiscuous mode [ 32.387986][ T3076] team0: Port device team_slave_1 added [ 32.398269][ T3078] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.405451][ T3078] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.412531][ T3078] bridge_slave_0: entered allmulticast mode [ 32.418885][ T3078] bridge_slave_0: entered promiscuous mode [ 32.433163][ T3060] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.440262][ T3060] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.447547][ T3060] bridge_slave_1: entered allmulticast mode [ 32.453812][ T3060] bridge_slave_1: entered promiscuous mode [ 32.468712][ T3061] hsr_slave_0: entered promiscuous mode [ 32.474787][ T3061] hsr_slave_1: entered promiscuous mode [ 32.480663][ T3061] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 32.488264][ T3061] Cannot create hsr debugfs directory [ 32.493719][ T3078] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.500783][ T3078] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.507975][ T3078] bridge_slave_1: entered allmulticast mode [ 32.514199][ T3078] bridge_slave_1: entered promiscuous mode [ 32.521400][ T3075] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 32.541691][ T3076] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 32.548649][ T3076] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 32.574549][ T3076] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 32.589736][ T3075] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 32.609293][ T3060] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 32.618683][ T3076] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 32.625707][ T3076] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 32.651607][ T3076] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 32.667545][ T3078] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 32.689219][ T3060] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 32.701291][ T3075] team0: Port device team_slave_0 added [ 32.708124][ T3078] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 32.728142][ T3075] team0: Port device team_slave_1 added [ 32.747047][ T3060] team0: Port device team_slave_0 added [ 32.775454][ T3060] team0: Port device team_slave_1 added [ 32.781344][ T3075] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 32.788326][ T3075] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 32.814227][ T3075] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 32.825649][ T3078] team0: Port device team_slave_0 added [ 32.837027][ T3076] hsr_slave_0: entered promiscuous mode [ 32.842913][ T3076] hsr_slave_1: entered promiscuous mode [ 32.848667][ T3076] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 32.856314][ T3076] Cannot create hsr debugfs directory [ 32.869676][ T3075] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 32.876649][ T3075] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 32.902587][ T3075] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 32.915908][ T3078] team0: Port device team_slave_1 added [ 32.942403][ T3060] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 32.949362][ T3060] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 32.975353][ T3060] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 33.021424][ T3060] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 33.028451][ T3060] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 33.054327][ T3060] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 33.070294][ T3075] hsr_slave_0: entered promiscuous mode [ 33.076194][ T3075] hsr_slave_1: entered promiscuous mode [ 33.081959][ T3075] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 33.089526][ T3075] Cannot create hsr debugfs directory [ 33.095130][ T3078] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 33.102057][ T3078] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 33.127963][ T3078] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 33.144960][ T3058] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 33.154374][ T3058] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 33.163523][ T3058] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 33.172500][ T3058] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 33.181004][ T3078] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 33.188009][ T3078] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 33.214013][ T3078] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 33.246401][ T3061] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 33.256752][ T3060] hsr_slave_0: entered promiscuous mode [ 33.262669][ T3060] hsr_slave_1: entered promiscuous mode [ 33.268572][ T3060] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 33.276173][ T3060] Cannot create hsr debugfs directory [ 33.290594][ T3061] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 33.298993][ T3061] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 33.308983][ T3061] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 33.331997][ T3078] hsr_slave_0: entered promiscuous mode [ 33.338332][ T3078] hsr_slave_1: entered promiscuous mode [ 33.343980][ T3078] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 33.352538][ T3078] Cannot create hsr debugfs directory [ 33.420046][ T3076] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 33.436702][ T3076] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 33.456155][ T3076] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 33.465092][ T3076] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 33.479277][ T3060] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 33.488563][ T3060] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 33.498793][ T3058] 8021q: adding VLAN 0 to HW filter on device bond0 [ 33.520425][ T3155] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 33.527961][ T3155] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 33.536914][ T3060] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 33.551541][ T3060] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 33.563128][ T3058] 8021q: adding VLAN 0 to HW filter on device team0 [ 33.570461][ T3075] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 33.579190][ T3075] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 33.586393][ T25] audit: type=1400 audit(1686371912.752:99): avc: denied { remove_name } for pid=2727 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 33.610709][ T3075] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 33.619264][ T3075] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 33.645975][ T3061] 8021q: adding VLAN 0 to HW filter on device bond0 [ 33.653092][ T3155] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 33.662512][ T3155] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 33.670797][ T3155] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.677826][ T3155] bridge0: port 1(bridge_slave_0) entered forwarding state [ 33.685644][ T3155] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 33.694046][ T3155] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 33.702352][ T3155] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.709447][ T3155] bridge0: port 2(bridge_slave_1) entered forwarding state [ 33.731835][ T3078] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 33.741310][ T3157] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 33.749141][ T3157] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 33.757782][ T3157] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 33.766355][ T3157] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 33.774748][ T3157] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 33.783120][ T3157] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 33.791534][ T3157] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 33.810194][ T3078] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 33.818261][ T3155] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 33.826152][ T3155] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 33.834366][ T3155] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 33.842455][ T3155] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 33.850737][ T3155] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 33.858968][ T3155] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 33.866571][ T3155] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 33.882097][ T3061] 8021q: adding VLAN 0 to HW filter on device team0 [ 33.891509][ T3058] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 33.899141][ T3078] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 33.915102][ T3078] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 33.934752][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 33.943389][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 33.951755][ T3158] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.958817][ T3158] bridge0: port 1(bridge_slave_0) entered forwarding state [ 33.966522][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 33.975418][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 33.983813][ T3158] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.990861][ T3158] bridge0: port 2(bridge_slave_1) entered forwarding state [ 33.998606][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 34.007268][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 34.017908][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 34.030497][ T3075] 8021q: adding VLAN 0 to HW filter on device bond0 [ 34.044244][ T3076] 8021q: adding VLAN 0 to HW filter on device bond0 [ 34.055705][ T3061] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 34.066136][ T3061] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 34.086773][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 34.095228][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 34.103687][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 34.112334][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 34.120917][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 34.129244][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 34.137516][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 34.146084][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 34.154165][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 34.161729][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 34.170387][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 34.178433][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 34.188433][ T3075] 8021q: adding VLAN 0 to HW filter on device team0 [ 34.203493][ T3076] 8021q: adding VLAN 0 to HW filter on device team0 [ 34.220266][ T3060] 8021q: adding VLAN 0 to HW filter on device bond0 [ 34.236132][ T3155] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 34.243673][ T3155] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 34.251524][ T3155] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 34.259060][ T3155] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 34.266707][ T3155] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 34.275240][ T3155] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 34.283393][ T3155] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.290438][ T3155] bridge0: port 1(bridge_slave_0) entered forwarding state [ 34.298251][ T3155] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 34.306635][ T3155] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 34.314840][ T3155] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.322019][ T3155] bridge0: port 1(bridge_slave_0) entered forwarding state [ 34.329660][ T3155] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 34.338125][ T3155] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 34.346447][ T3155] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.353468][ T3155] bridge0: port 2(bridge_slave_1) entered forwarding state [ 34.361045][ T3155] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 34.374635][ T3058] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 34.386014][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 34.394024][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 34.401854][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 34.410350][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 34.419088][ T20] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.426186][ T20] bridge0: port 2(bridge_slave_1) entered forwarding state [ 34.433789][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 34.442771][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 34.451454][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 34.460107][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 34.468585][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 34.477649][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 34.493063][ T3075] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 34.503444][ T3075] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 34.522133][ T3078] 8021q: adding VLAN 0 to HW filter on device bond0 [ 34.534667][ T3060] 8021q: adding VLAN 0 to HW filter on device team0 [ 34.542128][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 34.550458][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 34.558196][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 34.566733][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 34.575195][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 34.583450][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 34.591771][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 34.599943][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 34.608049][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 34.616583][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 34.625222][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 34.633621][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 34.642189][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 34.650573][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 34.659056][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 34.667284][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 34.677734][ T3076] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 34.688897][ T3076] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 34.700508][ T3078] 8021q: adding VLAN 0 to HW filter on device team0 [ 34.715233][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 34.722776][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 34.730887][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 34.739134][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 34.747221][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 34.754637][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 34.761953][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 34.769567][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 34.777411][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 34.786072][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 34.794270][ T3162] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.801358][ T3162] bridge0: port 1(bridge_slave_0) entered forwarding state [ 34.808944][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 34.817388][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 34.825674][ T3162] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.832729][ T3162] bridge0: port 1(bridge_slave_0) entered forwarding state [ 34.840555][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 34.849061][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 34.857342][ T3162] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.864362][ T3162] bridge0: port 2(bridge_slave_1) entered forwarding state [ 34.872006][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 34.880516][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 34.888805][ T3162] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.895890][ T3162] bridge0: port 2(bridge_slave_1) entered forwarding state [ 34.904746][ T3061] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 34.931651][ T3058] veth0_vlan: entered promiscuous mode [ 34.939499][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 34.954207][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 34.962156][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 34.970898][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 34.979305][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 34.987961][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 34.996627][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 35.005030][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 35.013449][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 35.022170][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 35.030687][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 35.039054][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 35.047607][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 35.056170][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 35.064765][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 35.072929][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 35.081149][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 35.089352][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 35.106647][ T3075] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 35.116079][ T3060] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 35.127317][ T3060] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 35.135253][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 35.143296][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 35.152627][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 35.160425][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 35.168397][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 35.175779][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 35.183106][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 35.191555][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 35.199952][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 35.208250][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 35.217765][ T3058] veth1_vlan: entered promiscuous mode [ 35.226360][ T3078] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 35.242119][ T3078] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 35.263230][ T3058] veth0_macvtap: entered promiscuous mode [ 35.270479][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 35.278693][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 35.286732][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 35.294937][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 35.303044][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 35.310582][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 35.318088][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 35.326528][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 35.338391][ T3076] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 35.348479][ T3058] veth1_macvtap: entered promiscuous mode [ 35.361513][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 35.369849][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 35.383321][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 35.399109][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 35.412632][ T3058] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 35.420486][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 35.429019][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 35.443340][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 35.459345][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 35.468021][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 35.476841][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 35.488734][ T3078] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 35.497337][ T3058] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 35.507419][ T3058] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 35.516144][ T3058] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 35.524921][ T3058] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 35.533635][ T3058] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 35.544898][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 35.552457][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 35.559967][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 35.568529][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 35.588514][ T3060] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 35.613857][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 35.621642][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 35.630062][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 35.638764][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 35.650167][ T3061] veth0_vlan: entered promiscuous mode [ 35.667885][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 35.676327][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready 04:38:34 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001380)={0x3, 0x6, &(0x7f0000000040)=@framed={{}, [@jmp={0x5, 0x0, 0x2, 0x0, 0x0, 0x2}, @jmp={0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x11}, @exit]}, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 35.694056][ T3061] veth1_vlan: entered promiscuous mode [ 35.709777][ T3076] veth0_vlan: entered promiscuous mode [ 35.719384][ T3075] veth0_vlan: entered promiscuous mode [ 35.726605][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready 04:38:34 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001380)={0x3, 0x6, &(0x7f0000000040)=@framed={{}, [@jmp={0x5, 0x0, 0x2, 0x0, 0x0, 0x2}, @jmp={0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x11}, @exit]}, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 35.741480][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 35.750356][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 35.758645][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 35.768655][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 35.777561][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 35.786228][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready 04:38:34 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001380)={0x3, 0x6, &(0x7f0000000040)=@framed={{}, [@jmp={0x5, 0x0, 0x2, 0x0, 0x0, 0x2}, @jmp={0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x11}, @exit]}, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 04:38:35 executing program 1: ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000001080)={0x0, 0x0, 0x0, {0x0, 0x1}, {0x69, 0x2}}) r0 = syz_open_dev$evdev(&(0x7f00000000c0), 0x2, 0x822b01) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000000)) write$char_usb(r0, &(0x7f0000000040)="e2", 0x2ad8) [ 35.794881][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 35.803325][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 35.812873][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 35.821413][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 35.833087][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready 04:38:35 executing program 1: ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000001080)={0x0, 0x0, 0x0, {0x0, 0x1}, {0x69, 0x2}}) r0 = syz_open_dev$evdev(&(0x7f00000000c0), 0x2, 0x822b01) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000000)) write$char_usb(r0, &(0x7f0000000040)="e2", 0x2ad8) [ 35.842121][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 35.863728][ T3075] veth1_vlan: entered promiscuous mode [ 35.876230][ T3076] veth1_vlan: entered promiscuous mode [ 35.889561][ T3061] veth0_macvtap: entered promiscuous mode 04:38:35 executing program 1: ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000001080)={0x0, 0x0, 0x0, {0x0, 0x1}, {0x69, 0x2}}) r0 = syz_open_dev$evdev(&(0x7f00000000c0), 0x2, 0x822b01) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000000)) write$char_usb(r0, &(0x7f0000000040)="e2", 0x2ad8) [ 35.898085][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 35.907481][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 35.915573][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 35.927198][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 35.935580][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 35.944067][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 35.952606][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 35.961172][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 35.968900][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 35.976827][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 35.987063][ T3078] veth0_vlan: entered promiscuous mode [ 36.010461][ T3078] veth1_vlan: entered promiscuous mode [ 36.017829][ T3061] veth1_macvtap: entered promiscuous mode [ 36.036177][ T3076] veth0_macvtap: entered promiscuous mode [ 36.047817][ T3060] veth0_vlan: entered promiscuous mode [ 36.055626][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 36.063748][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 36.071850][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 36.080138][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 36.088299][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 36.096277][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 36.104724][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 36.113250][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 36.121787][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 36.130192][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 36.138352][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 36.147676][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 36.155766][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 36.163517][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 36.173680][ T3075] veth0_macvtap: entered promiscuous mode [ 36.180548][ T3076] veth1_macvtap: entered promiscuous mode [ 36.190235][ T3061] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 36.200724][ T3061] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 36.211795][ T3061] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 36.221423][ T3075] veth1_macvtap: entered promiscuous mode [ 36.231615][ T3076] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 36.242036][ T3076] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 36.251904][ T3076] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 36.262509][ T3076] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 36.273536][ T3076] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 36.283261][ T3060] veth1_vlan: entered promiscuous mode [ 36.289573][ T3157] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 36.298574][ T3157] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 36.306788][ T3157] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 36.314715][ T3157] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 36.322558][ T3157] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 36.332178][ T3157] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 36.340805][ T3157] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 36.349615][ T3157] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 36.359611][ T3061] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 36.370062][ T3061] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 36.381172][ T3061] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 36.393228][ T3078] veth0_macvtap: entered promiscuous mode [ 36.403593][ T3075] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 36.414105][ T3075] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 36.423898][ T3075] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 36.434293][ T3075] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 36.444167][ T3075] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 36.454614][ T3075] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 36.465985][ T3075] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 36.473896][ T3076] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 36.484395][ T3076] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 36.494180][ T3076] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 36.504661][ T3076] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 36.517048][ T3076] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 36.526355][ T3076] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 36.535120][ T3076] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 36.543870][ T3076] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 36.552603][ T3076] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 36.563458][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 36.572473][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 36.581267][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 36.591009][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 36.599727][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 36.609624][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 36.618302][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 36.627618][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 36.636335][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 36.645178][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 36.657899][ T3078] veth1_macvtap: entered promiscuous mode [ 36.664818][ T3075] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 36.675385][ T3075] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 36.685231][ T3075] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 36.695648][ T3075] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 36.705451][ T3075] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 36.715886][ T3075] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 36.726804][ T3075] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 36.740004][ T3061] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 36.748819][ T3061] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 36.757529][ T3061] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 36.766273][ T3061] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 36.782381][ T3078] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 36.792892][ T3078] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 36.804008][ T3078] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 36.814575][ T3078] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 36.824419][ T3078] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 36.834850][ T3078] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 36.844769][ T3078] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 36.855189][ T3078] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 36.866834][ T3078] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 36.874193][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 36.882979][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 36.891577][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 36.900034][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 36.912709][ T3060] veth0_macvtap: entered promiscuous mode [ 36.921006][ T3075] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 36.929823][ T3075] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 36.938574][ T3075] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 36.947245][ T3075] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 36.963367][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 36.972052][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 36.982677][ T3060] veth1_macvtap: entered promiscuous mode [ 37.000979][ T3078] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 37.009627][ T25] kauditd_printk_skb: 13 callbacks suppressed 04:38:36 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc) sendmsg$AUDIT_LIST_RULES(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x10}, 0x10}}, 0x0) 04:38:36 executing program 1: ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000001080)={0x0, 0x0, 0x0, {0x0, 0x1}, {0x69, 0x2}}) r0 = syz_open_dev$evdev(&(0x7f00000000c0), 0x2, 0x822b01) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000000)) write$char_usb(r0, &(0x7f0000000040)="e2", 0x2ad8) [ 37.009638][ T25] audit: type=1400 audit(1686371916.172:113): avc: denied { audit_read } for pid=3251 comm="syz-executor.0" capability=37 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 37.011490][ T3078] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 37.048704][ T3078] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 37.059123][ T3078] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 37.068915][ T3078] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 37.079420][ T3078] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 37.089215][ T3078] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 37.099617][ T3078] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 37.112293][ T3078] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 37.119849][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 37.127963][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 37.136130][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 37.144741][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 37.161431][ T3060] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 37.171971][ T3060] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 37.181768][ T3060] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 37.192305][ T3060] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 37.202098][ T3060] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 37.212501][ T3060] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 37.222299][ T3060] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 37.232816][ T3060] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 37.242637][ T3060] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 37.253041][ T3060] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 37.264112][ T3060] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 37.275345][ T3078] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.284033][ T3078] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.292777][ T3078] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.301467][ T3078] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.315974][ T3177] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 37.324526][ T3177] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 37.336476][ T3060] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 37.346951][ T3060] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 37.356740][ T3060] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 37.367247][ T3060] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 37.377109][ T3060] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 37.387514][ T3060] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 37.397310][ T3060] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 37.407820][ T3060] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 37.417703][ T3060] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 37.428126][ T3060] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 37.441438][ T3060] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 37.464517][ T3150] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 37.472581][ T25] audit: type=1400 audit(1686371916.622:114): avc: denied { create } for pid=3258 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 37.492479][ T25] audit: type=1400 audit(1686371916.622:115): avc: denied { getopt } for pid=3258 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 37.512937][ T3150] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 37.523363][ T3060] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.532084][ T3060] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.540929][ T3060] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.549627][ T3060] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.611434][ T25] audit: type=1400 audit(1686371916.772:116): avc: denied { create } for pid=3262 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 37.632168][ T25] audit: type=1400 audit(1686371916.772:117): avc: denied { write } for pid=3262 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 04:38:36 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$igmp6(0xa, 0x3, 0x2) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000000)={@empty, 0x0, r2}) [ 37.652787][ T25] audit: type=1400 audit(1686371916.772:118): avc: denied { read } for pid=3262 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 37.673311][ T25] audit: type=1400 audit(1686371916.772:119): avc: denied { ioctl } for pid=3262 comm="syz-executor.5" path="socket:[18523]" dev="sockfs" ino=18523 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 37.700029][ T25] audit: type=1400 audit(1686371916.822:120): avc: denied { mounton } for pid=3265 comm="syz-executor.2" path="/root/syzkaller-testdir1276695325/syzkaller.2Z6ZO4/0/file0" dev="sda1" ino=1954 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 37.727008][ T25] audit: type=1400 audit(1686371916.822:121): avc: denied { create } for pid=3266 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 37.746775][ T25] audit: type=1400 audit(1686371916.822:122): avc: denied { create } for pid=3266 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 37.869320][ T3274] devtmpfs: Unknown parameter '' 04:38:37 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc) sendmsg$AUDIT_LIST_RULES(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x10}, 0x10}}, 0x0) 04:38:37 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc) sendmsg$AUDIT_LIST_RULES(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x10}, 0x10}}, 0x0) 04:38:37 executing program 4: r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x6, 0x0, &(0x7f0000000200)) 04:38:37 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000001c0), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_NEIGHBORS(r1, &(0x7f0000004340)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x24, r2, 0x331, 0x0, 0x0, {0x8}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_HARD_IFINDEX={0x8}]}, 0x24}}, 0x0) 04:38:37 executing program 2: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x100) r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x8002, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000340)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) sendmsg$inet(r1, &(0x7f0000000300)={&(0x7f0000000140)={0x2, 0x4001, @private=0xa010101}, 0x10, 0x0}, 0x4008001) ioctl$BTRFS_IOC_GET_FEATURES(0xffffffffffffffff, 0x80189439, &(0x7f0000000280)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x14e20}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = creat(0x0, 0x0) r6 = dup2(r5, r5) ioctl$BLKGETSIZE(r6, 0x40081271, &(0x7f0000003c00)) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='devtmpfs\x00', 0x4, &(0x7f0000000440)=',\x15\x00') sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = openat$cgroup(r7, &(0x7f0000000240)='syz1\x00', 0x200002, 0x0) r9 = openat$cgroup_int(r8, &(0x7f0000000a40)='memory.high\x00', 0x2, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000006680), 0x50200, 0x0) write$cgroup_int(r9, &(0x7f0000000140), 0x12) 04:38:37 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$igmp6(0xa, 0x3, 0x2) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000000)={@empty, 0x0, r2}) 04:38:37 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000001c0), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_NEIGHBORS(r1, &(0x7f0000004340)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x24, r2, 0x331, 0x0, 0x0, {0x8}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_HARD_IFINDEX={0x8}]}, 0x24}}, 0x0) 04:38:37 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc) sendmsg$AUDIT_LIST_RULES(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x10}, 0x10}}, 0x0) 04:38:37 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$igmp6(0xa, 0x3, 0x2) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000000)={@empty, 0x0, r2}) 04:38:37 executing program 4: r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x6, 0x0, &(0x7f0000000200)) 04:38:37 executing program 0: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x100) r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x8002, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000340)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) sendmsg$inet(r1, &(0x7f0000000300)={&(0x7f0000000140)={0x2, 0x4001, @private=0xa010101}, 0x10, 0x0}, 0x4008001) ioctl$BTRFS_IOC_GET_FEATURES(0xffffffffffffffff, 0x80189439, &(0x7f0000000280)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x14e20}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = creat(0x0, 0x0) r6 = dup2(r5, r5) ioctl$BLKGETSIZE(r6, 0x40081271, &(0x7f0000003c00)) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='devtmpfs\x00', 0x4, &(0x7f0000000440)=',\x15\x00') sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = openat$cgroup(r7, &(0x7f0000000240)='syz1\x00', 0x200002, 0x0) r9 = openat$cgroup_int(r8, &(0x7f0000000a40)='memory.high\x00', 0x2, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000006680), 0x50200, 0x0) write$cgroup_int(r9, &(0x7f0000000140), 0x12) 04:38:37 executing program 3: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x100) r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x8002, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000340)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) sendmsg$inet(r1, &(0x7f0000000300)={&(0x7f0000000140)={0x2, 0x4001, @private=0xa010101}, 0x10, 0x0}, 0x4008001) ioctl$BTRFS_IOC_GET_FEATURES(0xffffffffffffffff, 0x80189439, &(0x7f0000000280)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x14e20}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = creat(0x0, 0x0) r6 = dup2(r5, r5) ioctl$BLKGETSIZE(r6, 0x40081271, &(0x7f0000003c00)) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='devtmpfs\x00', 0x4, &(0x7f0000000440)=',\x15\x00') sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = openat$cgroup(r7, &(0x7f0000000240)='syz1\x00', 0x200002, 0x0) r9 = openat$cgroup_int(r8, &(0x7f0000000a40)='memory.high\x00', 0x2, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000006680), 0x50200, 0x0) write$cgroup_int(r9, &(0x7f0000000140), 0x12) [ 39.464821][ T3301] devtmpfs: Unknown parameter '' [ 39.588256][ T3303] devtmpfs: Unknown parameter '' [ 39.611783][ T3299] sched: RT throttling activated [ 39.672507][ T3302] devtmpfs: Unknown parameter '' 04:38:41 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc) sendmsg$AUDIT_LIST_RULES(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x10}, 0x10}}, 0x0) 04:38:41 executing program 4: r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x6, 0x0, &(0x7f0000000200)) 04:38:41 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000001c0), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_NEIGHBORS(r1, &(0x7f0000004340)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x24, r2, 0x331, 0x0, 0x0, {0x8}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_HARD_IFINDEX={0x8}]}, 0x24}}, 0x0) 04:38:41 executing program 0: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x100) r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x8002, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000340)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) sendmsg$inet(r1, &(0x7f0000000300)={&(0x7f0000000140)={0x2, 0x4001, @private=0xa010101}, 0x10, 0x0}, 0x4008001) ioctl$BTRFS_IOC_GET_FEATURES(0xffffffffffffffff, 0x80189439, &(0x7f0000000280)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x14e20}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = creat(0x0, 0x0) r6 = dup2(r5, r5) ioctl$BLKGETSIZE(r6, 0x40081271, &(0x7f0000003c00)) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='devtmpfs\x00', 0x4, &(0x7f0000000440)=',\x15\x00') sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = openat$cgroup(r7, &(0x7f0000000240)='syz1\x00', 0x200002, 0x0) r9 = openat$cgroup_int(r8, &(0x7f0000000a40)='memory.high\x00', 0x2, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000006680), 0x50200, 0x0) write$cgroup_int(r9, &(0x7f0000000140), 0x12) 04:38:41 executing program 2: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x100) r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x8002, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000340)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) sendmsg$inet(r1, &(0x7f0000000300)={&(0x7f0000000140)={0x2, 0x4001, @private=0xa010101}, 0x10, 0x0}, 0x4008001) ioctl$BTRFS_IOC_GET_FEATURES(0xffffffffffffffff, 0x80189439, &(0x7f0000000280)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x14e20}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = creat(0x0, 0x0) r6 = dup2(r5, r5) ioctl$BLKGETSIZE(r6, 0x40081271, &(0x7f0000003c00)) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='devtmpfs\x00', 0x4, &(0x7f0000000440)=',\x15\x00') sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = openat$cgroup(r7, &(0x7f0000000240)='syz1\x00', 0x200002, 0x0) r9 = openat$cgroup_int(r8, &(0x7f0000000a40)='memory.high\x00', 0x2, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000006680), 0x50200, 0x0) write$cgroup_int(r9, &(0x7f0000000140), 0x12) 04:38:41 executing program 3: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x100) r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x8002, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000340)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) sendmsg$inet(r1, &(0x7f0000000300)={&(0x7f0000000140)={0x2, 0x4001, @private=0xa010101}, 0x10, 0x0}, 0x4008001) ioctl$BTRFS_IOC_GET_FEATURES(0xffffffffffffffff, 0x80189439, &(0x7f0000000280)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x14e20}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = creat(0x0, 0x0) r6 = dup2(r5, r5) ioctl$BLKGETSIZE(r6, 0x40081271, &(0x7f0000003c00)) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='devtmpfs\x00', 0x4, &(0x7f0000000440)=',\x15\x00') sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = openat$cgroup(r7, &(0x7f0000000240)='syz1\x00', 0x200002, 0x0) r9 = openat$cgroup_int(r8, &(0x7f0000000a40)='memory.high\x00', 0x2, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000006680), 0x50200, 0x0) write$cgroup_int(r9, &(0x7f0000000140), 0x12) 04:38:41 executing program 4: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x100) r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x8002, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000340)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) sendmsg$inet(r1, &(0x7f0000000300)={&(0x7f0000000140)={0x2, 0x4001, @private=0xa010101}, 0x10, 0x0}, 0x4008001) ioctl$BTRFS_IOC_GET_FEATURES(0xffffffffffffffff, 0x80189439, &(0x7f0000000280)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x14e20}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = creat(0x0, 0x0) r6 = dup2(r5, r5) ioctl$BLKGETSIZE(r6, 0x40081271, &(0x7f0000003c00)) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='devtmpfs\x00', 0x4, &(0x7f0000000440)=',\x15\x00') sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = openat$cgroup(r7, &(0x7f0000000240)='syz1\x00', 0x200002, 0x0) r9 = openat$cgroup_int(r8, &(0x7f0000000a40)='memory.high\x00', 0x2, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000006680), 0x50200, 0x0) write$cgroup_int(r9, &(0x7f0000000140), 0x12) 04:38:41 executing program 5: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x100) r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x8002, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000340)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) sendmsg$inet(r1, &(0x7f0000000300)={&(0x7f0000000140)={0x2, 0x4001, @private=0xa010101}, 0x10, 0x0}, 0x4008001) ioctl$BTRFS_IOC_GET_FEATURES(0xffffffffffffffff, 0x80189439, &(0x7f0000000280)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x14e20}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = creat(0x0, 0x0) r6 = dup2(r5, r5) ioctl$BLKGETSIZE(r6, 0x40081271, &(0x7f0000003c00)) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='devtmpfs\x00', 0x4, &(0x7f0000000440)=',\x15\x00') sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = openat$cgroup(r7, &(0x7f0000000240)='syz1\x00', 0x200002, 0x0) r9 = openat$cgroup_int(r8, &(0x7f0000000a40)='memory.high\x00', 0x2, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000006680), 0x50200, 0x0) write$cgroup_int(r9, &(0x7f0000000140), 0x12) [ 43.674951][ T3326] devtmpfs: Unknown parameter '' [ 44.364822][ T3325] devtmpfs: Unknown parameter '' [ 44.553235][ T3327] devtmpfs: Unknown parameter '' [ 44.558464][ T3328] devtmpfs: Unknown parameter '' [ 44.563602][ T3329] devtmpfs: Unknown parameter '' 04:38:43 executing program 2: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x100) r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x8002, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000340)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) sendmsg$inet(r1, &(0x7f0000000300)={&(0x7f0000000140)={0x2, 0x4001, @private=0xa010101}, 0x10, 0x0}, 0x4008001) ioctl$BTRFS_IOC_GET_FEATURES(0xffffffffffffffff, 0x80189439, &(0x7f0000000280)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x14e20}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = creat(0x0, 0x0) r6 = dup2(r5, r5) ioctl$BLKGETSIZE(r6, 0x40081271, &(0x7f0000003c00)) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='devtmpfs\x00', 0x4, &(0x7f0000000440)=',\x15\x00') sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = openat$cgroup(r7, &(0x7f0000000240)='syz1\x00', 0x200002, 0x0) r9 = openat$cgroup_int(r8, &(0x7f0000000a40)='memory.high\x00', 0x2, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000006680), 0x50200, 0x0) write$cgroup_int(r9, &(0x7f0000000140), 0x12) 04:38:44 executing program 0: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x100) r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x8002, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000340)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) sendmsg$inet(r1, &(0x7f0000000300)={&(0x7f0000000140)={0x2, 0x4001, @private=0xa010101}, 0x10, 0x0}, 0x4008001) ioctl$BTRFS_IOC_GET_FEATURES(0xffffffffffffffff, 0x80189439, &(0x7f0000000280)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x14e20}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = creat(0x0, 0x0) r6 = dup2(r5, r5) ioctl$BLKGETSIZE(r6, 0x40081271, &(0x7f0000003c00)) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='devtmpfs\x00', 0x4, &(0x7f0000000440)=',\x15\x00') sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = openat$cgroup(r7, &(0x7f0000000240)='syz1\x00', 0x200002, 0x0) r9 = openat$cgroup_int(r8, &(0x7f0000000a40)='memory.high\x00', 0x2, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000006680), 0x50200, 0x0) write$cgroup_int(r9, &(0x7f0000000140), 0x12) [ 44.983625][ T3334] devtmpfs: Unknown parameter '' 04:38:44 executing program 5: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x100) r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x8002, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000340)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) sendmsg$inet(r1, &(0x7f0000000300)={&(0x7f0000000140)={0x2, 0x4001, @private=0xa010101}, 0x10, 0x0}, 0x4008001) ioctl$BTRFS_IOC_GET_FEATURES(0xffffffffffffffff, 0x80189439, &(0x7f0000000280)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x14e20}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = creat(0x0, 0x0) r6 = dup2(r5, r5) ioctl$BLKGETSIZE(r6, 0x40081271, &(0x7f0000003c00)) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='devtmpfs\x00', 0x4, &(0x7f0000000440)=',\x15\x00') sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = openat$cgroup(r7, &(0x7f0000000240)='syz1\x00', 0x200002, 0x0) r9 = openat$cgroup_int(r8, &(0x7f0000000a40)='memory.high\x00', 0x2, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000006680), 0x50200, 0x0) write$cgroup_int(r9, &(0x7f0000000140), 0x12) 04:38:44 executing program 4: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x100) r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x8002, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000340)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) sendmsg$inet(r1, &(0x7f0000000300)={&(0x7f0000000140)={0x2, 0x4001, @private=0xa010101}, 0x10, 0x0}, 0x4008001) ioctl$BTRFS_IOC_GET_FEATURES(0xffffffffffffffff, 0x80189439, &(0x7f0000000280)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x14e20}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = creat(0x0, 0x0) r6 = dup2(r5, r5) ioctl$BLKGETSIZE(r6, 0x40081271, &(0x7f0000003c00)) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='devtmpfs\x00', 0x4, &(0x7f0000000440)=',\x15\x00') sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = openat$cgroup(r7, &(0x7f0000000240)='syz1\x00', 0x200002, 0x0) r9 = openat$cgroup_int(r8, &(0x7f0000000a40)='memory.high\x00', 0x2, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000006680), 0x50200, 0x0) write$cgroup_int(r9, &(0x7f0000000140), 0x12) [ 45.571642][ T3343] devtmpfs: Unknown parameter '' [ 46.184583][ T3346] devtmpfs: Unknown parameter '' [ 46.204057][ T3347] devtmpfs: Unknown parameter '' 04:38:48 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc) sendmsg$AUDIT_LIST_RULES(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x10}, 0x10}}, 0x0) 04:38:48 executing program 3: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x100) r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x8002, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000340)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) sendmsg$inet(r1, &(0x7f0000000300)={&(0x7f0000000140)={0x2, 0x4001, @private=0xa010101}, 0x10, 0x0}, 0x4008001) ioctl$BTRFS_IOC_GET_FEATURES(0xffffffffffffffff, 0x80189439, &(0x7f0000000280)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x14e20}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = creat(0x0, 0x0) r6 = dup2(r5, r5) ioctl$BLKGETSIZE(r6, 0x40081271, &(0x7f0000003c00)) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='devtmpfs\x00', 0x4, &(0x7f0000000440)=',\x15\x00') sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = openat$cgroup(r7, &(0x7f0000000240)='syz1\x00', 0x200002, 0x0) r9 = openat$cgroup_int(r8, &(0x7f0000000a40)='memory.high\x00', 0x2, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000006680), 0x50200, 0x0) write$cgroup_int(r9, &(0x7f0000000140), 0x12) 04:38:48 executing program 2: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x100) r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x8002, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000340)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) sendmsg$inet(r1, &(0x7f0000000300)={&(0x7f0000000140)={0x2, 0x4001, @private=0xa010101}, 0x10, 0x0}, 0x4008001) ioctl$BTRFS_IOC_GET_FEATURES(0xffffffffffffffff, 0x80189439, &(0x7f0000000280)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x14e20}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = creat(0x0, 0x0) r6 = dup2(r5, r5) ioctl$BLKGETSIZE(r6, 0x40081271, &(0x7f0000003c00)) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='devtmpfs\x00', 0x4, &(0x7f0000000440)=',\x15\x00') sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = openat$cgroup(r7, &(0x7f0000000240)='syz1\x00', 0x200002, 0x0) r9 = openat$cgroup_int(r8, &(0x7f0000000a40)='memory.high\x00', 0x2, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000006680), 0x50200, 0x0) write$cgroup_int(r9, &(0x7f0000000140), 0x12) 04:38:48 executing program 0: ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000001080)={0x0, 0x0, 0x0, {0x0, 0x1}, {0x69, 0x2}}) r0 = syz_open_dev$evdev(&(0x7f00000000c0), 0x2, 0x822b01) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000000)) write$char_usb(r0, &(0x7f0000000040)="e2", 0x2ad8) 04:38:48 executing program 5: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x100) r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x8002, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000340)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) sendmsg$inet(r1, &(0x7f0000000300)={&(0x7f0000000140)={0x2, 0x4001, @private=0xa010101}, 0x10, 0x0}, 0x4008001) ioctl$BTRFS_IOC_GET_FEATURES(0xffffffffffffffff, 0x80189439, &(0x7f0000000280)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x14e20}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = creat(0x0, 0x0) r6 = dup2(r5, r5) ioctl$BLKGETSIZE(r6, 0x40081271, &(0x7f0000003c00)) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='devtmpfs\x00', 0x4, &(0x7f0000000440)=',\x15\x00') sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = openat$cgroup(r7, &(0x7f0000000240)='syz1\x00', 0x200002, 0x0) r9 = openat$cgroup_int(r8, &(0x7f0000000a40)='memory.high\x00', 0x2, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000006680), 0x50200, 0x0) write$cgroup_int(r9, &(0x7f0000000140), 0x12) 04:38:48 executing program 4: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x100) r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x8002, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000340)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) sendmsg$inet(r1, &(0x7f0000000300)={&(0x7f0000000140)={0x2, 0x4001, @private=0xa010101}, 0x10, 0x0}, 0x4008001) ioctl$BTRFS_IOC_GET_FEATURES(0xffffffffffffffff, 0x80189439, &(0x7f0000000280)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x14e20}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = creat(0x0, 0x0) r6 = dup2(r5, r5) ioctl$BLKGETSIZE(r6, 0x40081271, &(0x7f0000003c00)) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='devtmpfs\x00', 0x4, &(0x7f0000000440)=',\x15\x00') sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = openat$cgroup(r7, &(0x7f0000000240)='syz1\x00', 0x200002, 0x0) r9 = openat$cgroup_int(r8, &(0x7f0000000a40)='memory.high\x00', 0x2, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000006680), 0x50200, 0x0) write$cgroup_int(r9, &(0x7f0000000140), 0x12) 04:38:48 executing program 0: ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000001080)={0x0, 0x0, 0x0, {0x0, 0x1}, {0x69, 0x2}}) r0 = syz_open_dev$evdev(&(0x7f00000000c0), 0x2, 0x822b01) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000000)) write$char_usb(r0, &(0x7f0000000040)="e2", 0x2ad8) 04:38:48 executing program 0: ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000001080)={0x0, 0x0, 0x0, {0x0, 0x1}, {0x69, 0x2}}) r0 = syz_open_dev$evdev(&(0x7f00000000c0), 0x2, 0x822b01) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000000)) write$char_usb(r0, &(0x7f0000000040)="e2", 0x2ad8) 04:38:48 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001300)=[{{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c, &(0x7f00000005c0)=[{&(0x7f0000000040)="51f26f04f2f54c7439b3b713ec3391a7935705cb74655293984e224c4e679faaff8638eb72b943f65a5532e3d15eb926e87c5bd79a4c4a1fb79d3ebec992ec751350926f1954f74d6656068a8d1f441d7095fe97dcbca7fdf3d28c208fe898b5905fe38f", 0x64}, {&(0x7f00000000c0)="60853ddcb66f61f2263a5308b111dad7f89ddf54b159b7e89dacb73c7fa62656c19668a46392f5573100fe47cd5262bd63104721837b6b72f93e8cc617c5f7877e816d412b4f4640f14ceeb93e6014ce559dc3486c66e317a6ee6859cf7b65e8c8fc3206341c1018573dcf5d5be47def4c43ee6f5cc8647a05b5969e4befa248395de54c31d5f9af43b55f76f9a837ae3d8aea55cfdfc33d361b79e57d739558e2cafaaf08ff828b970971dbe6c4b1ae266c6ed01f1cc272a723fd73368b", 0xbe}, {&(0x7f0000000180)="8f943ead2f85f6fd0fbab2ba1eaa28c0a00f97da92f725f9b84a729c5c991141871784a8e54f9427101cd5f021609163b413ceb62835cfd35203a05e2081ee61e96d883414abf03a936d07e8dbe319c791edaa5b88a36efb1e56917e9f8ca387", 0x60}, {&(0x7f0000000a00)="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", 0x126}, {&(0x7f00000003c0)="cb5979a11ed9741cc4d07bba41c956777a2e2ccae9ab5b25bd19bd5e09b66d97c84839c06be742cfbc95a8d7435c8f6ac1aaaeb8bfbf8c9852651f8987c6c57dddef51a198969719680a118ce1b0d8b340d4dac3c85ae653a0355fbcca4856ba5c007e1e24e99ba1b1740dc7b7f5c19bb85ee09c3c489d83f7bb9547f537b5b78f44b50300b4bdb693ffffe33d6031adedc830cfb7c686bf2ec7a2376f828c5e470725fb2ac838eac1fa60ce47c97a8e241f4f3dbee51bbcf0762601ef6f00a6b4", 0xc1}, {&(0x7f00000004c0)="37aab43970ab3b5cea227b7526e5d4d300ef3bcfdb622110c1e955b09fa12fcd5b2200d043b8d57d2da6bd58f566e47994934139e78b427d5c61ff5f9e8f5a4108d3a51beeb8e95c92b165aa73857723cadf7a83b39f6272df3a82a1ea168bc6dc2a3272a966ff0cf330c7896db86a9951ce9b559d73bedda616af930a1fcb2fa720a9f921877acb79c2593384c5ca34bb5f2785c3c392b5fadcce2f45be73666750d941476b52a016117e2fdac77418fa9c9fa6bc69734ce78bb7d46db475a234020ee21399aaa67d133215852e1eea15", 0xd1}, {&(0x7f0000000200)="58bfed88829d985576d7b993172b1109", 0x10}], 0x7}}, {{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000680)="a7aa42a9560444e1cd45bcfbd4", 0xd}], 0x1}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f00000007c0)="2ed1b4b3f8242e216a83248cfd67e90e2f7cec553f7dd47e5154485d71885d11c275975a04c95c5683a946781387df003c6b5b3b6440b7a976f6797e1b6d3562c09b604833", 0x45}, {&(0x7f0000000840)="43900f05d7d0b780adf6a71b6a4bcf395a50d82a509b81eefe7eb23f23f07495372dfd0db45df9389b0487be735b111a4f80f269fbfada7c687fb30e6b14ee9c2dd1c7724bc3bf5dca369087e7f1e50b74", 0x51}, {&(0x7f00000008c0)="11347b92a012f3f4636d1d05d1be86ef1cc9132b3e579db6754c9567cbbbaedeea9d1e8736abe3d818107f4070", 0x2d}, {&(0x7f0000000900)="02c793478cef74edfd81029b1e2336b47c3140ad8eaf336baf56cd92bed6bad9b968df97bc60eb11ea49bf6d9d55b6df8715f6aa042132c989b2308bb8b15c0f01f23e5fe837658744351ffd5a10bc8d1d0d16ffe2add9ae9b9209cff942e6cd580901984a4b14550bbabde8c2fe9cf5c67614d5d00b8b17a832ba6bae1f46ab078996969eb702", 0x87}], 0x4}}], 0x3, 0x8001) sendmsg$inet6(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000280)="b6ad4a77883aa20844566e2d", 0xc}], 0x1}, 0x0) 04:38:48 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001300)=[{{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c, &(0x7f00000005c0)=[{&(0x7f0000000040)="51f26f04f2f54c7439b3b713ec3391a7935705cb74655293984e224c4e679faaff8638eb72b943f65a5532e3d15eb926e87c5bd79a4c4a1fb79d3ebec992ec751350926f1954f74d6656068a8d1f441d7095fe97dcbca7fdf3d28c208fe898b5905fe38f", 0x64}, {&(0x7f00000000c0)="60853ddcb66f61f2263a5308b111dad7f89ddf54b159b7e89dacb73c7fa62656c19668a46392f5573100fe47cd5262bd63104721837b6b72f93e8cc617c5f7877e816d412b4f4640f14ceeb93e6014ce559dc3486c66e317a6ee6859cf7b65e8c8fc3206341c1018573dcf5d5be47def4c43ee6f5cc8647a05b5969e4befa248395de54c31d5f9af43b55f76f9a837ae3d8aea55cfdfc33d361b79e57d739558e2cafaaf08ff828b970971dbe6c4b1ae266c6ed01f1cc272a723fd73368b", 0xbe}, {&(0x7f0000000180)="8f943ead2f85f6fd0fbab2ba1eaa28c0a00f97da92f725f9b84a729c5c991141871784a8e54f9427101cd5f021609163b413ceb62835cfd35203a05e2081ee61e96d883414abf03a936d07e8dbe319c791edaa5b88a36efb1e56917e9f8ca387", 0x60}, {&(0x7f0000000a00)="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", 0x126}, {&(0x7f00000003c0)="cb5979a11ed9741cc4d07bba41c956777a2e2ccae9ab5b25bd19bd5e09b66d97c84839c06be742cfbc95a8d7435c8f6ac1aaaeb8bfbf8c9852651f8987c6c57dddef51a198969719680a118ce1b0d8b340d4dac3c85ae653a0355fbcca4856ba5c007e1e24e99ba1b1740dc7b7f5c19bb85ee09c3c489d83f7bb9547f537b5b78f44b50300b4bdb693ffffe33d6031adedc830cfb7c686bf2ec7a2376f828c5e470725fb2ac838eac1fa60ce47c97a8e241f4f3dbee51bbcf0762601ef6f00a6b4", 0xc1}, {&(0x7f00000004c0)="37aab43970ab3b5cea227b7526e5d4d300ef3bcfdb622110c1e955b09fa12fcd5b2200d043b8d57d2da6bd58f566e47994934139e78b427d5c61ff5f9e8f5a4108d3a51beeb8e95c92b165aa73857723cadf7a83b39f6272df3a82a1ea168bc6dc2a3272a966ff0cf330c7896db86a9951ce9b559d73bedda616af930a1fcb2fa720a9f921877acb79c2593384c5ca34bb5f2785c3c392b5fadcce2f45be73666750d941476b52a016117e2fdac77418fa9c9fa6bc69734ce78bb7d46db475a234020ee21399aaa67d133215852e1eea15", 0xd1}, {&(0x7f0000000200)="58bfed88829d985576d7b993172b1109", 0x10}], 0x7}}, {{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000680)="a7aa42a9560444e1cd45bcfbd4", 0xd}], 0x1}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f00000007c0)="2ed1b4b3f8242e216a83248cfd67e90e2f7cec553f7dd47e5154485d71885d11c275975a04c95c5683a946781387df003c6b5b3b6440b7a976f6797e1b6d3562c09b604833", 0x45}, {&(0x7f0000000840)="43900f05d7d0b780adf6a71b6a4bcf395a50d82a509b81eefe7eb23f23f07495372dfd0db45df9389b0487be735b111a4f80f269fbfada7c687fb30e6b14ee9c2dd1c7724bc3bf5dca369087e7f1e50b74", 0x51}, {&(0x7f00000008c0)="11347b92a012f3f4636d1d05d1be86ef1cc9132b3e579db6754c9567cbbbaedeea9d1e8736abe3d818107f4070", 0x2d}, {&(0x7f0000000900)="02c793478cef74edfd81029b1e2336b47c3140ad8eaf336baf56cd92bed6bad9b968df97bc60eb11ea49bf6d9d55b6df8715f6aa042132c989b2308bb8b15c0f01f23e5fe837658744351ffd5a10bc8d1d0d16ffe2add9ae9b9209cff942e6cd580901984a4b14550bbabde8c2fe9cf5c67614d5d00b8b17a832ba6bae1f46ab078996969eb702", 0x87}], 0x4}}], 0x3, 0x8001) sendmsg$inet6(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000280)="b6ad4a77883aa20844566e2d", 0xc}], 0x1}, 0x0) [ 48.987860][ T25] kauditd_printk_skb: 3 callbacks suppressed [ 48.987872][ T25] audit: type=1400 audit(1686371928.152:126): avc: denied { write } for pid=3363 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 50.364783][ T3369] devtmpfs: Unknown parameter '' [ 50.369939][ T3370] devtmpfs: Unknown parameter '' [ 50.375173][ T3371] devtmpfs: Unknown parameter '' [ 50.524730][ T3372] devtmpfs: Unknown parameter '' 04:38:49 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001300)=[{{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c, &(0x7f00000005c0)=[{&(0x7f0000000040)="51f26f04f2f54c7439b3b713ec3391a7935705cb74655293984e224c4e679faaff8638eb72b943f65a5532e3d15eb926e87c5bd79a4c4a1fb79d3ebec992ec751350926f1954f74d6656068a8d1f441d7095fe97dcbca7fdf3d28c208fe898b5905fe38f", 0x64}, {&(0x7f00000000c0)="60853ddcb66f61f2263a5308b111dad7f89ddf54b159b7e89dacb73c7fa62656c19668a46392f5573100fe47cd5262bd63104721837b6b72f93e8cc617c5f7877e816d412b4f4640f14ceeb93e6014ce559dc3486c66e317a6ee6859cf7b65e8c8fc3206341c1018573dcf5d5be47def4c43ee6f5cc8647a05b5969e4befa248395de54c31d5f9af43b55f76f9a837ae3d8aea55cfdfc33d361b79e57d739558e2cafaaf08ff828b970971dbe6c4b1ae266c6ed01f1cc272a723fd73368b", 0xbe}, {&(0x7f0000000180)="8f943ead2f85f6fd0fbab2ba1eaa28c0a00f97da92f725f9b84a729c5c991141871784a8e54f9427101cd5f021609163b413ceb62835cfd35203a05e2081ee61e96d883414abf03a936d07e8dbe319c791edaa5b88a36efb1e56917e9f8ca387", 0x60}, {&(0x7f0000000a00)="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", 0x126}, {&(0x7f00000003c0)="cb5979a11ed9741cc4d07bba41c956777a2e2ccae9ab5b25bd19bd5e09b66d97c84839c06be742cfbc95a8d7435c8f6ac1aaaeb8bfbf8c9852651f8987c6c57dddef51a198969719680a118ce1b0d8b340d4dac3c85ae653a0355fbcca4856ba5c007e1e24e99ba1b1740dc7b7f5c19bb85ee09c3c489d83f7bb9547f537b5b78f44b50300b4bdb693ffffe33d6031adedc830cfb7c686bf2ec7a2376f828c5e470725fb2ac838eac1fa60ce47c97a8e241f4f3dbee51bbcf0762601ef6f00a6b4", 0xc1}, {&(0x7f00000004c0)="37aab43970ab3b5cea227b7526e5d4d300ef3bcfdb622110c1e955b09fa12fcd5b2200d043b8d57d2da6bd58f566e47994934139e78b427d5c61ff5f9e8f5a4108d3a51beeb8e95c92b165aa73857723cadf7a83b39f6272df3a82a1ea168bc6dc2a3272a966ff0cf330c7896db86a9951ce9b559d73bedda616af930a1fcb2fa720a9f921877acb79c2593384c5ca34bb5f2785c3c392b5fadcce2f45be73666750d941476b52a016117e2fdac77418fa9c9fa6bc69734ce78bb7d46db475a234020ee21399aaa67d133215852e1eea15", 0xd1}, {&(0x7f0000000200)="58bfed88829d985576d7b993172b1109", 0x10}], 0x7}}, {{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000680)="a7aa42a9560444e1cd45bcfbd4", 0xd}], 0x1}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f00000007c0)="2ed1b4b3f8242e216a83248cfd67e90e2f7cec553f7dd47e5154485d71885d11c275975a04c95c5683a946781387df003c6b5b3b6440b7a976f6797e1b6d3562c09b604833", 0x45}, {&(0x7f0000000840)="43900f05d7d0b780adf6a71b6a4bcf395a50d82a509b81eefe7eb23f23f07495372dfd0db45df9389b0487be735b111a4f80f269fbfada7c687fb30e6b14ee9c2dd1c7724bc3bf5dca369087e7f1e50b74", 0x51}, {&(0x7f00000008c0)="11347b92a012f3f4636d1d05d1be86ef1cc9132b3e579db6754c9567cbbbaedeea9d1e8736abe3d818107f4070", 0x2d}, {&(0x7f0000000900)="02c793478cef74edfd81029b1e2336b47c3140ad8eaf336baf56cd92bed6bad9b968df97bc60eb11ea49bf6d9d55b6df8715f6aa042132c989b2308bb8b15c0f01f23e5fe837658744351ffd5a10bc8d1d0d16ffe2add9ae9b9209cff942e6cd580901984a4b14550bbabde8c2fe9cf5c67614d5d00b8b17a832ba6bae1f46ab078996969eb702", 0x87}], 0x4}}], 0x3, 0x8001) sendmsg$inet6(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000280)="b6ad4a77883aa20844566e2d", 0xc}], 0x1}, 0x0) 04:38:49 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001300)=[{{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c, &(0x7f00000005c0)=[{&(0x7f0000000040)="51f26f04f2f54c7439b3b713ec3391a7935705cb74655293984e224c4e679faaff8638eb72b943f65a5532e3d15eb926e87c5bd79a4c4a1fb79d3ebec992ec751350926f1954f74d6656068a8d1f441d7095fe97dcbca7fdf3d28c208fe898b5905fe38f", 0x64}, {&(0x7f00000000c0)="60853ddcb66f61f2263a5308b111dad7f89ddf54b159b7e89dacb73c7fa62656c19668a46392f5573100fe47cd5262bd63104721837b6b72f93e8cc617c5f7877e816d412b4f4640f14ceeb93e6014ce559dc3486c66e317a6ee6859cf7b65e8c8fc3206341c1018573dcf5d5be47def4c43ee6f5cc8647a05b5969e4befa248395de54c31d5f9af43b55f76f9a837ae3d8aea55cfdfc33d361b79e57d739558e2cafaaf08ff828b970971dbe6c4b1ae266c6ed01f1cc272a723fd73368b", 0xbe}, {&(0x7f0000000180)="8f943ead2f85f6fd0fbab2ba1eaa28c0a00f97da92f725f9b84a729c5c991141871784a8e54f9427101cd5f021609163b413ceb62835cfd35203a05e2081ee61e96d883414abf03a936d07e8dbe319c791edaa5b88a36efb1e56917e9f8ca387", 0x60}, {&(0x7f0000000a00)="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", 0x126}, {&(0x7f00000003c0)="cb5979a11ed9741cc4d07bba41c956777a2e2ccae9ab5b25bd19bd5e09b66d97c84839c06be742cfbc95a8d7435c8f6ac1aaaeb8bfbf8c9852651f8987c6c57dddef51a198969719680a118ce1b0d8b340d4dac3c85ae653a0355fbcca4856ba5c007e1e24e99ba1b1740dc7b7f5c19bb85ee09c3c489d83f7bb9547f537b5b78f44b50300b4bdb693ffffe33d6031adedc830cfb7c686bf2ec7a2376f828c5e470725fb2ac838eac1fa60ce47c97a8e241f4f3dbee51bbcf0762601ef6f00a6b4", 0xc1}, {&(0x7f00000004c0)="37aab43970ab3b5cea227b7526e5d4d300ef3bcfdb622110c1e955b09fa12fcd5b2200d043b8d57d2da6bd58f566e47994934139e78b427d5c61ff5f9e8f5a4108d3a51beeb8e95c92b165aa73857723cadf7a83b39f6272df3a82a1ea168bc6dc2a3272a966ff0cf330c7896db86a9951ce9b559d73bedda616af930a1fcb2fa720a9f921877acb79c2593384c5ca34bb5f2785c3c392b5fadcce2f45be73666750d941476b52a016117e2fdac77418fa9c9fa6bc69734ce78bb7d46db475a234020ee21399aaa67d133215852e1eea15", 0xd1}, {&(0x7f0000000200)="58bfed88829d985576d7b993172b1109", 0x10}], 0x7}}, {{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000680)="a7aa42a9560444e1cd45bcfbd4", 0xd}], 0x1}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f00000007c0)="2ed1b4b3f8242e216a83248cfd67e90e2f7cec553f7dd47e5154485d71885d11c275975a04c95c5683a946781387df003c6b5b3b6440b7a976f6797e1b6d3562c09b604833", 0x45}, {&(0x7f0000000840)="43900f05d7d0b780adf6a71b6a4bcf395a50d82a509b81eefe7eb23f23f07495372dfd0db45df9389b0487be735b111a4f80f269fbfada7c687fb30e6b14ee9c2dd1c7724bc3bf5dca369087e7f1e50b74", 0x51}, {&(0x7f00000008c0)="11347b92a012f3f4636d1d05d1be86ef1cc9132b3e579db6754c9567cbbbaedeea9d1e8736abe3d818107f4070", 0x2d}, {&(0x7f0000000900)="02c793478cef74edfd81029b1e2336b47c3140ad8eaf336baf56cd92bed6bad9b968df97bc60eb11ea49bf6d9d55b6df8715f6aa042132c989b2308bb8b15c0f01f23e5fe837658744351ffd5a10bc8d1d0d16ffe2add9ae9b9209cff942e6cd580901984a4b14550bbabde8c2fe9cf5c67614d5d00b8b17a832ba6bae1f46ab078996969eb702", 0x87}], 0x4}}], 0x3, 0x8001) sendmsg$inet6(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000280)="b6ad4a77883aa20844566e2d", 0xc}], 0x1}, 0x0) 04:38:54 executing program 5: r0 = semget$private(0x0, 0x3, 0x0) syz_emit_ethernet(0x6e, &(0x7f0000000180)={@broadcast, @link_local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "00f7ff", 0x38, 0x3a, 0x0, @local, @mcast2, {[], @param_prob={0x4, 0x0, 0x0, 0x0, {0x0, 0x6, 'BNE', 0x0, 0x33, 0x0, @local, @mcast2, [@hopopts={0x33}]}}}}}}}, 0x0) semop(r0, &(0x7f0000000000)=[{0x0, 0x7f}, {}], 0x2) r1 = semget(0x3, 0x7, 0x84) syz_emit_ethernet(0x5e, &(0x7f0000000200)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, @val={@val={0x9100, 0x5, 0x1, 0x2}, {0x8100, 0x5, 0x1, 0x9}}, {@canfd={0xd, {{0x4, 0x0, 0x1, 0x1}, 0x2a, 0x2, 0x0, 0x0, "e80372277012b14546b8d1556b7c48089694c79943e29da9d61302cc012935751915a5b8f8c411591dcb04c36dfbfa422aec04ec38887087917d848daa48cbd2"}}}}, &(0x7f0000000280)={0x1, 0x3, [0xb4c, 0x143, 0x6ce, 0x43]}) semtimedop(r1, &(0x7f0000000080)=[{0x4, 0x3, 0x800}, {0x2, 0x55, 0x1000}, {0x4, 0x4}, {0x1, 0x4, 0x1800}, {0x2, 0x4, 0x1000}, {0x2, 0xf716}], 0x6, &(0x7f00000000c0)={0x77359400}) semop(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x1000}], 0x1) r2 = semget(0x2, 0x1, 0x4a0) semctl$IPC_RMID(r2, 0x0, 0x0) semop(r2, &(0x7f0000000040)=[{0x2, 0x7f, 0x800}, {0x3, 0x0, 0x1800}, {0x1, 0xfff0, 0x1800}, {0x2, 0x1f}, {0x3, 0x2, 0x800}], 0x5) r3 = semget$private(0x0, 0x3, 0x0) semop(r3, &(0x7f0000000000)=[{0x0, 0x7f}, {}], 0x2) semctl$IPC_SET(r3, 0x0, 0x1, &(0x7f00000000c0)={{0x0, 0xffffffffffffffff, 0x0, 0xee01}}) syz_emit_ethernet(0xe9, &(0x7f00000002c0)={@empty, @multicast, @val={@val={0x9100, 0x4, 0x0, 0x1}, {0x8100, 0x2, 0x1, 0x4}}, {@llc={0x4, {@llc={0x4e, 0x0, 'a ', "9384587d2d271d9d63d163f3f7abfbcc4243b24146afbe363554325724f12f2f6cce7c3535adb903ff113585a0794319f9916e9a2699b48cfc7a03b7adc3273ffa8055ef69fce9448202d98af0b566788009741743f759d0e8becd9ba0b2db5fdb68e81c82d5cb5bf22485a47a73a57218a3719a704df3e44b1c19626c5af1ecc7104b6cfeee91b133664a490a541f90fc84d15bc79dc0f237590581e052681596cd6bfd5f4543b40a19d32c2cb320bc2710606ae1b05428408c39ece699fab4e2615ecc282d5215c521885a427a11"}}}}}, &(0x7f0000000400)={0x1, 0x3, [0x282, 0xbf1, 0x7ac, 0x2ab]}) semtimedop(r3, &(0x7f0000000100)=[{0x3, 0x0, 0x1800}, {0x2, 0x9, 0x1000}], 0x2, &(0x7f0000000140)={0x0, 0x3938700}) 04:38:54 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001300)=[{{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c, &(0x7f00000005c0)=[{&(0x7f0000000040)="51f26f04f2f54c7439b3b713ec3391a7935705cb74655293984e224c4e679faaff8638eb72b943f65a5532e3d15eb926e87c5bd79a4c4a1fb79d3ebec992ec751350926f1954f74d6656068a8d1f441d7095fe97dcbca7fdf3d28c208fe898b5905fe38f", 0x64}, {&(0x7f00000000c0)="60853ddcb66f61f2263a5308b111dad7f89ddf54b159b7e89dacb73c7fa62656c19668a46392f5573100fe47cd5262bd63104721837b6b72f93e8cc617c5f7877e816d412b4f4640f14ceeb93e6014ce559dc3486c66e317a6ee6859cf7b65e8c8fc3206341c1018573dcf5d5be47def4c43ee6f5cc8647a05b5969e4befa248395de54c31d5f9af43b55f76f9a837ae3d8aea55cfdfc33d361b79e57d739558e2cafaaf08ff828b970971dbe6c4b1ae266c6ed01f1cc272a723fd73368b", 0xbe}, {&(0x7f0000000180)="8f943ead2f85f6fd0fbab2ba1eaa28c0a00f97da92f725f9b84a729c5c991141871784a8e54f9427101cd5f021609163b413ceb62835cfd35203a05e2081ee61e96d883414abf03a936d07e8dbe319c791edaa5b88a36efb1e56917e9f8ca387", 0x60}, {&(0x7f0000000a00)="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", 0x126}, {&(0x7f00000003c0)="cb5979a11ed9741cc4d07bba41c956777a2e2ccae9ab5b25bd19bd5e09b66d97c84839c06be742cfbc95a8d7435c8f6ac1aaaeb8bfbf8c9852651f8987c6c57dddef51a198969719680a118ce1b0d8b340d4dac3c85ae653a0355fbcca4856ba5c007e1e24e99ba1b1740dc7b7f5c19bb85ee09c3c489d83f7bb9547f537b5b78f44b50300b4bdb693ffffe33d6031adedc830cfb7c686bf2ec7a2376f828c5e470725fb2ac838eac1fa60ce47c97a8e241f4f3dbee51bbcf0762601ef6f00a6b4", 0xc1}, {&(0x7f00000004c0)="37aab43970ab3b5cea227b7526e5d4d300ef3bcfdb622110c1e955b09fa12fcd5b2200d043b8d57d2da6bd58f566e47994934139e78b427d5c61ff5f9e8f5a4108d3a51beeb8e95c92b165aa73857723cadf7a83b39f6272df3a82a1ea168bc6dc2a3272a966ff0cf330c7896db86a9951ce9b559d73bedda616af930a1fcb2fa720a9f921877acb79c2593384c5ca34bb5f2785c3c392b5fadcce2f45be73666750d941476b52a016117e2fdac77418fa9c9fa6bc69734ce78bb7d46db475a234020ee21399aaa67d133215852e1eea15", 0xd1}, {&(0x7f0000000200)="58bfed88829d985576d7b993172b1109", 0x10}], 0x7}}, {{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000680)="a7aa42a9560444e1cd45bcfbd4", 0xd}], 0x1}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f00000007c0)="2ed1b4b3f8242e216a83248cfd67e90e2f7cec553f7dd47e5154485d71885d11c275975a04c95c5683a946781387df003c6b5b3b6440b7a976f6797e1b6d3562c09b604833", 0x45}, {&(0x7f0000000840)="43900f05d7d0b780adf6a71b6a4bcf395a50d82a509b81eefe7eb23f23f07495372dfd0db45df9389b0487be735b111a4f80f269fbfada7c687fb30e6b14ee9c2dd1c7724bc3bf5dca369087e7f1e50b74", 0x51}, {&(0x7f00000008c0)="11347b92a012f3f4636d1d05d1be86ef1cc9132b3e579db6754c9567cbbbaedeea9d1e8736abe3d818107f4070", 0x2d}, {&(0x7f0000000900)="02c793478cef74edfd81029b1e2336b47c3140ad8eaf336baf56cd92bed6bad9b968df97bc60eb11ea49bf6d9d55b6df8715f6aa042132c989b2308bb8b15c0f01f23e5fe837658744351ffd5a10bc8d1d0d16ffe2add9ae9b9209cff942e6cd580901984a4b14550bbabde8c2fe9cf5c67614d5d00b8b17a832ba6bae1f46ab078996969eb702", 0x87}], 0x4}}], 0x3, 0x8001) sendmsg$inet6(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000280)="b6ad4a77883aa20844566e2d", 0xc}], 0x1}, 0x0) 04:38:54 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0xffffffffffffff27}}, 0x0) 04:38:54 executing program 2: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x100) r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x8002, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000340)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) sendmsg$inet(r1, &(0x7f0000000300)={&(0x7f0000000140)={0x2, 0x4001, @private=0xa010101}, 0x10, 0x0}, 0x4008001) ioctl$BTRFS_IOC_GET_FEATURES(0xffffffffffffffff, 0x80189439, &(0x7f0000000280)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x14e20}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = creat(0x0, 0x0) r6 = dup2(r5, r5) ioctl$BLKGETSIZE(r6, 0x40081271, &(0x7f0000003c00)) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='devtmpfs\x00', 0x4, &(0x7f0000000440)=',\x15\x00') sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = openat$cgroup(r7, &(0x7f0000000240)='syz1\x00', 0x200002, 0x0) r9 = openat$cgroup_int(r8, &(0x7f0000000a40)='memory.high\x00', 0x2, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000006680), 0x50200, 0x0) write$cgroup_int(r9, &(0x7f0000000140), 0x12) 04:38:54 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffec850000006d0000008500000008"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='rdma.current\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a80)={0x18, 0xa, &(0x7f00000004c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7f}, [@map_idx={0x18, 0x7, 0x5, 0x0, 0x10}, @cb_func={0x18, 0x9, 0x4, 0x0, 0x6}, @cb_func={0x18, 0x2, 0x4, 0x0, 0xfffffffffffffffd}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}]}, &(0x7f00000008c0)='syzkaller\x00', 0xbfe, 0xcb, &(0x7f0000000900)=""/203, 0x40f00, 0x13, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000a00)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000000a40)={0x4, 0xd, 0xb1, 0x1}, 0x10}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x20}, 0x48) r4 = openat$cgroup_ro(r2, &(0x7f00000003c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001580)={0x11, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1841000000000000ba"], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x1003, &(0x7f0000001a40)=""/4099, 0x41100, 0x0, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001500)={0x2, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000005c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4, r3, r4, r3, r2, 0xffffffffffffffff]}, 0x80) bpf$ITER_CREATE(0x21, &(0x7f0000000240), 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000019c0)={0x18, 0xd, &(0x7f0000000700)=ANY=[@ANYBLOB="180000000500000000000000000200009500000000000000184a0000fbffffff000000000000000018500000050000000000000000000000185900000200000000000000000000001761180010000000182a0000efad356868ed500603f59c3bbbfed90e3d64c8d53c0b", @ANYRES32=r3, @ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x62, &(0x7f0000001740)=""/98, 0x40f00, 0x14, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001880)={0x1, 0x1}, 0x8, 0x10, &(0x7f00000018c0)={0x4, 0x2, 0x81, 0x10000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001980)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, 0xffffffffffffffff, r2]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x14, 0x0, 0x0, 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0xf3, 0x3, 0x4, 0x40, 0x0, 0x200000000000000, 0xbc0a0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x848, 0x2, 0x3, 0x7, 0x8, 0x0, 0x7, 0x0, 0x1000000, 0x0, 0x80000001}, 0x0, 0x8, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r6, &(0x7f0000000000), 0x248800) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0xc, &(0x7f00000002c0)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffff8}, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @generic={0x9c, 0x4, 0x8, 0x2c, 0x20}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x1}, @generic={0x0, 0xe, 0xb, 0xbd5, 0x42}, @alu={0x7, 0x1, 0xd, 0xb, 0x0, 0x10, 0xfffffffffffffff0}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @generic={0x0, 0x7, 0x3, 0x101, 0x7ff}], &(0x7f0000000540)='syzkaller\x00', 0x3, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0x10, 0x0, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000640)=[r6, r7]}, 0x80) 04:38:54 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @remote}, 0x10) r2 = accept(r1, 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@mcast1, @in6=@dev={0xfe, 0x80, '\x00', 0x3e}, 0x4e22, 0x677e, 0x4e23, 0x0, 0xa, 0x0, 0x40, 0x1, 0x0, 0xffffffffffffffff}, {0x7, 0x401, 0x2, 0x180, 0x0, 0x7, 0x4, 0x101}, {0x8, 0xcdb4, 0xfffffffffffffffd, 0x83}, 0x0, 0x6e6bb4, 0x2, 0x1, 0x1, 0x3}, {{@in=@rand_addr=0x64010102, 0x4d2, 0xe6}, 0xa, @in6=@loopback, 0x3502, 0x0, 0x0, 0xf7, 0x8, 0x2, 0x4}}, 0xe8) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet6_int(r2, 0x29, 0x10, &(0x7f0000000100), &(0x7f0000000140)=0x4) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x8904, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, 0x0, 0x78) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000080)="da28ffce0776166ea5e6234e1b2f3efa", 0x10) ioctl$PIO_FONTX(r3, 0x8904, &(0x7f0000000000)={0x0, 0x0, 0x0}) getsockopt$sock_buf(r3, 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, 0x0, 0x0) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002340)='/sys/devices/system', 0x0, 0x0) ioctl$TUNSETGROUP(r4, 0x5451, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'erspan0\x00', &(0x7f0000000040)={'gre0\x00', 0x0, 0x8, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}}}}) dup(0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x8904, 0x0) openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 55.185672][ T25] audit: type=1400 audit(1686371934.352:127): avc: denied { open } for pid=3384 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 55.200214][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 55.205157][ T25] audit: type=1400 audit(1686371934.352:128): avc: denied { kernel } for pid=3384 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 55.242519][ T25] audit: type=1400 audit(1686371934.362:129): avc: denied { name_bind } for pid=3386 comm="syz-executor.4" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 55.264061][ T25] audit: type=1400 audit(1686371934.362:130): avc: denied { node_bind } for pid=3386 comm="syz-executor.4" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 55.284713][ T25] audit: type=1400 audit(1686371934.402:131): avc: denied { map_create } for pid=3384 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 55.288301][ C0] hrtimer: interrupt took 42238 ns [ 55.337194][ T3395] devtmpfs: Unknown parameter '' 04:38:54 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001300)=[{{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c, &(0x7f00000005c0)=[{&(0x7f0000000040)="51f26f04f2f54c7439b3b713ec3391a7935705cb74655293984e224c4e679faaff8638eb72b943f65a5532e3d15eb926e87c5bd79a4c4a1fb79d3ebec992ec751350926f1954f74d6656068a8d1f441d7095fe97dcbca7fdf3d28c208fe898b5905fe38f", 0x64}, {&(0x7f00000000c0)="60853ddcb66f61f2263a5308b111dad7f89ddf54b159b7e89dacb73c7fa62656c19668a46392f5573100fe47cd5262bd63104721837b6b72f93e8cc617c5f7877e816d412b4f4640f14ceeb93e6014ce559dc3486c66e317a6ee6859cf7b65e8c8fc3206341c1018573dcf5d5be47def4c43ee6f5cc8647a05b5969e4befa248395de54c31d5f9af43b55f76f9a837ae3d8aea55cfdfc33d361b79e57d739558e2cafaaf08ff828b970971dbe6c4b1ae266c6ed01f1cc272a723fd73368b", 0xbe}, {&(0x7f0000000180)="8f943ead2f85f6fd0fbab2ba1eaa28c0a00f97da92f725f9b84a729c5c991141871784a8e54f9427101cd5f021609163b413ceb62835cfd35203a05e2081ee61e96d883414abf03a936d07e8dbe319c791edaa5b88a36efb1e56917e9f8ca387", 0x60}, {&(0x7f0000000a00)="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", 0x126}, {&(0x7f00000003c0)="cb5979a11ed9741cc4d07bba41c956777a2e2ccae9ab5b25bd19bd5e09b66d97c84839c06be742cfbc95a8d7435c8f6ac1aaaeb8bfbf8c9852651f8987c6c57dddef51a198969719680a118ce1b0d8b340d4dac3c85ae653a0355fbcca4856ba5c007e1e24e99ba1b1740dc7b7f5c19bb85ee09c3c489d83f7bb9547f537b5b78f44b50300b4bdb693ffffe33d6031adedc830cfb7c686bf2ec7a2376f828c5e470725fb2ac838eac1fa60ce47c97a8e241f4f3dbee51bbcf0762601ef6f00a6b4", 0xc1}, {&(0x7f00000004c0)="37aab43970ab3b5cea227b7526e5d4d300ef3bcfdb622110c1e955b09fa12fcd5b2200d043b8d57d2da6bd58f566e47994934139e78b427d5c61ff5f9e8f5a4108d3a51beeb8e95c92b165aa73857723cadf7a83b39f6272df3a82a1ea168bc6dc2a3272a966ff0cf330c7896db86a9951ce9b559d73bedda616af930a1fcb2fa720a9f921877acb79c2593384c5ca34bb5f2785c3c392b5fadcce2f45be73666750d941476b52a016117e2fdac77418fa9c9fa6bc69734ce78bb7d46db475a234020ee21399aaa67d133215852e1eea15", 0xd1}, {&(0x7f0000000200)="58bfed88829d985576d7b993172b1109", 0x10}], 0x7}}, {{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000680)="a7aa42a9560444e1cd45bcfbd4", 0xd}], 0x1}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f00000007c0)="2ed1b4b3f8242e216a83248cfd67e90e2f7cec553f7dd47e5154485d71885d11c275975a04c95c5683a946781387df003c6b5b3b6440b7a976f6797e1b6d3562c09b604833", 0x45}, {&(0x7f0000000840)="43900f05d7d0b780adf6a71b6a4bcf395a50d82a509b81eefe7eb23f23f07495372dfd0db45df9389b0487be735b111a4f80f269fbfada7c687fb30e6b14ee9c2dd1c7724bc3bf5dca369087e7f1e50b74", 0x51}, {&(0x7f00000008c0)="11347b92a012f3f4636d1d05d1be86ef1cc9132b3e579db6754c9567cbbbaedeea9d1e8736abe3d818107f4070", 0x2d}, {&(0x7f0000000900)="02c793478cef74edfd81029b1e2336b47c3140ad8eaf336baf56cd92bed6bad9b968df97bc60eb11ea49bf6d9d55b6df8715f6aa042132c989b2308bb8b15c0f01f23e5fe837658744351ffd5a10bc8d1d0d16ffe2add9ae9b9209cff942e6cd580901984a4b14550bbabde8c2fe9cf5c67614d5d00b8b17a832ba6bae1f46ab078996969eb702", 0x87}], 0x4}}], 0x3, 0x8001) sendmsg$inet6(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000280)="b6ad4a77883aa20844566e2d", 0xc}], 0x1}, 0x0) 04:38:54 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001300)=[{{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c, &(0x7f00000005c0)=[{&(0x7f0000000040)="51f26f04f2f54c7439b3b713ec3391a7935705cb74655293984e224c4e679faaff8638eb72b943f65a5532e3d15eb926e87c5bd79a4c4a1fb79d3ebec992ec751350926f1954f74d6656068a8d1f441d7095fe97dcbca7fdf3d28c208fe898b5905fe38f", 0x64}, {&(0x7f00000000c0)="60853ddcb66f61f2263a5308b111dad7f89ddf54b159b7e89dacb73c7fa62656c19668a46392f5573100fe47cd5262bd63104721837b6b72f93e8cc617c5f7877e816d412b4f4640f14ceeb93e6014ce559dc3486c66e317a6ee6859cf7b65e8c8fc3206341c1018573dcf5d5be47def4c43ee6f5cc8647a05b5969e4befa248395de54c31d5f9af43b55f76f9a837ae3d8aea55cfdfc33d361b79e57d739558e2cafaaf08ff828b970971dbe6c4b1ae266c6ed01f1cc272a723fd73368b", 0xbe}, {&(0x7f0000000180)="8f943ead2f85f6fd0fbab2ba1eaa28c0a00f97da92f725f9b84a729c5c991141871784a8e54f9427101cd5f021609163b413ceb62835cfd35203a05e2081ee61e96d883414abf03a936d07e8dbe319c791edaa5b88a36efb1e56917e9f8ca387", 0x60}, {&(0x7f0000000a00)="cb1d40594736d81f6b7399db78b50a1ab7ff3f1fd4c213d1fc17c298c6c5448fa1ef10351dfa60ce9ed93512dc8b53a22bee899e603723c8e9f06248744b830504e2aaaa031f81d7f7cd2805380c107bd260c4c09d70908d397ee58d3cd6371adb823e762ac82def0c79353c4852d4af9cfc6fe5be3389cfbbe870e9fbe55b3c5357db9df6ed37aa9541ff3cb8bac644bd2f713cbfc6c36ac0cf99d7cd801a5e9d756a4b1015f9842eef705653247a65633adec516afeb2c9c52b1b0e48593414d84b23937b923bc37023f36d594afd6fba20eb3e6197f20c7e56dd4cb176b26bbeab9dc622a58ce14c3721586b00bb9d79cb46ba11e5d96d68a8a5dfa7577c6a77ca9e1f6f914256f0f41d1b392653a675258ec1a00ca54a19df778f190e03f907cdcc76285", 0x126}, {&(0x7f00000003c0)="cb5979a11ed9741cc4d07bba41c956777a2e2ccae9ab5b25bd19bd5e09b66d97c84839c06be742cfbc95a8d7435c8f6ac1aaaeb8bfbf8c9852651f8987c6c57dddef51a198969719680a118ce1b0d8b340d4dac3c85ae653a0355fbcca4856ba5c007e1e24e99ba1b1740dc7b7f5c19bb85ee09c3c489d83f7bb9547f537b5b78f44b50300b4bdb693ffffe33d6031adedc830cfb7c686bf2ec7a2376f828c5e470725fb2ac838eac1fa60ce47c97a8e241f4f3dbee51bbcf0762601ef6f00a6b4", 0xc1}, {&(0x7f00000004c0)="37aab43970ab3b5cea227b7526e5d4d300ef3bcfdb622110c1e955b09fa12fcd5b2200d043b8d57d2da6bd58f566e47994934139e78b427d5c61ff5f9e8f5a4108d3a51beeb8e95c92b165aa73857723cadf7a83b39f6272df3a82a1ea168bc6dc2a3272a966ff0cf330c7896db86a9951ce9b559d73bedda616af930a1fcb2fa720a9f921877acb79c2593384c5ca34bb5f2785c3c392b5fadcce2f45be73666750d941476b52a016117e2fdac77418fa9c9fa6bc69734ce78bb7d46db475a234020ee21399aaa67d133215852e1eea15", 0xd1}, {&(0x7f0000000200)="58bfed88829d985576d7b993172b1109", 0x10}], 0x7}}, {{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000680)="a7aa42a9560444e1cd45bcfbd4", 0xd}], 0x1}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f00000007c0)="2ed1b4b3f8242e216a83248cfd67e90e2f7cec553f7dd47e5154485d71885d11c275975a04c95c5683a946781387df003c6b5b3b6440b7a976f6797e1b6d3562c09b604833", 0x45}, {&(0x7f0000000840)="43900f05d7d0b780adf6a71b6a4bcf395a50d82a509b81eefe7eb23f23f07495372dfd0db45df9389b0487be735b111a4f80f269fbfada7c687fb30e6b14ee9c2dd1c7724bc3bf5dca369087e7f1e50b74", 0x51}, {&(0x7f00000008c0)="11347b92a012f3f4636d1d05d1be86ef1cc9132b3e579db6754c9567cbbbaedeea9d1e8736abe3d818107f4070", 0x2d}, {&(0x7f0000000900)="02c793478cef74edfd81029b1e2336b47c3140ad8eaf336baf56cd92bed6bad9b968df97bc60eb11ea49bf6d9d55b6df8715f6aa042132c989b2308bb8b15c0f01f23e5fe837658744351ffd5a10bc8d1d0d16ffe2add9ae9b9209cff942e6cd580901984a4b14550bbabde8c2fe9cf5c67614d5d00b8b17a832ba6bae1f46ab078996969eb702", 0x87}], 0x4}}], 0x3, 0x8001) sendmsg$inet6(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000280)="b6ad4a77883aa20844566e2d", 0xc}], 0x1}, 0x0) 04:38:54 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @remote}, 0x10) r2 = accept(r1, 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@mcast1, @in6=@dev={0xfe, 0x80, '\x00', 0x3e}, 0x4e22, 0x677e, 0x4e23, 0x0, 0xa, 0x0, 0x40, 0x1, 0x0, 0xffffffffffffffff}, {0x7, 0x401, 0x2, 0x180, 0x0, 0x7, 0x4, 0x101}, {0x8, 0xcdb4, 0xfffffffffffffffd, 0x83}, 0x0, 0x6e6bb4, 0x2, 0x1, 0x1, 0x3}, {{@in=@rand_addr=0x64010102, 0x4d2, 0xe6}, 0xa, @in6=@loopback, 0x3502, 0x0, 0x0, 0xf7, 0x8, 0x2, 0x4}}, 0xe8) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet6_int(r2, 0x29, 0x10, &(0x7f0000000100), &(0x7f0000000140)=0x4) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x8904, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, 0x0, 0x78) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000080)="da28ffce0776166ea5e6234e1b2f3efa", 0x10) ioctl$PIO_FONTX(r3, 0x8904, &(0x7f0000000000)={0x0, 0x0, 0x0}) getsockopt$sock_buf(r3, 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, 0x0, 0x0) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002340)='/sys/devices/system', 0x0, 0x0) ioctl$TUNSETGROUP(r4, 0x5451, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'erspan0\x00', &(0x7f0000000040)={'gre0\x00', 0x0, 0x8, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}}}}) dup(0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x8904, 0x0) openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:38:54 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @remote}, 0x10) r2 = accept(r1, 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@mcast1, @in6=@dev={0xfe, 0x80, '\x00', 0x3e}, 0x4e22, 0x677e, 0x4e23, 0x0, 0xa, 0x0, 0x40, 0x1, 0x0, 0xffffffffffffffff}, {0x7, 0x401, 0x2, 0x180, 0x0, 0x7, 0x4, 0x101}, {0x8, 0xcdb4, 0xfffffffffffffffd, 0x83}, 0x0, 0x6e6bb4, 0x2, 0x1, 0x1, 0x3}, {{@in=@rand_addr=0x64010102, 0x4d2, 0xe6}, 0xa, @in6=@loopback, 0x3502, 0x0, 0x0, 0xf7, 0x8, 0x2, 0x4}}, 0xe8) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet6_int(r2, 0x29, 0x10, &(0x7f0000000100), &(0x7f0000000140)=0x4) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x8904, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, 0x0, 0x78) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000080)="da28ffce0776166ea5e6234e1b2f3efa", 0x10) ioctl$PIO_FONTX(r3, 0x8904, &(0x7f0000000000)={0x0, 0x0, 0x0}) getsockopt$sock_buf(r3, 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, 0x0, 0x0) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002340)='/sys/devices/system', 0x0, 0x0) ioctl$TUNSETGROUP(r4, 0x5451, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'erspan0\x00', &(0x7f0000000040)={'gre0\x00', 0x0, 0x8, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}}}}) dup(0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x8904, 0x0) openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 55.511673][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. 04:38:54 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @remote}, 0x10) r2 = accept(r1, 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@mcast1, @in6=@dev={0xfe, 0x80, '\x00', 0x3e}, 0x4e22, 0x677e, 0x4e23, 0x0, 0xa, 0x0, 0x40, 0x1, 0x0, 0xffffffffffffffff}, {0x7, 0x401, 0x2, 0x180, 0x0, 0x7, 0x4, 0x101}, {0x8, 0xcdb4, 0xfffffffffffffffd, 0x83}, 0x0, 0x6e6bb4, 0x2, 0x1, 0x1, 0x3}, {{@in=@rand_addr=0x64010102, 0x4d2, 0xe6}, 0xa, @in6=@loopback, 0x3502, 0x0, 0x0, 0xf7, 0x8, 0x2, 0x4}}, 0xe8) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet6_int(r2, 0x29, 0x10, &(0x7f0000000100), &(0x7f0000000140)=0x4) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x8904, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, 0x0, 0x78) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000080)="da28ffce0776166ea5e6234e1b2f3efa", 0x10) ioctl$PIO_FONTX(r3, 0x8904, &(0x7f0000000000)={0x0, 0x0, 0x0}) getsockopt$sock_buf(r3, 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, 0x0, 0x0) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002340)='/sys/devices/system', 0x0, 0x0) ioctl$TUNSETGROUP(r4, 0x5451, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'erspan0\x00', &(0x7f0000000040)={'gre0\x00', 0x0, 0x8, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}}}}) dup(0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x8904, 0x0) openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 55.623302][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 55.633575][ T25] audit: type=1400 audit(1686371934.432:132): avc: denied { create } for pid=3384 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 04:38:54 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffec850000006d0000008500000008"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='rdma.current\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a80)={0x18, 0xa, &(0x7f00000004c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7f}, [@map_idx={0x18, 0x7, 0x5, 0x0, 0x10}, @cb_func={0x18, 0x9, 0x4, 0x0, 0x6}, @cb_func={0x18, 0x2, 0x4, 0x0, 0xfffffffffffffffd}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}]}, &(0x7f00000008c0)='syzkaller\x00', 0xbfe, 0xcb, &(0x7f0000000900)=""/203, 0x40f00, 0x13, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000a00)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000000a40)={0x4, 0xd, 0xb1, 0x1}, 0x10}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x20}, 0x48) r4 = openat$cgroup_ro(r2, &(0x7f00000003c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001580)={0x11, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1841000000000000ba"], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x1003, &(0x7f0000001a40)=""/4099, 0x41100, 0x0, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001500)={0x2, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000005c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4, r3, r4, r3, r2, 0xffffffffffffffff]}, 0x80) bpf$ITER_CREATE(0x21, &(0x7f0000000240), 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000019c0)={0x18, 0xd, &(0x7f0000000700)=ANY=[@ANYBLOB="180000000500000000000000000200009500000000000000184a0000fbffffff000000000000000018500000050000000000000000000000185900000200000000000000000000001761180010000000182a0000efad356868ed500603f59c3bbbfed90e3d64c8d53c0b", @ANYRES32=r3, @ANYBLOB="000000000609792aae009500000000000000b48a198aecf38a953f36f29dc82c3a4cf250071e2af84be2ec643aedfc0f4d2b5c21274cc79acffe59095f849b27b2bc41f2e1f783a7bafaed7bab43bd2cfbeae775896cd14abc28b10000000000000000000000000018877b7373f9980db834e1e196cedd5abc79f0d65d81c7cb40cfdfbb0eb0948b8be2c5c438d9502d421705953ebf48810411b14ba32999df9d456cf293d67032cfc4bf29cdd8e7042c23867f234cce3b9a4d6fa3429472352f3ee7d254776444adb59f7607a09ac3ce090738e39e2156e0f409f581960ec3ee7b296b861cd926d9b3c56621bd4695695e53c5d6cf70e73752d6f60ee598930819"], &(0x7f0000000000)='GPL\x00', 0x5, 0x62, &(0x7f0000001740)=""/98, 0x40f00, 0x14, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001880)={0x1, 0x1}, 0x8, 0x10, &(0x7f00000018c0)={0x4, 0x2, 0x81, 0x10000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001980)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, 0xffffffffffffffff, r2]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x14, 0x0, 0x0, 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0xf3, 0x3, 0x4, 0x40, 0x0, 0x200000000000000, 0xbc0a0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x848, 0x2, 0x3, 0x7, 0x8, 0x0, 0x7, 0x0, 0x1000000, 0x0, 0x80000001}, 0x0, 0x8, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r6, &(0x7f0000000000), 0x248800) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0xc, &(0x7f00000002c0)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffff8}, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @generic={0x9c, 0x4, 0x8, 0x2c, 0x20}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x1}, @generic={0x0, 0xe, 0xb, 0xbd5, 0x42}, @alu={0x7, 0x1, 0xd, 0xb, 0x0, 0x10, 0xfffffffffffffff0}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @generic={0x0, 0x7, 0x3, 0x101, 0x7ff}], &(0x7f0000000540)='syzkaller\x00', 0x3, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0x10, 0x0, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000640)=[r6, r7]}, 0x80) [ 55.653664][ T25] audit: type=1400 audit(1686371934.452:133): avc: denied { sys_admin } for pid=3384 comm="syz-executor.3" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 55.674963][ T25] audit: type=1400 audit(1686371934.582:134): avc: denied { write } for pid=3037 comm="syz-fuzzer" path="pipe:[15371]" dev="pipefs" ino=15371 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 55.702453][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. 04:38:55 executing program 5: r0 = semget$private(0x0, 0x3, 0x0) syz_emit_ethernet(0x6e, &(0x7f0000000180)={@broadcast, @link_local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "00f7ff", 0x38, 0x3a, 0x0, @local, @mcast2, {[], @param_prob={0x4, 0x0, 0x0, 0x0, {0x0, 0x6, 'BNE', 0x0, 0x33, 0x0, @local, @mcast2, [@hopopts={0x33}]}}}}}}}, 0x0) semop(r0, &(0x7f0000000000)=[{0x0, 0x7f}, {}], 0x2) r1 = semget(0x3, 0x7, 0x84) syz_emit_ethernet(0x5e, &(0x7f0000000200)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, @val={@val={0x9100, 0x5, 0x1, 0x2}, {0x8100, 0x5, 0x1, 0x9}}, {@canfd={0xd, {{0x4, 0x0, 0x1, 0x1}, 0x2a, 0x2, 0x0, 0x0, "e80372277012b14546b8d1556b7c48089694c79943e29da9d61302cc012935751915a5b8f8c411591dcb04c36dfbfa422aec04ec38887087917d848daa48cbd2"}}}}, &(0x7f0000000280)={0x1, 0x3, [0xb4c, 0x143, 0x6ce, 0x43]}) semtimedop(r1, &(0x7f0000000080)=[{0x4, 0x3, 0x800}, {0x2, 0x55, 0x1000}, {0x4, 0x4}, {0x1, 0x4, 0x1800}, {0x2, 0x4, 0x1000}, {0x2, 0xf716}], 0x6, &(0x7f00000000c0)={0x77359400}) semop(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x1000}], 0x1) r2 = semget(0x2, 0x1, 0x4a0) semctl$IPC_RMID(r2, 0x0, 0x0) semop(r2, &(0x7f0000000040)=[{0x2, 0x7f, 0x800}, {0x3, 0x0, 0x1800}, {0x1, 0xfff0, 0x1800}, {0x2, 0x1f}, {0x3, 0x2, 0x800}], 0x5) r3 = semget$private(0x0, 0x3, 0x0) semop(r3, &(0x7f0000000000)=[{0x0, 0x7f}, {}], 0x2) semctl$IPC_SET(r3, 0x0, 0x1, &(0x7f00000000c0)={{0x0, 0xffffffffffffffff, 0x0, 0xee01}}) syz_emit_ethernet(0xe9, &(0x7f00000002c0)={@empty, @multicast, @val={@val={0x9100, 0x4, 0x0, 0x1}, {0x8100, 0x2, 0x1, 0x4}}, {@llc={0x4, {@llc={0x4e, 0x0, 'a ', "9384587d2d271d9d63d163f3f7abfbcc4243b24146afbe363554325724f12f2f6cce7c3535adb903ff113585a0794319f9916e9a2699b48cfc7a03b7adc3273ffa8055ef69fce9448202d98af0b566788009741743f759d0e8becd9ba0b2db5fdb68e81c82d5cb5bf22485a47a73a57218a3719a704df3e44b1c19626c5af1ecc7104b6cfeee91b133664a490a541f90fc84d15bc79dc0f237590581e052681596cd6bfd5f4543b40a19d32c2cb320bc2710606ae1b05428408c39ece699fab4e2615ecc282d5215c521885a427a11"}}}}}, &(0x7f0000000400)={0x1, 0x3, [0x282, 0xbf1, 0x7ac, 0x2ab]}) semtimedop(r3, &(0x7f0000000100)=[{0x3, 0x0, 0x1800}, {0x2, 0x9, 0x1000}], 0x2, &(0x7f0000000140)={0x0, 0x3938700}) 04:38:55 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @remote}, 0x10) r2 = accept(r1, 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@mcast1, @in6=@dev={0xfe, 0x80, '\x00', 0x3e}, 0x4e22, 0x677e, 0x4e23, 0x0, 0xa, 0x0, 0x40, 0x1, 0x0, 0xffffffffffffffff}, {0x7, 0x401, 0x2, 0x180, 0x0, 0x7, 0x4, 0x101}, {0x8, 0xcdb4, 0xfffffffffffffffd, 0x83}, 0x0, 0x6e6bb4, 0x2, 0x1, 0x1, 0x3}, {{@in=@rand_addr=0x64010102, 0x4d2, 0xe6}, 0xa, @in6=@loopback, 0x3502, 0x0, 0x0, 0xf7, 0x8, 0x2, 0x4}}, 0xe8) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet6_int(r2, 0x29, 0x10, &(0x7f0000000100), &(0x7f0000000140)=0x4) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x8904, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, 0x0, 0x78) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000080)="da28ffce0776166ea5e6234e1b2f3efa", 0x10) ioctl$PIO_FONTX(r3, 0x8904, &(0x7f0000000000)={0x0, 0x0, 0x0}) getsockopt$sock_buf(r3, 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, 0x0, 0x0) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002340)='/sys/devices/system', 0x0, 0x0) ioctl$TUNSETGROUP(r4, 0x5451, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'erspan0\x00', &(0x7f0000000040)={'gre0\x00', 0x0, 0x8, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}}}}) dup(0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x8904, 0x0) openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 56.043942][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. 04:39:04 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0xffffffffffffff27}}, 0x0) 04:39:04 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @remote}, 0x10) r2 = accept(r1, 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@mcast1, @in6=@dev={0xfe, 0x80, '\x00', 0x3e}, 0x4e22, 0x677e, 0x4e23, 0x0, 0xa, 0x0, 0x40, 0x1, 0x0, 0xffffffffffffffff}, {0x7, 0x401, 0x2, 0x180, 0x0, 0x7, 0x4, 0x101}, {0x8, 0xcdb4, 0xfffffffffffffffd, 0x83}, 0x0, 0x6e6bb4, 0x2, 0x1, 0x1, 0x3}, {{@in=@rand_addr=0x64010102, 0x4d2, 0xe6}, 0xa, @in6=@loopback, 0x3502, 0x0, 0x0, 0xf7, 0x8, 0x2, 0x4}}, 0xe8) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet6_int(r2, 0x29, 0x10, &(0x7f0000000100), &(0x7f0000000140)=0x4) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x8904, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, 0x0, 0x78) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000080)="da28ffce0776166ea5e6234e1b2f3efa", 0x10) ioctl$PIO_FONTX(r3, 0x8904, &(0x7f0000000000)={0x0, 0x0, 0x0}) getsockopt$sock_buf(r3, 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, 0x0, 0x0) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002340)='/sys/devices/system', 0x0, 0x0) ioctl$TUNSETGROUP(r4, 0x5451, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'erspan0\x00', &(0x7f0000000040)={'gre0\x00', 0x0, 0x8, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}}}}) dup(0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x8904, 0x0) openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:39:04 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffec850000006d0000008500000008"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='rdma.current\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a80)={0x18, 0xa, &(0x7f00000004c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7f}, [@map_idx={0x18, 0x7, 0x5, 0x0, 0x10}, @cb_func={0x18, 0x9, 0x4, 0x0, 0x6}, @cb_func={0x18, 0x2, 0x4, 0x0, 0xfffffffffffffffd}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}]}, &(0x7f00000008c0)='syzkaller\x00', 0xbfe, 0xcb, &(0x7f0000000900)=""/203, 0x40f00, 0x13, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000a00)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000000a40)={0x4, 0xd, 0xb1, 0x1}, 0x10}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x20}, 0x48) r4 = openat$cgroup_ro(r2, &(0x7f00000003c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001580)={0x11, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1841000000000000ba"], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x1003, &(0x7f0000001a40)=""/4099, 0x41100, 0x0, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001500)={0x2, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000005c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4, r3, r4, r3, r2, 0xffffffffffffffff]}, 0x80) bpf$ITER_CREATE(0x21, &(0x7f0000000240), 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000019c0)={0x18, 0xd, &(0x7f0000000700)=ANY=[@ANYBLOB="180000000500000000000000000200009500000000000000184a0000fbffffff000000000000000018500000050000000000000000000000185900000200000000000000000000001761180010000000182a0000efad356868ed500603f59c3bbbfed90e3d64c8d53c0b", @ANYRES32=r3, @ANYBLOB="000000000609792aae009500000000000000b48a198aecf38a953f36f29dc82c3a4cf250071e2af84be2ec643aedfc0f4d2b5c21274cc79acffe59095f849b27b2bc41f2e1f783a7bafaed7bab43bd2cfbeae775896cd14abc28b10000000000000000000000000018877b7373f9980db834e1e196cedd5abc79f0d65d81c7cb40cfdfbb0eb0948b8be2c5c438d9502d421705953ebf48810411b14ba32999df9d456cf293d67032cfc4bf29cdd8e7042c23867f234cce3b9a4d6fa3429472352f3ee7d254776444adb59f7607a09ac3ce090738e39e2156e0f409f581960ec3ee7b296b861cd926d9b3c56621bd4695695e53c5d6cf70e73752d6f60ee598930819"], &(0x7f0000000000)='GPL\x00', 0x5, 0x62, &(0x7f0000001740)=""/98, 0x40f00, 0x14, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001880)={0x1, 0x1}, 0x8, 0x10, &(0x7f00000018c0)={0x4, 0x2, 0x81, 0x10000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001980)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, 0xffffffffffffffff, r2]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x14, 0x0, 0x0, 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0xf3, 0x3, 0x4, 0x40, 0x0, 0x200000000000000, 0xbc0a0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x848, 0x2, 0x3, 0x7, 0x8, 0x0, 0x7, 0x0, 0x1000000, 0x0, 0x80000001}, 0x0, 0x8, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r6, &(0x7f0000000000), 0x248800) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0xc, &(0x7f00000002c0)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffff8}, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @generic={0x9c, 0x4, 0x8, 0x2c, 0x20}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x1}, @generic={0x0, 0xe, 0xb, 0xbd5, 0x42}, @alu={0x7, 0x1, 0xd, 0xb, 0x0, 0x10, 0xfffffffffffffff0}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @generic={0x0, 0x7, 0x3, 0x101, 0x7ff}], &(0x7f0000000540)='syzkaller\x00', 0x3, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0x10, 0x0, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000640)=[r6, r7]}, 0x80) 04:39:04 executing program 2: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x100) r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x8002, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000340)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) sendmsg$inet(r1, &(0x7f0000000300)={&(0x7f0000000140)={0x2, 0x4001, @private=0xa010101}, 0x10, 0x0}, 0x4008001) ioctl$BTRFS_IOC_GET_FEATURES(0xffffffffffffffff, 0x80189439, &(0x7f0000000280)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x14e20}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = creat(0x0, 0x0) r6 = dup2(r5, r5) ioctl$BLKGETSIZE(r6, 0x40081271, &(0x7f0000003c00)) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='devtmpfs\x00', 0x4, &(0x7f0000000440)=',\x15\x00') sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = openat$cgroup(r7, &(0x7f0000000240)='syz1\x00', 0x200002, 0x0) r9 = openat$cgroup_int(r8, &(0x7f0000000a40)='memory.high\x00', 0x2, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000006680), 0x50200, 0x0) write$cgroup_int(r9, &(0x7f0000000140), 0x12) 04:39:04 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @remote}, 0x10) r2 = accept(r1, 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@mcast1, @in6=@dev={0xfe, 0x80, '\x00', 0x3e}, 0x4e22, 0x677e, 0x4e23, 0x0, 0xa, 0x0, 0x40, 0x1, 0x0, 0xffffffffffffffff}, {0x7, 0x401, 0x2, 0x180, 0x0, 0x7, 0x4, 0x101}, {0x8, 0xcdb4, 0xfffffffffffffffd, 0x83}, 0x0, 0x6e6bb4, 0x2, 0x1, 0x1, 0x3}, {{@in=@rand_addr=0x64010102, 0x4d2, 0xe6}, 0xa, @in6=@loopback, 0x3502, 0x0, 0x0, 0xf7, 0x8, 0x2, 0x4}}, 0xe8) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet6_int(r2, 0x29, 0x10, &(0x7f0000000100), &(0x7f0000000140)=0x4) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x8904, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, 0x0, 0x78) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000080)="da28ffce0776166ea5e6234e1b2f3efa", 0x10) ioctl$PIO_FONTX(r3, 0x8904, &(0x7f0000000000)={0x0, 0x0, 0x0}) getsockopt$sock_buf(r3, 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, 0x0, 0x0) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002340)='/sys/devices/system', 0x0, 0x0) ioctl$TUNSETGROUP(r4, 0x5451, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'erspan0\x00', &(0x7f0000000040)={'gre0\x00', 0x0, 0x8, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}}}}) dup(0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x8904, 0x0) openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:39:04 executing program 5: r0 = semget$private(0x0, 0x3, 0x0) syz_emit_ethernet(0x6e, &(0x7f0000000180)={@broadcast, @link_local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "00f7ff", 0x38, 0x3a, 0x0, @local, @mcast2, {[], @param_prob={0x4, 0x0, 0x0, 0x0, {0x0, 0x6, 'BNE', 0x0, 0x33, 0x0, @local, @mcast2, [@hopopts={0x33}]}}}}}}}, 0x0) semop(r0, &(0x7f0000000000)=[{0x0, 0x7f}, {}], 0x2) r1 = semget(0x3, 0x7, 0x84) syz_emit_ethernet(0x5e, &(0x7f0000000200)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, @val={@val={0x9100, 0x5, 0x1, 0x2}, {0x8100, 0x5, 0x1, 0x9}}, {@canfd={0xd, {{0x4, 0x0, 0x1, 0x1}, 0x2a, 0x2, 0x0, 0x0, "e80372277012b14546b8d1556b7c48089694c79943e29da9d61302cc012935751915a5b8f8c411591dcb04c36dfbfa422aec04ec38887087917d848daa48cbd2"}}}}, &(0x7f0000000280)={0x1, 0x3, [0xb4c, 0x143, 0x6ce, 0x43]}) semtimedop(r1, &(0x7f0000000080)=[{0x4, 0x3, 0x800}, {0x2, 0x55, 0x1000}, {0x4, 0x4}, {0x1, 0x4, 0x1800}, {0x2, 0x4, 0x1000}, {0x2, 0xf716}], 0x6, &(0x7f00000000c0)={0x77359400}) semop(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x1000}], 0x1) r2 = semget(0x2, 0x1, 0x4a0) semctl$IPC_RMID(r2, 0x0, 0x0) semop(r2, &(0x7f0000000040)=[{0x2, 0x7f, 0x800}, {0x3, 0x0, 0x1800}, {0x1, 0xfff0, 0x1800}, {0x2, 0x1f}, {0x3, 0x2, 0x800}], 0x5) r3 = semget$private(0x0, 0x3, 0x0) semop(r3, &(0x7f0000000000)=[{0x0, 0x7f}, {}], 0x2) semctl$IPC_SET(r3, 0x0, 0x1, &(0x7f00000000c0)={{0x0, 0xffffffffffffffff, 0x0, 0xee01}}) syz_emit_ethernet(0xe9, &(0x7f00000002c0)={@empty, @multicast, @val={@val={0x9100, 0x4, 0x0, 0x1}, {0x8100, 0x2, 0x1, 0x4}}, {@llc={0x4, {@llc={0x4e, 0x0, 'a ', "9384587d2d271d9d63d163f3f7abfbcc4243b24146afbe363554325724f12f2f6cce7c3535adb903ff113585a0794319f9916e9a2699b48cfc7a03b7adc3273ffa8055ef69fce9448202d98af0b566788009741743f759d0e8becd9ba0b2db5fdb68e81c82d5cb5bf22485a47a73a57218a3719a704df3e44b1c19626c5af1ecc7104b6cfeee91b133664a490a541f90fc84d15bc79dc0f237590581e052681596cd6bfd5f4543b40a19d32c2cb320bc2710606ae1b05428408c39ece699fab4e2615ecc282d5215c521885a427a11"}}}}}, &(0x7f0000000400)={0x1, 0x3, [0x282, 0xbf1, 0x7ac, 0x2ab]}) semtimedop(r3, &(0x7f0000000100)=[{0x3, 0x0, 0x1800}, {0x2, 0x9, 0x1000}], 0x2, &(0x7f0000000140)={0x0, 0x3938700}) 04:39:04 executing program 0: r0 = semget$private(0x0, 0x3, 0x0) syz_emit_ethernet(0x6e, &(0x7f0000000180)={@broadcast, @link_local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "00f7ff", 0x38, 0x3a, 0x0, @local, @mcast2, {[], @param_prob={0x4, 0x0, 0x0, 0x0, {0x0, 0x6, 'BNE', 0x0, 0x33, 0x0, @local, @mcast2, [@hopopts={0x33}]}}}}}}}, 0x0) semop(r0, &(0x7f0000000000)=[{0x0, 0x7f}, {}], 0x2) r1 = semget(0x3, 0x7, 0x84) syz_emit_ethernet(0x5e, &(0x7f0000000200)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, @val={@val={0x9100, 0x5, 0x1, 0x2}, {0x8100, 0x5, 0x1, 0x9}}, {@canfd={0xd, {{0x4, 0x0, 0x1, 0x1}, 0x2a, 0x2, 0x0, 0x0, "e80372277012b14546b8d1556b7c48089694c79943e29da9d61302cc012935751915a5b8f8c411591dcb04c36dfbfa422aec04ec38887087917d848daa48cbd2"}}}}, &(0x7f0000000280)={0x1, 0x3, [0xb4c, 0x143, 0x6ce, 0x43]}) semtimedop(r1, &(0x7f0000000080)=[{0x4, 0x3, 0x800}, {0x2, 0x55, 0x1000}, {0x4, 0x4}, {0x1, 0x4, 0x1800}, {0x2, 0x4, 0x1000}, {0x2, 0xf716}], 0x6, &(0x7f00000000c0)={0x77359400}) semop(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x1000}], 0x1) r2 = semget(0x2, 0x1, 0x4a0) semctl$IPC_RMID(r2, 0x0, 0x0) semop(r2, &(0x7f0000000040)=[{0x2, 0x7f, 0x800}, {0x3, 0x0, 0x1800}, {0x1, 0xfff0, 0x1800}, {0x2, 0x1f}, {0x3, 0x2, 0x800}], 0x5) r3 = semget$private(0x0, 0x3, 0x0) semop(r3, &(0x7f0000000000)=[{0x0, 0x7f}, {}], 0x2) semctl$IPC_SET(r3, 0x0, 0x1, &(0x7f00000000c0)={{0x0, 0xffffffffffffffff, 0x0, 0xee01}}) syz_emit_ethernet(0xe9, &(0x7f00000002c0)={@empty, @multicast, @val={@val={0x9100, 0x4, 0x0, 0x1}, {0x8100, 0x2, 0x1, 0x4}}, {@llc={0x4, {@llc={0x4e, 0x0, 'a ', "9384587d2d271d9d63d163f3f7abfbcc4243b24146afbe363554325724f12f2f6cce7c3535adb903ff113585a0794319f9916e9a2699b48cfc7a03b7adc3273ffa8055ef69fce9448202d98af0b566788009741743f759d0e8becd9ba0b2db5fdb68e81c82d5cb5bf22485a47a73a57218a3719a704df3e44b1c19626c5af1ecc7104b6cfeee91b133664a490a541f90fc84d15bc79dc0f237590581e052681596cd6bfd5f4543b40a19d32c2cb320bc2710606ae1b05428408c39ece699fab4e2615ecc282d5215c521885a427a11"}}}}}, &(0x7f0000000400)={0x1, 0x3, [0x282, 0xbf1, 0x7ac, 0x2ab]}) semtimedop(r3, &(0x7f0000000100)=[{0x3, 0x0, 0x1800}, {0x2, 0x9, 0x1000}], 0x2, &(0x7f0000000140)={0x0, 0x3938700}) 04:39:04 executing program 4: r0 = semget$private(0x0, 0x3, 0x0) syz_emit_ethernet(0x6e, &(0x7f0000000180)={@broadcast, @link_local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "00f7ff", 0x38, 0x3a, 0x0, @local, @mcast2, {[], @param_prob={0x4, 0x0, 0x0, 0x0, {0x0, 0x6, 'BNE', 0x0, 0x33, 0x0, @local, @mcast2, [@hopopts={0x33}]}}}}}}}, 0x0) semop(r0, &(0x7f0000000000)=[{0x0, 0x7f}, {}], 0x2) r1 = semget(0x3, 0x7, 0x84) syz_emit_ethernet(0x5e, &(0x7f0000000200)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, @val={@val={0x9100, 0x5, 0x1, 0x2}, {0x8100, 0x5, 0x1, 0x9}}, {@canfd={0xd, {{0x4, 0x0, 0x1, 0x1}, 0x2a, 0x2, 0x0, 0x0, "e80372277012b14546b8d1556b7c48089694c79943e29da9d61302cc012935751915a5b8f8c411591dcb04c36dfbfa422aec04ec38887087917d848daa48cbd2"}}}}, &(0x7f0000000280)={0x1, 0x3, [0xb4c, 0x143, 0x6ce, 0x43]}) semtimedop(r1, &(0x7f0000000080)=[{0x4, 0x3, 0x800}, {0x2, 0x55, 0x1000}, {0x4, 0x4}, {0x1, 0x4, 0x1800}, {0x2, 0x4, 0x1000}, {0x2, 0xf716}], 0x6, &(0x7f00000000c0)={0x77359400}) semop(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x1000}], 0x1) r2 = semget(0x2, 0x1, 0x4a0) semctl$IPC_RMID(r2, 0x0, 0x0) semop(r2, &(0x7f0000000040)=[{0x2, 0x7f, 0x800}, {0x3, 0x0, 0x1800}, {0x1, 0xfff0, 0x1800}, {0x2, 0x1f}, {0x3, 0x2, 0x800}], 0x5) r3 = semget$private(0x0, 0x3, 0x0) semop(r3, &(0x7f0000000000)=[{0x0, 0x7f}, {}], 0x2) semctl$IPC_SET(r3, 0x0, 0x1, &(0x7f00000000c0)={{0x0, 0xffffffffffffffff, 0x0, 0xee01}}) syz_emit_ethernet(0xe9, &(0x7f00000002c0)={@empty, @multicast, @val={@val={0x9100, 0x4, 0x0, 0x1}, {0x8100, 0x2, 0x1, 0x4}}, {@llc={0x4, {@llc={0x4e, 0x0, 'a ', "9384587d2d271d9d63d163f3f7abfbcc4243b24146afbe363554325724f12f2f6cce7c3535adb903ff113585a0794319f9916e9a2699b48cfc7a03b7adc3273ffa8055ef69fce9448202d98af0b566788009741743f759d0e8becd9ba0b2db5fdb68e81c82d5cb5bf22485a47a73a57218a3719a704df3e44b1c19626c5af1ecc7104b6cfeee91b133664a490a541f90fc84d15bc79dc0f237590581e052681596cd6bfd5f4543b40a19d32c2cb320bc2710606ae1b05428408c39ece699fab4e2615ecc282d5215c521885a427a11"}}}}}, &(0x7f0000000400)={0x1, 0x3, [0x282, 0xbf1, 0x7ac, 0x2ab]}) semtimedop(r3, &(0x7f0000000100)=[{0x3, 0x0, 0x1800}, {0x2, 0x9, 0x1000}], 0x2, &(0x7f0000000140)={0x0, 0x3938700}) [ 65.582707][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 65.593226][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 65.695422][ T3439] devtmpfs: Unknown parameter '' 04:39:05 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffec850000006d0000008500000008"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='rdma.current\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a80)={0x18, 0xa, &(0x7f00000004c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7f}, [@map_idx={0x18, 0x7, 0x5, 0x0, 0x10}, @cb_func={0x18, 0x9, 0x4, 0x0, 0x6}, @cb_func={0x18, 0x2, 0x4, 0x0, 0xfffffffffffffffd}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}]}, &(0x7f00000008c0)='syzkaller\x00', 0xbfe, 0xcb, &(0x7f0000000900)=""/203, 0x40f00, 0x13, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000a00)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000000a40)={0x4, 0xd, 0xb1, 0x1}, 0x10}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x20}, 0x48) r4 = openat$cgroup_ro(r2, &(0x7f00000003c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001580)={0x11, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1841000000000000ba"], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x1003, &(0x7f0000001a40)=""/4099, 0x41100, 0x0, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001500)={0x2, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000005c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4, r3, r4, r3, r2, 0xffffffffffffffff]}, 0x80) bpf$ITER_CREATE(0x21, &(0x7f0000000240), 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000019c0)={0x18, 0xd, &(0x7f0000000700)=ANY=[@ANYBLOB="180000000500000000000000000200009500000000000000184a0000fbffffff000000000000000018500000050000000000000000000000185900000200000000000000000000001761180010000000182a0000efad356868ed500603f59c3bbbfed90e3d64c8d53c0b", @ANYRES32=r3, @ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x62, &(0x7f0000001740)=""/98, 0x40f00, 0x14, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001880)={0x1, 0x1}, 0x8, 0x10, &(0x7f00000018c0)={0x4, 0x2, 0x81, 0x10000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001980)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, 0xffffffffffffffff, r2]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x14, 0x0, 0x0, 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0xf3, 0x3, 0x4, 0x40, 0x0, 0x200000000000000, 0xbc0a0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x848, 0x2, 0x3, 0x7, 0x8, 0x0, 0x7, 0x0, 0x1000000, 0x0, 0x80000001}, 0x0, 0x8, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r6, &(0x7f0000000000), 0x248800) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0xc, &(0x7f00000002c0)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffff8}, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @generic={0x9c, 0x4, 0x8, 0x2c, 0x20}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x1}, @generic={0x0, 0xe, 0xb, 0xbd5, 0x42}, @alu={0x7, 0x1, 0xd, 0xb, 0x0, 0x10, 0xfffffffffffffff0}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @generic={0x0, 0x7, 0x3, 0x101, 0x7ff}], &(0x7f0000000540)='syzkaller\x00', 0x3, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0x10, 0x0, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000640)=[r6, r7]}, 0x80) 04:39:05 executing program 3: r0 = semget$private(0x0, 0x3, 0x0) syz_emit_ethernet(0x6e, &(0x7f0000000180)={@broadcast, @link_local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "00f7ff", 0x38, 0x3a, 0x0, @local, @mcast2, {[], @param_prob={0x4, 0x0, 0x0, 0x0, {0x0, 0x6, 'BNE', 0x0, 0x33, 0x0, @local, @mcast2, [@hopopts={0x33}]}}}}}}}, 0x0) semop(r0, &(0x7f0000000000)=[{0x0, 0x7f}, {}], 0x2) r1 = semget(0x3, 0x7, 0x84) syz_emit_ethernet(0x5e, &(0x7f0000000200)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, @val={@val={0x9100, 0x5, 0x1, 0x2}, {0x8100, 0x5, 0x1, 0x9}}, {@canfd={0xd, {{0x4, 0x0, 0x1, 0x1}, 0x2a, 0x2, 0x0, 0x0, "e80372277012b14546b8d1556b7c48089694c79943e29da9d61302cc012935751915a5b8f8c411591dcb04c36dfbfa422aec04ec38887087917d848daa48cbd2"}}}}, &(0x7f0000000280)={0x1, 0x3, [0xb4c, 0x143, 0x6ce, 0x43]}) semtimedop(r1, &(0x7f0000000080)=[{0x4, 0x3, 0x800}, {0x2, 0x55, 0x1000}, {0x4, 0x4}, {0x1, 0x4, 0x1800}, {0x2, 0x4, 0x1000}, {0x2, 0xf716}], 0x6, &(0x7f00000000c0)={0x77359400}) semop(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x1000}], 0x1) r2 = semget(0x2, 0x1, 0x4a0) semctl$IPC_RMID(r2, 0x0, 0x0) semop(r2, &(0x7f0000000040)=[{0x2, 0x7f, 0x800}, {0x3, 0x0, 0x1800}, {0x1, 0xfff0, 0x1800}, {0x2, 0x1f}, {0x3, 0x2, 0x800}], 0x5) r3 = semget$private(0x0, 0x3, 0x0) semop(r3, &(0x7f0000000000)=[{0x0, 0x7f}, {}], 0x2) semctl$IPC_SET(r3, 0x0, 0x1, &(0x7f00000000c0)={{0x0, 0xffffffffffffffff, 0x0, 0xee01}}) syz_emit_ethernet(0xe9, &(0x7f00000002c0)={@empty, @multicast, @val={@val={0x9100, 0x4, 0x0, 0x1}, {0x8100, 0x2, 0x1, 0x4}}, {@llc={0x4, {@llc={0x4e, 0x0, 'a ', "9384587d2d271d9d63d163f3f7abfbcc4243b24146afbe363554325724f12f2f6cce7c3535adb903ff113585a0794319f9916e9a2699b48cfc7a03b7adc3273ffa8055ef69fce9448202d98af0b566788009741743f759d0e8becd9ba0b2db5fdb68e81c82d5cb5bf22485a47a73a57218a3719a704df3e44b1c19626c5af1ecc7104b6cfeee91b133664a490a541f90fc84d15bc79dc0f237590581e052681596cd6bfd5f4543b40a19d32c2cb320bc2710606ae1b05428408c39ece699fab4e2615ecc282d5215c521885a427a11"}}}}}, &(0x7f0000000400)={0x1, 0x3, [0x282, 0xbf1, 0x7ac, 0x2ab]}) semtimedop(r3, &(0x7f0000000100)=[{0x3, 0x0, 0x1800}, {0x2, 0x9, 0x1000}], 0x2, &(0x7f0000000140)={0x0, 0x3938700}) 04:39:05 executing program 5: r0 = semget$private(0x0, 0x3, 0x0) syz_emit_ethernet(0x6e, &(0x7f0000000180)={@broadcast, @link_local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "00f7ff", 0x38, 0x3a, 0x0, @local, @mcast2, {[], @param_prob={0x4, 0x0, 0x0, 0x0, {0x0, 0x6, 'BNE', 0x0, 0x33, 0x0, @local, @mcast2, [@hopopts={0x33}]}}}}}}}, 0x0) semop(r0, &(0x7f0000000000)=[{0x0, 0x7f}, {}], 0x2) r1 = semget(0x3, 0x7, 0x84) syz_emit_ethernet(0x5e, &(0x7f0000000200)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, @val={@val={0x9100, 0x5, 0x1, 0x2}, {0x8100, 0x5, 0x1, 0x9}}, {@canfd={0xd, {{0x4, 0x0, 0x1, 0x1}, 0x2a, 0x2, 0x0, 0x0, "e80372277012b14546b8d1556b7c48089694c79943e29da9d61302cc012935751915a5b8f8c411591dcb04c36dfbfa422aec04ec38887087917d848daa48cbd2"}}}}, &(0x7f0000000280)={0x1, 0x3, [0xb4c, 0x143, 0x6ce, 0x43]}) semtimedop(r1, &(0x7f0000000080)=[{0x4, 0x3, 0x800}, {0x2, 0x55, 0x1000}, {0x4, 0x4}, {0x1, 0x4, 0x1800}, {0x2, 0x4, 0x1000}, {0x2, 0xf716}], 0x6, &(0x7f00000000c0)={0x77359400}) semop(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x1000}], 0x1) r2 = semget(0x2, 0x1, 0x4a0) semctl$IPC_RMID(r2, 0x0, 0x0) semop(r2, &(0x7f0000000040)=[{0x2, 0x7f, 0x800}, {0x3, 0x0, 0x1800}, {0x1, 0xfff0, 0x1800}, {0x2, 0x1f}, {0x3, 0x2, 0x800}], 0x5) r3 = semget$private(0x0, 0x3, 0x0) semop(r3, &(0x7f0000000000)=[{0x0, 0x7f}, {}], 0x2) semctl$IPC_SET(r3, 0x0, 0x1, &(0x7f00000000c0)={{0x0, 0xffffffffffffffff, 0x0, 0xee01}}) syz_emit_ethernet(0xe9, &(0x7f00000002c0)={@empty, @multicast, @val={@val={0x9100, 0x4, 0x0, 0x1}, {0x8100, 0x2, 0x1, 0x4}}, {@llc={0x4, {@llc={0x4e, 0x0, 'a ', "9384587d2d271d9d63d163f3f7abfbcc4243b24146afbe363554325724f12f2f6cce7c3535adb903ff113585a0794319f9916e9a2699b48cfc7a03b7adc3273ffa8055ef69fce9448202d98af0b566788009741743f759d0e8becd9ba0b2db5fdb68e81c82d5cb5bf22485a47a73a57218a3719a704df3e44b1c19626c5af1ecc7104b6cfeee91b133664a490a541f90fc84d15bc79dc0f237590581e052681596cd6bfd5f4543b40a19d32c2cb320bc2710606ae1b05428408c39ece699fab4e2615ecc282d5215c521885a427a11"}}}}}, &(0x7f0000000400)={0x1, 0x3, [0x282, 0xbf1, 0x7ac, 0x2ab]}) semtimedop(r3, &(0x7f0000000100)=[{0x3, 0x0, 0x1800}, {0x2, 0x9, 0x1000}], 0x2, &(0x7f0000000140)={0x0, 0x3938700}) 04:39:05 executing program 2: r0 = semget$private(0x0, 0x3, 0x0) syz_emit_ethernet(0x6e, &(0x7f0000000180)={@broadcast, @link_local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "00f7ff", 0x38, 0x3a, 0x0, @local, @mcast2, {[], @param_prob={0x4, 0x0, 0x0, 0x0, {0x0, 0x6, 'BNE', 0x0, 0x33, 0x0, @local, @mcast2, [@hopopts={0x33}]}}}}}}}, 0x0) semop(r0, &(0x7f0000000000)=[{0x0, 0x7f}, {}], 0x2) r1 = semget(0x3, 0x7, 0x84) syz_emit_ethernet(0x5e, &(0x7f0000000200)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, @val={@val={0x9100, 0x5, 0x1, 0x2}, {0x8100, 0x5, 0x1, 0x9}}, {@canfd={0xd, {{0x4, 0x0, 0x1, 0x1}, 0x2a, 0x2, 0x0, 0x0, "e80372277012b14546b8d1556b7c48089694c79943e29da9d61302cc012935751915a5b8f8c411591dcb04c36dfbfa422aec04ec38887087917d848daa48cbd2"}}}}, &(0x7f0000000280)={0x1, 0x3, [0xb4c, 0x143, 0x6ce, 0x43]}) semtimedop(r1, &(0x7f0000000080)=[{0x4, 0x3, 0x800}, {0x2, 0x55, 0x1000}, {0x4, 0x4}, {0x1, 0x4, 0x1800}, {0x2, 0x4, 0x1000}, {0x2, 0xf716}], 0x6, &(0x7f00000000c0)={0x77359400}) semop(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x1000}], 0x1) r2 = semget(0x2, 0x1, 0x4a0) semctl$IPC_RMID(r2, 0x0, 0x0) semop(r2, &(0x7f0000000040)=[{0x2, 0x7f, 0x800}, {0x3, 0x0, 0x1800}, {0x1, 0xfff0, 0x1800}, {0x2, 0x1f}, {0x3, 0x2, 0x800}], 0x5) r3 = semget$private(0x0, 0x3, 0x0) semop(r3, &(0x7f0000000000)=[{0x0, 0x7f}, {}], 0x2) semctl$IPC_SET(r3, 0x0, 0x1, &(0x7f00000000c0)={{0x0, 0xffffffffffffffff, 0x0, 0xee01}}) syz_emit_ethernet(0xe9, &(0x7f00000002c0)={@empty, @multicast, @val={@val={0x9100, 0x4, 0x0, 0x1}, {0x8100, 0x2, 0x1, 0x4}}, {@llc={0x4, {@llc={0x4e, 0x0, 'a ', "9384587d2d271d9d63d163f3f7abfbcc4243b24146afbe363554325724f12f2f6cce7c3535adb903ff113585a0794319f9916e9a2699b48cfc7a03b7adc3273ffa8055ef69fce9448202d98af0b566788009741743f759d0e8becd9ba0b2db5fdb68e81c82d5cb5bf22485a47a73a57218a3719a704df3e44b1c19626c5af1ecc7104b6cfeee91b133664a490a541f90fc84d15bc79dc0f237590581e052681596cd6bfd5f4543b40a19d32c2cb320bc2710606ae1b05428408c39ece699fab4e2615ecc282d5215c521885a427a11"}}}}}, &(0x7f0000000400)={0x1, 0x3, [0x282, 0xbf1, 0x7ac, 0x2ab]}) semtimedop(r3, &(0x7f0000000100)=[{0x3, 0x0, 0x1800}, {0x2, 0x9, 0x1000}], 0x2, &(0x7f0000000140)={0x0, 0x3938700}) 04:39:13 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0xffffffffffffff27}}, 0x0) 04:39:13 executing program 0: r0 = semget$private(0x0, 0x3, 0x0) syz_emit_ethernet(0x6e, &(0x7f0000000180)={@broadcast, @link_local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "00f7ff", 0x38, 0x3a, 0x0, @local, @mcast2, {[], @param_prob={0x4, 0x0, 0x0, 0x0, {0x0, 0x6, 'BNE', 0x0, 0x33, 0x0, @local, @mcast2, [@hopopts={0x33}]}}}}}}}, 0x0) semop(r0, &(0x7f0000000000)=[{0x0, 0x7f}, {}], 0x2) r1 = semget(0x3, 0x7, 0x84) syz_emit_ethernet(0x5e, &(0x7f0000000200)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, @val={@val={0x9100, 0x5, 0x1, 0x2}, {0x8100, 0x5, 0x1, 0x9}}, {@canfd={0xd, {{0x4, 0x0, 0x1, 0x1}, 0x2a, 0x2, 0x0, 0x0, "e80372277012b14546b8d1556b7c48089694c79943e29da9d61302cc012935751915a5b8f8c411591dcb04c36dfbfa422aec04ec38887087917d848daa48cbd2"}}}}, &(0x7f0000000280)={0x1, 0x3, [0xb4c, 0x143, 0x6ce, 0x43]}) semtimedop(r1, &(0x7f0000000080)=[{0x4, 0x3, 0x800}, {0x2, 0x55, 0x1000}, {0x4, 0x4}, {0x1, 0x4, 0x1800}, {0x2, 0x4, 0x1000}, {0x2, 0xf716}], 0x6, &(0x7f00000000c0)={0x77359400}) semop(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x1000}], 0x1) r2 = semget(0x2, 0x1, 0x4a0) semctl$IPC_RMID(r2, 0x0, 0x0) semop(r2, &(0x7f0000000040)=[{0x2, 0x7f, 0x800}, {0x3, 0x0, 0x1800}, {0x1, 0xfff0, 0x1800}, {0x2, 0x1f}, {0x3, 0x2, 0x800}], 0x5) r3 = semget$private(0x0, 0x3, 0x0) semop(r3, &(0x7f0000000000)=[{0x0, 0x7f}, {}], 0x2) semctl$IPC_SET(r3, 0x0, 0x1, &(0x7f00000000c0)={{0x0, 0xffffffffffffffff, 0x0, 0xee01}}) syz_emit_ethernet(0xe9, &(0x7f00000002c0)={@empty, @multicast, @val={@val={0x9100, 0x4, 0x0, 0x1}, {0x8100, 0x2, 0x1, 0x4}}, {@llc={0x4, {@llc={0x4e, 0x0, 'a ', "9384587d2d271d9d63d163f3f7abfbcc4243b24146afbe363554325724f12f2f6cce7c3535adb903ff113585a0794319f9916e9a2699b48cfc7a03b7adc3273ffa8055ef69fce9448202d98af0b566788009741743f759d0e8becd9ba0b2db5fdb68e81c82d5cb5bf22485a47a73a57218a3719a704df3e44b1c19626c5af1ecc7104b6cfeee91b133664a490a541f90fc84d15bc79dc0f237590581e052681596cd6bfd5f4543b40a19d32c2cb320bc2710606ae1b05428408c39ece699fab4e2615ecc282d5215c521885a427a11"}}}}}, &(0x7f0000000400)={0x1, 0x3, [0x282, 0xbf1, 0x7ac, 0x2ab]}) semtimedop(r3, &(0x7f0000000100)=[{0x3, 0x0, 0x1800}, {0x2, 0x9, 0x1000}], 0x2, &(0x7f0000000140)={0x0, 0x3938700}) 04:39:13 executing program 4: r0 = semget$private(0x0, 0x3, 0x0) syz_emit_ethernet(0x6e, &(0x7f0000000180)={@broadcast, @link_local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "00f7ff", 0x38, 0x3a, 0x0, @local, @mcast2, {[], @param_prob={0x4, 0x0, 0x0, 0x0, {0x0, 0x6, 'BNE', 0x0, 0x33, 0x0, @local, @mcast2, [@hopopts={0x33}]}}}}}}}, 0x0) semop(r0, &(0x7f0000000000)=[{0x0, 0x7f}, {}], 0x2) r1 = semget(0x3, 0x7, 0x84) syz_emit_ethernet(0x5e, &(0x7f0000000200)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, @val={@val={0x9100, 0x5, 0x1, 0x2}, {0x8100, 0x5, 0x1, 0x9}}, {@canfd={0xd, {{0x4, 0x0, 0x1, 0x1}, 0x2a, 0x2, 0x0, 0x0, "e80372277012b14546b8d1556b7c48089694c79943e29da9d61302cc012935751915a5b8f8c411591dcb04c36dfbfa422aec04ec38887087917d848daa48cbd2"}}}}, &(0x7f0000000280)={0x1, 0x3, [0xb4c, 0x143, 0x6ce, 0x43]}) semtimedop(r1, &(0x7f0000000080)=[{0x4, 0x3, 0x800}, {0x2, 0x55, 0x1000}, {0x4, 0x4}, {0x1, 0x4, 0x1800}, {0x2, 0x4, 0x1000}, {0x2, 0xf716}], 0x6, &(0x7f00000000c0)={0x77359400}) semop(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x1000}], 0x1) r2 = semget(0x2, 0x1, 0x4a0) semctl$IPC_RMID(r2, 0x0, 0x0) semop(r2, &(0x7f0000000040)=[{0x2, 0x7f, 0x800}, {0x3, 0x0, 0x1800}, {0x1, 0xfff0, 0x1800}, {0x2, 0x1f}, {0x3, 0x2, 0x800}], 0x5) r3 = semget$private(0x0, 0x3, 0x0) semop(r3, &(0x7f0000000000)=[{0x0, 0x7f}, {}], 0x2) semctl$IPC_SET(r3, 0x0, 0x1, &(0x7f00000000c0)={{0x0, 0xffffffffffffffff, 0x0, 0xee01}}) syz_emit_ethernet(0xe9, &(0x7f00000002c0)={@empty, @multicast, @val={@val={0x9100, 0x4, 0x0, 0x1}, {0x8100, 0x2, 0x1, 0x4}}, {@llc={0x4, {@llc={0x4e, 0x0, 'a ', "9384587d2d271d9d63d163f3f7abfbcc4243b24146afbe363554325724f12f2f6cce7c3535adb903ff113585a0794319f9916e9a2699b48cfc7a03b7adc3273ffa8055ef69fce9448202d98af0b566788009741743f759d0e8becd9ba0b2db5fdb68e81c82d5cb5bf22485a47a73a57218a3719a704df3e44b1c19626c5af1ecc7104b6cfeee91b133664a490a541f90fc84d15bc79dc0f237590581e052681596cd6bfd5f4543b40a19d32c2cb320bc2710606ae1b05428408c39ece699fab4e2615ecc282d5215c521885a427a11"}}}}}, &(0x7f0000000400)={0x1, 0x3, [0x282, 0xbf1, 0x7ac, 0x2ab]}) semtimedop(r3, &(0x7f0000000100)=[{0x3, 0x0, 0x1800}, {0x2, 0x9, 0x1000}], 0x2, &(0x7f0000000140)={0x0, 0x3938700}) 04:39:13 executing program 3: r0 = semget$private(0x0, 0x3, 0x0) syz_emit_ethernet(0x6e, &(0x7f0000000180)={@broadcast, @link_local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "00f7ff", 0x38, 0x3a, 0x0, @local, @mcast2, {[], @param_prob={0x4, 0x0, 0x0, 0x0, {0x0, 0x6, 'BNE', 0x0, 0x33, 0x0, @local, @mcast2, [@hopopts={0x33}]}}}}}}}, 0x0) semop(r0, &(0x7f0000000000)=[{0x0, 0x7f}, {}], 0x2) r1 = semget(0x3, 0x7, 0x84) syz_emit_ethernet(0x5e, &(0x7f0000000200)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, @val={@val={0x9100, 0x5, 0x1, 0x2}, {0x8100, 0x5, 0x1, 0x9}}, {@canfd={0xd, {{0x4, 0x0, 0x1, 0x1}, 0x2a, 0x2, 0x0, 0x0, "e80372277012b14546b8d1556b7c48089694c79943e29da9d61302cc012935751915a5b8f8c411591dcb04c36dfbfa422aec04ec38887087917d848daa48cbd2"}}}}, &(0x7f0000000280)={0x1, 0x3, [0xb4c, 0x143, 0x6ce, 0x43]}) semtimedop(r1, &(0x7f0000000080)=[{0x4, 0x3, 0x800}, {0x2, 0x55, 0x1000}, {0x4, 0x4}, {0x1, 0x4, 0x1800}, {0x2, 0x4, 0x1000}, {0x2, 0xf716}], 0x6, &(0x7f00000000c0)={0x77359400}) semop(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x1000}], 0x1) r2 = semget(0x2, 0x1, 0x4a0) semctl$IPC_RMID(r2, 0x0, 0x0) semop(r2, &(0x7f0000000040)=[{0x2, 0x7f, 0x800}, {0x3, 0x0, 0x1800}, {0x1, 0xfff0, 0x1800}, {0x2, 0x1f}, {0x3, 0x2, 0x800}], 0x5) r3 = semget$private(0x0, 0x3, 0x0) semop(r3, &(0x7f0000000000)=[{0x0, 0x7f}, {}], 0x2) semctl$IPC_SET(r3, 0x0, 0x1, &(0x7f00000000c0)={{0x0, 0xffffffffffffffff, 0x0, 0xee01}}) syz_emit_ethernet(0xe9, &(0x7f00000002c0)={@empty, @multicast, @val={@val={0x9100, 0x4, 0x0, 0x1}, {0x8100, 0x2, 0x1, 0x4}}, {@llc={0x4, {@llc={0x4e, 0x0, 'a ', "9384587d2d271d9d63d163f3f7abfbcc4243b24146afbe363554325724f12f2f6cce7c3535adb903ff113585a0794319f9916e9a2699b48cfc7a03b7adc3273ffa8055ef69fce9448202d98af0b566788009741743f759d0e8becd9ba0b2db5fdb68e81c82d5cb5bf22485a47a73a57218a3719a704df3e44b1c19626c5af1ecc7104b6cfeee91b133664a490a541f90fc84d15bc79dc0f237590581e052681596cd6bfd5f4543b40a19d32c2cb320bc2710606ae1b05428408c39ece699fab4e2615ecc282d5215c521885a427a11"}}}}}, &(0x7f0000000400)={0x1, 0x3, [0x282, 0xbf1, 0x7ac, 0x2ab]}) semtimedop(r3, &(0x7f0000000100)=[{0x3, 0x0, 0x1800}, {0x2, 0x9, 0x1000}], 0x2, &(0x7f0000000140)={0x0, 0x3938700}) 04:39:13 executing program 2: r0 = semget$private(0x0, 0x3, 0x0) syz_emit_ethernet(0x6e, &(0x7f0000000180)={@broadcast, @link_local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "00f7ff", 0x38, 0x3a, 0x0, @local, @mcast2, {[], @param_prob={0x4, 0x0, 0x0, 0x0, {0x0, 0x6, 'BNE', 0x0, 0x33, 0x0, @local, @mcast2, [@hopopts={0x33}]}}}}}}}, 0x0) semop(r0, &(0x7f0000000000)=[{0x0, 0x7f}, {}], 0x2) r1 = semget(0x3, 0x7, 0x84) syz_emit_ethernet(0x5e, &(0x7f0000000200)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, @val={@val={0x9100, 0x5, 0x1, 0x2}, {0x8100, 0x5, 0x1, 0x9}}, {@canfd={0xd, {{0x4, 0x0, 0x1, 0x1}, 0x2a, 0x2, 0x0, 0x0, "e80372277012b14546b8d1556b7c48089694c79943e29da9d61302cc012935751915a5b8f8c411591dcb04c36dfbfa422aec04ec38887087917d848daa48cbd2"}}}}, &(0x7f0000000280)={0x1, 0x3, [0xb4c, 0x143, 0x6ce, 0x43]}) semtimedop(r1, &(0x7f0000000080)=[{0x4, 0x3, 0x800}, {0x2, 0x55, 0x1000}, {0x4, 0x4}, {0x1, 0x4, 0x1800}, {0x2, 0x4, 0x1000}, {0x2, 0xf716}], 0x6, &(0x7f00000000c0)={0x77359400}) semop(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x1000}], 0x1) r2 = semget(0x2, 0x1, 0x4a0) semctl$IPC_RMID(r2, 0x0, 0x0) semop(r2, &(0x7f0000000040)=[{0x2, 0x7f, 0x800}, {0x3, 0x0, 0x1800}, {0x1, 0xfff0, 0x1800}, {0x2, 0x1f}, {0x3, 0x2, 0x800}], 0x5) r3 = semget$private(0x0, 0x3, 0x0) semop(r3, &(0x7f0000000000)=[{0x0, 0x7f}, {}], 0x2) semctl$IPC_SET(r3, 0x0, 0x1, &(0x7f00000000c0)={{0x0, 0xffffffffffffffff, 0x0, 0xee01}}) syz_emit_ethernet(0xe9, &(0x7f00000002c0)={@empty, @multicast, @val={@val={0x9100, 0x4, 0x0, 0x1}, {0x8100, 0x2, 0x1, 0x4}}, {@llc={0x4, {@llc={0x4e, 0x0, 'a ', "9384587d2d271d9d63d163f3f7abfbcc4243b24146afbe363554325724f12f2f6cce7c3535adb903ff113585a0794319f9916e9a2699b48cfc7a03b7adc3273ffa8055ef69fce9448202d98af0b566788009741743f759d0e8becd9ba0b2db5fdb68e81c82d5cb5bf22485a47a73a57218a3719a704df3e44b1c19626c5af1ecc7104b6cfeee91b133664a490a541f90fc84d15bc79dc0f237590581e052681596cd6bfd5f4543b40a19d32c2cb320bc2710606ae1b05428408c39ece699fab4e2615ecc282d5215c521885a427a11"}}}}}, &(0x7f0000000400)={0x1, 0x3, [0x282, 0xbf1, 0x7ac, 0x2ab]}) semtimedop(r3, &(0x7f0000000100)=[{0x3, 0x0, 0x1800}, {0x2, 0x9, 0x1000}], 0x2, &(0x7f0000000140)={0x0, 0x3938700}) 04:39:13 executing program 5: r0 = semget$private(0x0, 0x3, 0x0) syz_emit_ethernet(0x6e, &(0x7f0000000180)={@broadcast, @link_local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "00f7ff", 0x38, 0x3a, 0x0, @local, @mcast2, {[], @param_prob={0x4, 0x0, 0x0, 0x0, {0x0, 0x6, 'BNE', 0x0, 0x33, 0x0, @local, @mcast2, [@hopopts={0x33}]}}}}}}}, 0x0) semop(r0, &(0x7f0000000000)=[{0x0, 0x7f}, {}], 0x2) r1 = semget(0x3, 0x7, 0x84) syz_emit_ethernet(0x5e, &(0x7f0000000200)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, @val={@val={0x9100, 0x5, 0x1, 0x2}, {0x8100, 0x5, 0x1, 0x9}}, {@canfd={0xd, {{0x4, 0x0, 0x1, 0x1}, 0x2a, 0x2, 0x0, 0x0, "e80372277012b14546b8d1556b7c48089694c79943e29da9d61302cc012935751915a5b8f8c411591dcb04c36dfbfa422aec04ec38887087917d848daa48cbd2"}}}}, &(0x7f0000000280)={0x1, 0x3, [0xb4c, 0x143, 0x6ce, 0x43]}) semtimedop(r1, &(0x7f0000000080)=[{0x4, 0x3, 0x800}, {0x2, 0x55, 0x1000}, {0x4, 0x4}, {0x1, 0x4, 0x1800}, {0x2, 0x4, 0x1000}, {0x2, 0xf716}], 0x6, &(0x7f00000000c0)={0x77359400}) semop(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x1000}], 0x1) r2 = semget(0x2, 0x1, 0x4a0) semctl$IPC_RMID(r2, 0x0, 0x0) semop(r2, &(0x7f0000000040)=[{0x2, 0x7f, 0x800}, {0x3, 0x0, 0x1800}, {0x1, 0xfff0, 0x1800}, {0x2, 0x1f}, {0x3, 0x2, 0x800}], 0x5) r3 = semget$private(0x0, 0x3, 0x0) semop(r3, &(0x7f0000000000)=[{0x0, 0x7f}, {}], 0x2) semctl$IPC_SET(r3, 0x0, 0x1, &(0x7f00000000c0)={{0x0, 0xffffffffffffffff, 0x0, 0xee01}}) syz_emit_ethernet(0xe9, &(0x7f00000002c0)={@empty, @multicast, @val={@val={0x9100, 0x4, 0x0, 0x1}, {0x8100, 0x2, 0x1, 0x4}}, {@llc={0x4, {@llc={0x4e, 0x0, 'a ', "9384587d2d271d9d63d163f3f7abfbcc4243b24146afbe363554325724f12f2f6cce7c3535adb903ff113585a0794319f9916e9a2699b48cfc7a03b7adc3273ffa8055ef69fce9448202d98af0b566788009741743f759d0e8becd9ba0b2db5fdb68e81c82d5cb5bf22485a47a73a57218a3719a704df3e44b1c19626c5af1ecc7104b6cfeee91b133664a490a541f90fc84d15bc79dc0f237590581e052681596cd6bfd5f4543b40a19d32c2cb320bc2710606ae1b05428408c39ece699fab4e2615ecc282d5215c521885a427a11"}}}}}, &(0x7f0000000400)={0x1, 0x3, [0x282, 0xbf1, 0x7ac, 0x2ab]}) semtimedop(r3, &(0x7f0000000100)=[{0x3, 0x0, 0x1800}, {0x2, 0x9, 0x1000}], 0x2, &(0x7f0000000140)={0x0, 0x3938700}) 04:39:13 executing program 3: r0 = semget$private(0x0, 0x3, 0x0) syz_emit_ethernet(0x6e, &(0x7f0000000180)={@broadcast, @link_local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "00f7ff", 0x38, 0x3a, 0x0, @local, @mcast2, {[], @param_prob={0x4, 0x0, 0x0, 0x0, {0x0, 0x6, 'BNE', 0x0, 0x33, 0x0, @local, @mcast2, [@hopopts={0x33}]}}}}}}}, 0x0) semop(r0, &(0x7f0000000000)=[{0x0, 0x7f}, {}], 0x2) r1 = semget(0x3, 0x7, 0x84) syz_emit_ethernet(0x5e, &(0x7f0000000200)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, @val={@val={0x9100, 0x5, 0x1, 0x2}, {0x8100, 0x5, 0x1, 0x9}}, {@canfd={0xd, {{0x4, 0x0, 0x1, 0x1}, 0x2a, 0x2, 0x0, 0x0, "e80372277012b14546b8d1556b7c48089694c79943e29da9d61302cc012935751915a5b8f8c411591dcb04c36dfbfa422aec04ec38887087917d848daa48cbd2"}}}}, &(0x7f0000000280)={0x1, 0x3, [0xb4c, 0x143, 0x6ce, 0x43]}) semtimedop(r1, &(0x7f0000000080)=[{0x4, 0x3, 0x800}, {0x2, 0x55, 0x1000}, {0x4, 0x4}, {0x1, 0x4, 0x1800}, {0x2, 0x4, 0x1000}, {0x2, 0xf716}], 0x6, &(0x7f00000000c0)={0x77359400}) semop(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x1000}], 0x1) r2 = semget(0x2, 0x1, 0x4a0) semctl$IPC_RMID(r2, 0x0, 0x0) semop(r2, &(0x7f0000000040)=[{0x2, 0x7f, 0x800}, {0x3, 0x0, 0x1800}, {0x1, 0xfff0, 0x1800}, {0x2, 0x1f}, {0x3, 0x2, 0x800}], 0x5) r3 = semget$private(0x0, 0x3, 0x0) semop(r3, &(0x7f0000000000)=[{0x0, 0x7f}, {}], 0x2) semctl$IPC_SET(r3, 0x0, 0x1, &(0x7f00000000c0)={{0x0, 0xffffffffffffffff, 0x0, 0xee01}}) syz_emit_ethernet(0xe9, &(0x7f00000002c0)={@empty, @multicast, @val={@val={0x9100, 0x4, 0x0, 0x1}, {0x8100, 0x2, 0x1, 0x4}}, {@llc={0x4, {@llc={0x4e, 0x0, 'a ', "9384587d2d271d9d63d163f3f7abfbcc4243b24146afbe363554325724f12f2f6cce7c3535adb903ff113585a0794319f9916e9a2699b48cfc7a03b7adc3273ffa8055ef69fce9448202d98af0b566788009741743f759d0e8becd9ba0b2db5fdb68e81c82d5cb5bf22485a47a73a57218a3719a704df3e44b1c19626c5af1ecc7104b6cfeee91b133664a490a541f90fc84d15bc79dc0f237590581e052681596cd6bfd5f4543b40a19d32c2cb320bc2710606ae1b05428408c39ece699fab4e2615ecc282d5215c521885a427a11"}}}}}, &(0x7f0000000400)={0x1, 0x3, [0x282, 0xbf1, 0x7ac, 0x2ab]}) semtimedop(r3, &(0x7f0000000100)=[{0x3, 0x0, 0x1800}, {0x2, 0x9, 0x1000}], 0x2, &(0x7f0000000140)={0x0, 0x3938700}) 04:39:13 executing program 4: r0 = semget$private(0x0, 0x3, 0x0) syz_emit_ethernet(0x6e, &(0x7f0000000180)={@broadcast, @link_local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "00f7ff", 0x38, 0x3a, 0x0, @local, @mcast2, {[], @param_prob={0x4, 0x0, 0x0, 0x0, {0x0, 0x6, 'BNE', 0x0, 0x33, 0x0, @local, @mcast2, [@hopopts={0x33}]}}}}}}}, 0x0) semop(r0, &(0x7f0000000000)=[{0x0, 0x7f}, {}], 0x2) r1 = semget(0x3, 0x7, 0x84) syz_emit_ethernet(0x5e, &(0x7f0000000200)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, @val={@val={0x9100, 0x5, 0x1, 0x2}, {0x8100, 0x5, 0x1, 0x9}}, {@canfd={0xd, {{0x4, 0x0, 0x1, 0x1}, 0x2a, 0x2, 0x0, 0x0, "e80372277012b14546b8d1556b7c48089694c79943e29da9d61302cc012935751915a5b8f8c411591dcb04c36dfbfa422aec04ec38887087917d848daa48cbd2"}}}}, &(0x7f0000000280)={0x1, 0x3, [0xb4c, 0x143, 0x6ce, 0x43]}) semtimedop(r1, &(0x7f0000000080)=[{0x4, 0x3, 0x800}, {0x2, 0x55, 0x1000}, {0x4, 0x4}, {0x1, 0x4, 0x1800}, {0x2, 0x4, 0x1000}, {0x2, 0xf716}], 0x6, &(0x7f00000000c0)={0x77359400}) semop(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x1000}], 0x1) r2 = semget(0x2, 0x1, 0x4a0) semctl$IPC_RMID(r2, 0x0, 0x0) semop(r2, &(0x7f0000000040)=[{0x2, 0x7f, 0x800}, {0x3, 0x0, 0x1800}, {0x1, 0xfff0, 0x1800}, {0x2, 0x1f}, {0x3, 0x2, 0x800}], 0x5) r3 = semget$private(0x0, 0x3, 0x0) semop(r3, &(0x7f0000000000)=[{0x0, 0x7f}, {}], 0x2) semctl$IPC_SET(r3, 0x0, 0x1, &(0x7f00000000c0)={{0x0, 0xffffffffffffffff, 0x0, 0xee01}}) syz_emit_ethernet(0xe9, &(0x7f00000002c0)={@empty, @multicast, @val={@val={0x9100, 0x4, 0x0, 0x1}, {0x8100, 0x2, 0x1, 0x4}}, {@llc={0x4, {@llc={0x4e, 0x0, 'a ', "9384587d2d271d9d63d163f3f7abfbcc4243b24146afbe363554325724f12f2f6cce7c3535adb903ff113585a0794319f9916e9a2699b48cfc7a03b7adc3273ffa8055ef69fce9448202d98af0b566788009741743f759d0e8becd9ba0b2db5fdb68e81c82d5cb5bf22485a47a73a57218a3719a704df3e44b1c19626c5af1ecc7104b6cfeee91b133664a490a541f90fc84d15bc79dc0f237590581e052681596cd6bfd5f4543b40a19d32c2cb320bc2710606ae1b05428408c39ece699fab4e2615ecc282d5215c521885a427a11"}}}}}, &(0x7f0000000400)={0x1, 0x3, [0x282, 0xbf1, 0x7ac, 0x2ab]}) semtimedop(r3, &(0x7f0000000100)=[{0x3, 0x0, 0x1800}, {0x2, 0x9, 0x1000}], 0x2, &(0x7f0000000140)={0x0, 0x3938700}) 04:39:13 executing program 2: r0 = semget$private(0x0, 0x3, 0x0) syz_emit_ethernet(0x6e, &(0x7f0000000180)={@broadcast, @link_local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "00f7ff", 0x38, 0x3a, 0x0, @local, @mcast2, {[], @param_prob={0x4, 0x0, 0x0, 0x0, {0x0, 0x6, 'BNE', 0x0, 0x33, 0x0, @local, @mcast2, [@hopopts={0x33}]}}}}}}}, 0x0) semop(r0, &(0x7f0000000000)=[{0x0, 0x7f}, {}], 0x2) r1 = semget(0x3, 0x7, 0x84) syz_emit_ethernet(0x5e, &(0x7f0000000200)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, @val={@val={0x9100, 0x5, 0x1, 0x2}, {0x8100, 0x5, 0x1, 0x9}}, {@canfd={0xd, {{0x4, 0x0, 0x1, 0x1}, 0x2a, 0x2, 0x0, 0x0, "e80372277012b14546b8d1556b7c48089694c79943e29da9d61302cc012935751915a5b8f8c411591dcb04c36dfbfa422aec04ec38887087917d848daa48cbd2"}}}}, &(0x7f0000000280)={0x1, 0x3, [0xb4c, 0x143, 0x6ce, 0x43]}) semtimedop(r1, &(0x7f0000000080)=[{0x4, 0x3, 0x800}, {0x2, 0x55, 0x1000}, {0x4, 0x4}, {0x1, 0x4, 0x1800}, {0x2, 0x4, 0x1000}, {0x2, 0xf716}], 0x6, &(0x7f00000000c0)={0x77359400}) semop(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x1000}], 0x1) r2 = semget(0x2, 0x1, 0x4a0) semctl$IPC_RMID(r2, 0x0, 0x0) semop(r2, &(0x7f0000000040)=[{0x2, 0x7f, 0x800}, {0x3, 0x0, 0x1800}, {0x1, 0xfff0, 0x1800}, {0x2, 0x1f}, {0x3, 0x2, 0x800}], 0x5) r3 = semget$private(0x0, 0x3, 0x0) semop(r3, &(0x7f0000000000)=[{0x0, 0x7f}, {}], 0x2) semctl$IPC_SET(r3, 0x0, 0x1, &(0x7f00000000c0)={{0x0, 0xffffffffffffffff, 0x0, 0xee01}}) syz_emit_ethernet(0xe9, &(0x7f00000002c0)={@empty, @multicast, @val={@val={0x9100, 0x4, 0x0, 0x1}, {0x8100, 0x2, 0x1, 0x4}}, {@llc={0x4, {@llc={0x4e, 0x0, 'a ', "9384587d2d271d9d63d163f3f7abfbcc4243b24146afbe363554325724f12f2f6cce7c3535adb903ff113585a0794319f9916e9a2699b48cfc7a03b7adc3273ffa8055ef69fce9448202d98af0b566788009741743f759d0e8becd9ba0b2db5fdb68e81c82d5cb5bf22485a47a73a57218a3719a704df3e44b1c19626c5af1ecc7104b6cfeee91b133664a490a541f90fc84d15bc79dc0f237590581e052681596cd6bfd5f4543b40a19d32c2cb320bc2710606ae1b05428408c39ece699fab4e2615ecc282d5215c521885a427a11"}}}}}, &(0x7f0000000400)={0x1, 0x3, [0x282, 0xbf1, 0x7ac, 0x2ab]}) semtimedop(r3, &(0x7f0000000100)=[{0x3, 0x0, 0x1800}, {0x2, 0x9, 0x1000}], 0x2, &(0x7f0000000140)={0x0, 0x3938700}) 04:39:13 executing program 0: r0 = semget$private(0x0, 0x3, 0x0) syz_emit_ethernet(0x6e, &(0x7f0000000180)={@broadcast, @link_local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "00f7ff", 0x38, 0x3a, 0x0, @local, @mcast2, {[], @param_prob={0x4, 0x0, 0x0, 0x0, {0x0, 0x6, 'BNE', 0x0, 0x33, 0x0, @local, @mcast2, [@hopopts={0x33}]}}}}}}}, 0x0) semop(r0, &(0x7f0000000000)=[{0x0, 0x7f}, {}], 0x2) r1 = semget(0x3, 0x7, 0x84) syz_emit_ethernet(0x5e, &(0x7f0000000200)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, @val={@val={0x9100, 0x5, 0x1, 0x2}, {0x8100, 0x5, 0x1, 0x9}}, {@canfd={0xd, {{0x4, 0x0, 0x1, 0x1}, 0x2a, 0x2, 0x0, 0x0, "e80372277012b14546b8d1556b7c48089694c79943e29da9d61302cc012935751915a5b8f8c411591dcb04c36dfbfa422aec04ec38887087917d848daa48cbd2"}}}}, &(0x7f0000000280)={0x1, 0x3, [0xb4c, 0x143, 0x6ce, 0x43]}) semtimedop(r1, &(0x7f0000000080)=[{0x4, 0x3, 0x800}, {0x2, 0x55, 0x1000}, {0x4, 0x4}, {0x1, 0x4, 0x1800}, {0x2, 0x4, 0x1000}, {0x2, 0xf716}], 0x6, &(0x7f00000000c0)={0x77359400}) semop(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x1000}], 0x1) r2 = semget(0x2, 0x1, 0x4a0) semctl$IPC_RMID(r2, 0x0, 0x0) semop(r2, &(0x7f0000000040)=[{0x2, 0x7f, 0x800}, {0x3, 0x0, 0x1800}, {0x1, 0xfff0, 0x1800}, {0x2, 0x1f}, {0x3, 0x2, 0x800}], 0x5) r3 = semget$private(0x0, 0x3, 0x0) semop(r3, &(0x7f0000000000)=[{0x0, 0x7f}, {}], 0x2) semctl$IPC_SET(r3, 0x0, 0x1, &(0x7f00000000c0)={{0x0, 0xffffffffffffffff, 0x0, 0xee01}}) syz_emit_ethernet(0xe9, &(0x7f00000002c0)={@empty, @multicast, @val={@val={0x9100, 0x4, 0x0, 0x1}, {0x8100, 0x2, 0x1, 0x4}}, {@llc={0x4, {@llc={0x4e, 0x0, 'a ', "9384587d2d271d9d63d163f3f7abfbcc4243b24146afbe363554325724f12f2f6cce7c3535adb903ff113585a0794319f9916e9a2699b48cfc7a03b7adc3273ffa8055ef69fce9448202d98af0b566788009741743f759d0e8becd9ba0b2db5fdb68e81c82d5cb5bf22485a47a73a57218a3719a704df3e44b1c19626c5af1ecc7104b6cfeee91b133664a490a541f90fc84d15bc79dc0f237590581e052681596cd6bfd5f4543b40a19d32c2cb320bc2710606ae1b05428408c39ece699fab4e2615ecc282d5215c521885a427a11"}}}}}, &(0x7f0000000400)={0x1, 0x3, [0x282, 0xbf1, 0x7ac, 0x2ab]}) semtimedop(r3, &(0x7f0000000100)=[{0x3, 0x0, 0x1800}, {0x2, 0x9, 0x1000}], 0x2, &(0x7f0000000140)={0x0, 0x3938700}) 04:39:13 executing program 5: r0 = semget$private(0x0, 0x3, 0x0) syz_emit_ethernet(0x6e, &(0x7f0000000180)={@broadcast, @link_local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "00f7ff", 0x38, 0x3a, 0x0, @local, @mcast2, {[], @param_prob={0x4, 0x0, 0x0, 0x0, {0x0, 0x6, 'BNE', 0x0, 0x33, 0x0, @local, @mcast2, [@hopopts={0x33}]}}}}}}}, 0x0) semop(r0, &(0x7f0000000000)=[{0x0, 0x7f}, {}], 0x2) r1 = semget(0x3, 0x7, 0x84) syz_emit_ethernet(0x5e, &(0x7f0000000200)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, @val={@val={0x9100, 0x5, 0x1, 0x2}, {0x8100, 0x5, 0x1, 0x9}}, {@canfd={0xd, {{0x4, 0x0, 0x1, 0x1}, 0x2a, 0x2, 0x0, 0x0, "e80372277012b14546b8d1556b7c48089694c79943e29da9d61302cc012935751915a5b8f8c411591dcb04c36dfbfa422aec04ec38887087917d848daa48cbd2"}}}}, &(0x7f0000000280)={0x1, 0x3, [0xb4c, 0x143, 0x6ce, 0x43]}) semtimedop(r1, &(0x7f0000000080)=[{0x4, 0x3, 0x800}, {0x2, 0x55, 0x1000}, {0x4, 0x4}, {0x1, 0x4, 0x1800}, {0x2, 0x4, 0x1000}, {0x2, 0xf716}], 0x6, &(0x7f00000000c0)={0x77359400}) semop(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x1000}], 0x1) r2 = semget(0x2, 0x1, 0x4a0) semctl$IPC_RMID(r2, 0x0, 0x0) semop(r2, &(0x7f0000000040)=[{0x2, 0x7f, 0x800}, {0x3, 0x0, 0x1800}, {0x1, 0xfff0, 0x1800}, {0x2, 0x1f}, {0x3, 0x2, 0x800}], 0x5) r3 = semget$private(0x0, 0x3, 0x0) semop(r3, &(0x7f0000000000)=[{0x0, 0x7f}, {}], 0x2) semctl$IPC_SET(r3, 0x0, 0x1, &(0x7f00000000c0)={{0x0, 0xffffffffffffffff, 0x0, 0xee01}}) syz_emit_ethernet(0xe9, &(0x7f00000002c0)={@empty, @multicast, @val={@val={0x9100, 0x4, 0x0, 0x1}, {0x8100, 0x2, 0x1, 0x4}}, {@llc={0x4, {@llc={0x4e, 0x0, 'a ', "9384587d2d271d9d63d163f3f7abfbcc4243b24146afbe363554325724f12f2f6cce7c3535adb903ff113585a0794319f9916e9a2699b48cfc7a03b7adc3273ffa8055ef69fce9448202d98af0b566788009741743f759d0e8becd9ba0b2db5fdb68e81c82d5cb5bf22485a47a73a57218a3719a704df3e44b1c19626c5af1ecc7104b6cfeee91b133664a490a541f90fc84d15bc79dc0f237590581e052681596cd6bfd5f4543b40a19d32c2cb320bc2710606ae1b05428408c39ece699fab4e2615ecc282d5215c521885a427a11"}}}}}, &(0x7f0000000400)={0x1, 0x3, [0x282, 0xbf1, 0x7ac, 0x2ab]}) semtimedop(r3, &(0x7f0000000100)=[{0x3, 0x0, 0x1800}, {0x2, 0x9, 0x1000}], 0x2, &(0x7f0000000140)={0x0, 0x3938700}) 04:39:14 executing program 4: r0 = semget$private(0x0, 0x3, 0x0) syz_emit_ethernet(0x6e, &(0x7f0000000180)={@broadcast, @link_local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "00f7ff", 0x38, 0x3a, 0x0, @local, @mcast2, {[], @param_prob={0x4, 0x0, 0x0, 0x0, {0x0, 0x6, 'BNE', 0x0, 0x33, 0x0, @local, @mcast2, [@hopopts={0x33}]}}}}}}}, 0x0) semop(r0, &(0x7f0000000000)=[{0x0, 0x7f}, {}], 0x2) r1 = semget(0x3, 0x7, 0x84) syz_emit_ethernet(0x5e, &(0x7f0000000200)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, @val={@val={0x9100, 0x5, 0x1, 0x2}, {0x8100, 0x5, 0x1, 0x9}}, {@canfd={0xd, {{0x4, 0x0, 0x1, 0x1}, 0x2a, 0x2, 0x0, 0x0, "e80372277012b14546b8d1556b7c48089694c79943e29da9d61302cc012935751915a5b8f8c411591dcb04c36dfbfa422aec04ec38887087917d848daa48cbd2"}}}}, &(0x7f0000000280)={0x1, 0x3, [0xb4c, 0x143, 0x6ce, 0x43]}) semtimedop(r1, &(0x7f0000000080)=[{0x4, 0x3, 0x800}, {0x2, 0x55, 0x1000}, {0x4, 0x4}, {0x1, 0x4, 0x1800}, {0x2, 0x4, 0x1000}, {0x2, 0xf716}], 0x6, &(0x7f00000000c0)={0x77359400}) semop(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x1000}], 0x1) r2 = semget(0x2, 0x1, 0x4a0) semctl$IPC_RMID(r2, 0x0, 0x0) semop(r2, &(0x7f0000000040)=[{0x2, 0x7f, 0x800}, {0x3, 0x0, 0x1800}, {0x1, 0xfff0, 0x1800}, {0x2, 0x1f}, {0x3, 0x2, 0x800}], 0x5) r3 = semget$private(0x0, 0x3, 0x0) semop(r3, &(0x7f0000000000)=[{0x0, 0x7f}, {}], 0x2) semctl$IPC_SET(r3, 0x0, 0x1, &(0x7f00000000c0)={{0x0, 0xffffffffffffffff, 0x0, 0xee01}}) syz_emit_ethernet(0xe9, &(0x7f00000002c0)={@empty, @multicast, @val={@val={0x9100, 0x4, 0x0, 0x1}, {0x8100, 0x2, 0x1, 0x4}}, {@llc={0x4, {@llc={0x4e, 0x0, 'a ', "9384587d2d271d9d63d163f3f7abfbcc4243b24146afbe363554325724f12f2f6cce7c3535adb903ff113585a0794319f9916e9a2699b48cfc7a03b7adc3273ffa8055ef69fce9448202d98af0b566788009741743f759d0e8becd9ba0b2db5fdb68e81c82d5cb5bf22485a47a73a57218a3719a704df3e44b1c19626c5af1ecc7104b6cfeee91b133664a490a541f90fc84d15bc79dc0f237590581e052681596cd6bfd5f4543b40a19d32c2cb320bc2710606ae1b05428408c39ece699fab4e2615ecc282d5215c521885a427a11"}}}}}, &(0x7f0000000400)={0x1, 0x3, [0x282, 0xbf1, 0x7ac, 0x2ab]}) semtimedop(r3, &(0x7f0000000100)=[{0x3, 0x0, 0x1800}, {0x2, 0x9, 0x1000}], 0x2, &(0x7f0000000140)={0x0, 0x3938700}) 04:39:21 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0xffffffffffffff27}}, 0x0) 04:39:21 executing program 0: r0 = semget$private(0x0, 0x3, 0x0) syz_emit_ethernet(0x6e, &(0x7f0000000180)={@broadcast, @link_local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "00f7ff", 0x38, 0x3a, 0x0, @local, @mcast2, {[], @param_prob={0x4, 0x0, 0x0, 0x0, {0x0, 0x6, 'BNE', 0x0, 0x33, 0x0, @local, @mcast2, [@hopopts={0x33}]}}}}}}}, 0x0) semop(r0, &(0x7f0000000000)=[{0x0, 0x7f}, {}], 0x2) r1 = semget(0x3, 0x7, 0x84) syz_emit_ethernet(0x5e, &(0x7f0000000200)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, @val={@val={0x9100, 0x5, 0x1, 0x2}, {0x8100, 0x5, 0x1, 0x9}}, {@canfd={0xd, {{0x4, 0x0, 0x1, 0x1}, 0x2a, 0x2, 0x0, 0x0, "e80372277012b14546b8d1556b7c48089694c79943e29da9d61302cc012935751915a5b8f8c411591dcb04c36dfbfa422aec04ec38887087917d848daa48cbd2"}}}}, &(0x7f0000000280)={0x1, 0x3, [0xb4c, 0x143, 0x6ce, 0x43]}) semtimedop(r1, &(0x7f0000000080)=[{0x4, 0x3, 0x800}, {0x2, 0x55, 0x1000}, {0x4, 0x4}, {0x1, 0x4, 0x1800}, {0x2, 0x4, 0x1000}, {0x2, 0xf716}], 0x6, &(0x7f00000000c0)={0x77359400}) semop(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x1000}], 0x1) r2 = semget(0x2, 0x1, 0x4a0) semctl$IPC_RMID(r2, 0x0, 0x0) semop(r2, &(0x7f0000000040)=[{0x2, 0x7f, 0x800}, {0x3, 0x0, 0x1800}, {0x1, 0xfff0, 0x1800}, {0x2, 0x1f}, {0x3, 0x2, 0x800}], 0x5) r3 = semget$private(0x0, 0x3, 0x0) semop(r3, &(0x7f0000000000)=[{0x0, 0x7f}, {}], 0x2) semctl$IPC_SET(r3, 0x0, 0x1, &(0x7f00000000c0)={{0x0, 0xffffffffffffffff, 0x0, 0xee01}}) syz_emit_ethernet(0xe9, &(0x7f00000002c0)={@empty, @multicast, @val={@val={0x9100, 0x4, 0x0, 0x1}, {0x8100, 0x2, 0x1, 0x4}}, {@llc={0x4, {@llc={0x4e, 0x0, 'a ', "9384587d2d271d9d63d163f3f7abfbcc4243b24146afbe363554325724f12f2f6cce7c3535adb903ff113585a0794319f9916e9a2699b48cfc7a03b7adc3273ffa8055ef69fce9448202d98af0b566788009741743f759d0e8becd9ba0b2db5fdb68e81c82d5cb5bf22485a47a73a57218a3719a704df3e44b1c19626c5af1ecc7104b6cfeee91b133664a490a541f90fc84d15bc79dc0f237590581e052681596cd6bfd5f4543b40a19d32c2cb320bc2710606ae1b05428408c39ece699fab4e2615ecc282d5215c521885a427a11"}}}}}, &(0x7f0000000400)={0x1, 0x3, [0x282, 0xbf1, 0x7ac, 0x2ab]}) semtimedop(r3, &(0x7f0000000100)=[{0x3, 0x0, 0x1800}, {0x2, 0x9, 0x1000}], 0x2, &(0x7f0000000140)={0x0, 0x3938700}) 04:39:21 executing program 5: r0 = semget$private(0x0, 0x3, 0x0) syz_emit_ethernet(0x6e, &(0x7f0000000180)={@broadcast, @link_local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "00f7ff", 0x38, 0x3a, 0x0, @local, @mcast2, {[], @param_prob={0x4, 0x0, 0x0, 0x0, {0x0, 0x6, 'BNE', 0x0, 0x33, 0x0, @local, @mcast2, [@hopopts={0x33}]}}}}}}}, 0x0) semop(r0, &(0x7f0000000000)=[{0x0, 0x7f}, {}], 0x2) r1 = semget(0x3, 0x7, 0x84) syz_emit_ethernet(0x5e, &(0x7f0000000200)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, @val={@val={0x9100, 0x5, 0x1, 0x2}, {0x8100, 0x5, 0x1, 0x9}}, {@canfd={0xd, {{0x4, 0x0, 0x1, 0x1}, 0x2a, 0x2, 0x0, 0x0, "e80372277012b14546b8d1556b7c48089694c79943e29da9d61302cc012935751915a5b8f8c411591dcb04c36dfbfa422aec04ec38887087917d848daa48cbd2"}}}}, &(0x7f0000000280)={0x1, 0x3, [0xb4c, 0x143, 0x6ce, 0x43]}) semtimedop(r1, &(0x7f0000000080)=[{0x4, 0x3, 0x800}, {0x2, 0x55, 0x1000}, {0x4, 0x4}, {0x1, 0x4, 0x1800}, {0x2, 0x4, 0x1000}, {0x2, 0xf716}], 0x6, &(0x7f00000000c0)={0x77359400}) semop(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x1000}], 0x1) r2 = semget(0x2, 0x1, 0x4a0) semctl$IPC_RMID(r2, 0x0, 0x0) semop(r2, &(0x7f0000000040)=[{0x2, 0x7f, 0x800}, {0x3, 0x0, 0x1800}, {0x1, 0xfff0, 0x1800}, {0x2, 0x1f}, {0x3, 0x2, 0x800}], 0x5) r3 = semget$private(0x0, 0x3, 0x0) semop(r3, &(0x7f0000000000)=[{0x0, 0x7f}, {}], 0x2) semctl$IPC_SET(r3, 0x0, 0x1, &(0x7f00000000c0)={{0x0, 0xffffffffffffffff, 0x0, 0xee01}}) syz_emit_ethernet(0xe9, &(0x7f00000002c0)={@empty, @multicast, @val={@val={0x9100, 0x4, 0x0, 0x1}, {0x8100, 0x2, 0x1, 0x4}}, {@llc={0x4, {@llc={0x4e, 0x0, 'a ', "9384587d2d271d9d63d163f3f7abfbcc4243b24146afbe363554325724f12f2f6cce7c3535adb903ff113585a0794319f9916e9a2699b48cfc7a03b7adc3273ffa8055ef69fce9448202d98af0b566788009741743f759d0e8becd9ba0b2db5fdb68e81c82d5cb5bf22485a47a73a57218a3719a704df3e44b1c19626c5af1ecc7104b6cfeee91b133664a490a541f90fc84d15bc79dc0f237590581e052681596cd6bfd5f4543b40a19d32c2cb320bc2710606ae1b05428408c39ece699fab4e2615ecc282d5215c521885a427a11"}}}}}, &(0x7f0000000400)={0x1, 0x3, [0x282, 0xbf1, 0x7ac, 0x2ab]}) semtimedop(r3, &(0x7f0000000100)=[{0x3, 0x0, 0x1800}, {0x2, 0x9, 0x1000}], 0x2, &(0x7f0000000140)={0x0, 0x3938700}) 04:39:21 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffec850000006d0000008500000008"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='rdma.current\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a80)={0x18, 0xa, &(0x7f00000004c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7f}, [@map_idx={0x18, 0x7, 0x5, 0x0, 0x10}, @cb_func={0x18, 0x9, 0x4, 0x0, 0x6}, @cb_func={0x18, 0x2, 0x4, 0x0, 0xfffffffffffffffd}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}]}, &(0x7f00000008c0)='syzkaller\x00', 0xbfe, 0xcb, &(0x7f0000000900)=""/203, 0x40f00, 0x13, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000a00)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000000a40)={0x4, 0xd, 0xb1, 0x1}, 0x10}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x20}, 0x48) r4 = openat$cgroup_ro(r2, &(0x7f00000003c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001580)={0x11, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1841000000000000ba"], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x1003, &(0x7f0000001a40)=""/4099, 0x41100, 0x0, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001500)={0x2, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000005c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4, r3, r4, r3, r2, 0xffffffffffffffff]}, 0x80) bpf$ITER_CREATE(0x21, &(0x7f0000000240), 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000019c0)={0x18, 0xd, &(0x7f0000000700)=ANY=[@ANYBLOB="180000000500000000000000000200009500000000000000184a0000fbffffff000000000000000018500000050000000000000000000000185900000200000000000000000000001761180010000000182a0000efad356868ed500603f59c3bbbfed90e3d64c8d53c0b", @ANYRES32=r3, @ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x62, &(0x7f0000001740)=""/98, 0x40f00, 0x14, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001880)={0x1, 0x1}, 0x8, 0x10, &(0x7f00000018c0)={0x4, 0x2, 0x81, 0x10000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001980)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, 0xffffffffffffffff, r2]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x14, 0x0, 0x0, 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0xf3, 0x3, 0x4, 0x40, 0x0, 0x200000000000000, 0xbc0a0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x848, 0x2, 0x3, 0x7, 0x8, 0x0, 0x7, 0x0, 0x1000000, 0x0, 0x80000001}, 0x0, 0x8, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r6, &(0x7f0000000000), 0x248800) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0xc, &(0x7f00000002c0)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffff8}, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @generic={0x9c, 0x4, 0x8, 0x2c, 0x20}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x1}, @generic={0x0, 0xe, 0xb, 0xbd5, 0x42}, @alu={0x7, 0x1, 0xd, 0xb, 0x0, 0x10, 0xfffffffffffffff0}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @generic={0x0, 0x7, 0x3, 0x101, 0x7ff}], &(0x7f0000000540)='syzkaller\x00', 0x3, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0x10, 0x0, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000640)=[r6, r7]}, 0x80) 04:39:21 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffec850000006d0000008500000008"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='rdma.current\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a80)={0x18, 0xa, &(0x7f00000004c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7f}, [@map_idx={0x18, 0x7, 0x5, 0x0, 0x10}, @cb_func={0x18, 0x9, 0x4, 0x0, 0x6}, @cb_func={0x18, 0x2, 0x4, 0x0, 0xfffffffffffffffd}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}]}, &(0x7f00000008c0)='syzkaller\x00', 0xbfe, 0xcb, &(0x7f0000000900)=""/203, 0x40f00, 0x13, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000a00)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000000a40)={0x4, 0xd, 0xb1, 0x1}, 0x10}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x20}, 0x48) r4 = openat$cgroup_ro(r2, &(0x7f00000003c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001580)={0x11, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1841000000000000ba"], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x1003, &(0x7f0000001a40)=""/4099, 0x41100, 0x0, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001500)={0x2, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000005c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4, r3, r4, r3, r2, 0xffffffffffffffff]}, 0x80) bpf$ITER_CREATE(0x21, &(0x7f0000000240), 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000019c0)={0x18, 0xd, &(0x7f0000000700)=ANY=[@ANYBLOB="180000000500000000000000000200009500000000000000184a0000fbffffff000000000000000018500000050000000000000000000000185900000200000000000000000000001761180010000000182a0000efad356868ed500603f59c3bbbfed90e3d64c8d53c0b", @ANYRES32=r3, @ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x62, &(0x7f0000001740)=""/98, 0x40f00, 0x14, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001880)={0x1, 0x1}, 0x8, 0x10, &(0x7f00000018c0)={0x4, 0x2, 0x81, 0x10000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001980)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, 0xffffffffffffffff, r2]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x14, 0x0, 0x0, 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0xf3, 0x3, 0x4, 0x40, 0x0, 0x200000000000000, 0xbc0a0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x848, 0x2, 0x3, 0x7, 0x8, 0x0, 0x7, 0x0, 0x1000000, 0x0, 0x80000001}, 0x0, 0x8, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r6, &(0x7f0000000000), 0x248800) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0xc, &(0x7f00000002c0)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffff8}, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @generic={0x9c, 0x4, 0x8, 0x2c, 0x20}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x1}, @generic={0x0, 0xe, 0xb, 0xbd5, 0x42}, @alu={0x7, 0x1, 0xd, 0xb, 0x0, 0x10, 0xfffffffffffffff0}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @generic={0x0, 0x7, 0x3, 0x101, 0x7ff}], &(0x7f0000000540)='syzkaller\x00', 0x3, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0x10, 0x0, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000640)=[r6, r7]}, 0x80) 04:39:21 executing program 4: r0 = semget$private(0x0, 0x3, 0x0) syz_emit_ethernet(0x6e, &(0x7f0000000180)={@broadcast, @link_local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "00f7ff", 0x38, 0x3a, 0x0, @local, @mcast2, {[], @param_prob={0x4, 0x0, 0x0, 0x0, {0x0, 0x6, 'BNE', 0x0, 0x33, 0x0, @local, @mcast2, [@hopopts={0x33}]}}}}}}}, 0x0) semop(r0, &(0x7f0000000000)=[{0x0, 0x7f}, {}], 0x2) r1 = semget(0x3, 0x7, 0x84) syz_emit_ethernet(0x5e, &(0x7f0000000200)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, @val={@val={0x9100, 0x5, 0x1, 0x2}, {0x8100, 0x5, 0x1, 0x9}}, {@canfd={0xd, {{0x4, 0x0, 0x1, 0x1}, 0x2a, 0x2, 0x0, 0x0, "e80372277012b14546b8d1556b7c48089694c79943e29da9d61302cc012935751915a5b8f8c411591dcb04c36dfbfa422aec04ec38887087917d848daa48cbd2"}}}}, &(0x7f0000000280)={0x1, 0x3, [0xb4c, 0x143, 0x6ce, 0x43]}) semtimedop(r1, &(0x7f0000000080)=[{0x4, 0x3, 0x800}, {0x2, 0x55, 0x1000}, {0x4, 0x4}, {0x1, 0x4, 0x1800}, {0x2, 0x4, 0x1000}, {0x2, 0xf716}], 0x6, &(0x7f00000000c0)={0x77359400}) semop(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x1000}], 0x1) r2 = semget(0x2, 0x1, 0x4a0) semctl$IPC_RMID(r2, 0x0, 0x0) semop(r2, &(0x7f0000000040)=[{0x2, 0x7f, 0x800}, {0x3, 0x0, 0x1800}, {0x1, 0xfff0, 0x1800}, {0x2, 0x1f}, {0x3, 0x2, 0x800}], 0x5) r3 = semget$private(0x0, 0x3, 0x0) semop(r3, &(0x7f0000000000)=[{0x0, 0x7f}, {}], 0x2) semctl$IPC_SET(r3, 0x0, 0x1, &(0x7f00000000c0)={{0x0, 0xffffffffffffffff, 0x0, 0xee01}}) syz_emit_ethernet(0xe9, &(0x7f00000002c0)={@empty, @multicast, @val={@val={0x9100, 0x4, 0x0, 0x1}, {0x8100, 0x2, 0x1, 0x4}}, {@llc={0x4, {@llc={0x4e, 0x0, 'a ', "9384587d2d271d9d63d163f3f7abfbcc4243b24146afbe363554325724f12f2f6cce7c3535adb903ff113585a0794319f9916e9a2699b48cfc7a03b7adc3273ffa8055ef69fce9448202d98af0b566788009741743f759d0e8becd9ba0b2db5fdb68e81c82d5cb5bf22485a47a73a57218a3719a704df3e44b1c19626c5af1ecc7104b6cfeee91b133664a490a541f90fc84d15bc79dc0f237590581e052681596cd6bfd5f4543b40a19d32c2cb320bc2710606ae1b05428408c39ece699fab4e2615ecc282d5215c521885a427a11"}}}}}, &(0x7f0000000400)={0x1, 0x3, [0x282, 0xbf1, 0x7ac, 0x2ab]}) semtimedop(r3, &(0x7f0000000100)=[{0x3, 0x0, 0x1800}, {0x2, 0x9, 0x1000}], 0x2, &(0x7f0000000140)={0x0, 0x3938700}) 04:39:21 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffec850000006d0000008500000008"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='rdma.current\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a80)={0x18, 0xa, &(0x7f00000004c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7f}, [@map_idx={0x18, 0x7, 0x5, 0x0, 0x10}, @cb_func={0x18, 0x9, 0x4, 0x0, 0x6}, @cb_func={0x18, 0x2, 0x4, 0x0, 0xfffffffffffffffd}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}]}, &(0x7f00000008c0)='syzkaller\x00', 0xbfe, 0xcb, &(0x7f0000000900)=""/203, 0x40f00, 0x13, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000a00)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000000a40)={0x4, 0xd, 0xb1, 0x1}, 0x10}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x20}, 0x48) r4 = openat$cgroup_ro(r2, &(0x7f00000003c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001580)={0x11, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1841000000000000ba"], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x1003, &(0x7f0000001a40)=""/4099, 0x41100, 0x0, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001500)={0x2, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000005c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4, r3, r4, r3, r2, 0xffffffffffffffff]}, 0x80) bpf$ITER_CREATE(0x21, &(0x7f0000000240), 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000019c0)={0x18, 0xd, &(0x7f0000000700)=ANY=[@ANYBLOB="180000000500000000000000000200009500000000000000184a0000fbffffff000000000000000018500000050000000000000000000000185900000200000000000000000000001761180010000000182a0000efad356868ed500603f59c3bbbfed90e3d64c8d53c0b", @ANYRES32=r3, @ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x62, &(0x7f0000001740)=""/98, 0x40f00, 0x14, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001880)={0x1, 0x1}, 0x8, 0x10, &(0x7f00000018c0)={0x4, 0x2, 0x81, 0x10000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001980)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, 0xffffffffffffffff, r2]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x14, 0x0, 0x0, 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0xf3, 0x3, 0x4, 0x40, 0x0, 0x200000000000000, 0xbc0a0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x848, 0x2, 0x3, 0x7, 0x8, 0x0, 0x7, 0x0, 0x1000000, 0x0, 0x80000001}, 0x0, 0x8, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r6, &(0x7f0000000000), 0x248800) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0xc, &(0x7f00000002c0)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffff8}, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @generic={0x9c, 0x4, 0x8, 0x2c, 0x20}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x1}, @generic={0x0, 0xe, 0xb, 0xbd5, 0x42}, @alu={0x7, 0x1, 0xd, 0xb, 0x0, 0x10, 0xfffffffffffffff0}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @generic={0x0, 0x7, 0x3, 0x101, 0x7ff}], &(0x7f0000000540)='syzkaller\x00', 0x3, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0x10, 0x0, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000640)=[r6, r7]}, 0x80) 04:39:21 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffec850000006d0000008500000008"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='rdma.current\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a80)={0x18, 0xa, &(0x7f00000004c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7f}, [@map_idx={0x18, 0x7, 0x5, 0x0, 0x10}, @cb_func={0x18, 0x9, 0x4, 0x0, 0x6}, @cb_func={0x18, 0x2, 0x4, 0x0, 0xfffffffffffffffd}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}]}, &(0x7f00000008c0)='syzkaller\x00', 0xbfe, 0xcb, &(0x7f0000000900)=""/203, 0x40f00, 0x13, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000a00)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000000a40)={0x4, 0xd, 0xb1, 0x1}, 0x10}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x20}, 0x48) r4 = openat$cgroup_ro(r2, &(0x7f00000003c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001580)={0x11, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1841000000000000ba"], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x1003, &(0x7f0000001a40)=""/4099, 0x41100, 0x0, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001500)={0x2, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000005c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4, r3, r4, r3, r2, 0xffffffffffffffff]}, 0x80) bpf$ITER_CREATE(0x21, &(0x7f0000000240), 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000019c0)={0x18, 0xd, &(0x7f0000000700)=ANY=[@ANYBLOB="180000000500000000000000000200009500000000000000184a0000fbffffff000000000000000018500000050000000000000000000000185900000200000000000000000000001761180010000000182a0000efad356868ed500603f59c3bbbfed90e3d64c8d53c0b", @ANYRES32=r3, @ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x62, &(0x7f0000001740)=""/98, 0x40f00, 0x14, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001880)={0x1, 0x1}, 0x8, 0x10, &(0x7f00000018c0)={0x4, 0x2, 0x81, 0x10000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001980)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, 0xffffffffffffffff, r2]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x14, 0x0, 0x0, 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0xf3, 0x3, 0x4, 0x40, 0x0, 0x200000000000000, 0xbc0a0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x848, 0x2, 0x3, 0x7, 0x8, 0x0, 0x7, 0x0, 0x1000000, 0x0, 0x80000001}, 0x0, 0x8, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r6, &(0x7f0000000000), 0x248800) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0xc, &(0x7f00000002c0)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffff8}, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @generic={0x9c, 0x4, 0x8, 0x2c, 0x20}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x1}, @generic={0x0, 0xe, 0xb, 0xbd5, 0x42}, @alu={0x7, 0x1, 0xd, 0xb, 0x0, 0x10, 0xfffffffffffffff0}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @generic={0x0, 0x7, 0x3, 0x101, 0x7ff}], &(0x7f0000000540)='syzkaller\x00', 0x3, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0x10, 0x0, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000640)=[r6, r7]}, 0x80) 04:39:21 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffec850000006d0000008500000008"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='rdma.current\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a80)={0x18, 0xa, &(0x7f00000004c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7f}, [@map_idx={0x18, 0x7, 0x5, 0x0, 0x10}, @cb_func={0x18, 0x9, 0x4, 0x0, 0x6}, @cb_func={0x18, 0x2, 0x4, 0x0, 0xfffffffffffffffd}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}]}, &(0x7f00000008c0)='syzkaller\x00', 0xbfe, 0xcb, &(0x7f0000000900)=""/203, 0x40f00, 0x13, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000a00)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000000a40)={0x4, 0xd, 0xb1, 0x1}, 0x10}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x20}, 0x48) r4 = openat$cgroup_ro(r2, &(0x7f00000003c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001580)={0x11, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1841000000000000ba"], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x1003, &(0x7f0000001a40)=""/4099, 0x41100, 0x0, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001500)={0x2, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000005c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4, r3, r4, r3, r2, 0xffffffffffffffff]}, 0x80) bpf$ITER_CREATE(0x21, &(0x7f0000000240), 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000019c0)={0x18, 0xd, &(0x7f0000000700)=ANY=[@ANYBLOB="180000000500000000000000000200009500000000000000184a0000fbffffff000000000000000018500000050000000000000000000000185900000200000000000000000000001761180010000000182a0000efad356868ed500603f59c3bbbfed90e3d64c8d53c0b", @ANYRES32=r3, @ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x62, &(0x7f0000001740)=""/98, 0x40f00, 0x14, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001880)={0x1, 0x1}, 0x8, 0x10, &(0x7f00000018c0)={0x4, 0x2, 0x81, 0x10000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001980)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, 0xffffffffffffffff, r2]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x14, 0x0, 0x0, 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0xf3, 0x3, 0x4, 0x40, 0x0, 0x200000000000000, 0xbc0a0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x848, 0x2, 0x3, 0x7, 0x8, 0x0, 0x7, 0x0, 0x1000000, 0x0, 0x80000001}, 0x0, 0x8, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r6, &(0x7f0000000000), 0x248800) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0xc, &(0x7f00000002c0)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffff8}, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @generic={0x9c, 0x4, 0x8, 0x2c, 0x20}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x1}, @generic={0x0, 0xe, 0xb, 0xbd5, 0x42}, @alu={0x7, 0x1, 0xd, 0xb, 0x0, 0x10, 0xfffffffffffffff0}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @generic={0x0, 0x7, 0x3, 0x101, 0x7ff}], &(0x7f0000000540)='syzkaller\x00', 0x3, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0x10, 0x0, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000640)=[r6, r7]}, 0x80) 04:39:21 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffec850000006d0000008500000008"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='rdma.current\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a80)={0x18, 0xa, &(0x7f00000004c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7f}, [@map_idx={0x18, 0x7, 0x5, 0x0, 0x10}, @cb_func={0x18, 0x9, 0x4, 0x0, 0x6}, @cb_func={0x18, 0x2, 0x4, 0x0, 0xfffffffffffffffd}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}]}, &(0x7f00000008c0)='syzkaller\x00', 0xbfe, 0xcb, &(0x7f0000000900)=""/203, 0x40f00, 0x13, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000a00)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000000a40)={0x4, 0xd, 0xb1, 0x1}, 0x10}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x20}, 0x48) r4 = openat$cgroup_ro(r2, &(0x7f00000003c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001580)={0x11, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1841000000000000ba"], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x1003, &(0x7f0000001a40)=""/4099, 0x41100, 0x0, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001500)={0x2, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000005c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4, r3, r4, r3, r2, 0xffffffffffffffff]}, 0x80) bpf$ITER_CREATE(0x21, &(0x7f0000000240), 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000019c0)={0x18, 0xd, &(0x7f0000000700)=ANY=[@ANYBLOB="180000000500000000000000000200009500000000000000184a0000fbffffff000000000000000018500000050000000000000000000000185900000200000000000000000000001761180010000000182a0000efad356868ed500603f59c3bbbfed90e3d64c8d53c0b", @ANYRES32=r3, @ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x62, &(0x7f0000001740)=""/98, 0x40f00, 0x14, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001880)={0x1, 0x1}, 0x8, 0x10, &(0x7f00000018c0)={0x4, 0x2, 0x81, 0x10000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001980)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, 0xffffffffffffffff, r2]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x14, 0x0, 0x0, 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0xf3, 0x3, 0x4, 0x40, 0x0, 0x200000000000000, 0xbc0a0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x848, 0x2, 0x3, 0x7, 0x8, 0x0, 0x7, 0x0, 0x1000000, 0x0, 0x80000001}, 0x0, 0x8, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r6, &(0x7f0000000000), 0x248800) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0xc, &(0x7f00000002c0)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffff8}, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @generic={0x9c, 0x4, 0x8, 0x2c, 0x20}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x1}, @generic={0x0, 0xe, 0xb, 0xbd5, 0x42}, @alu={0x7, 0x1, 0xd, 0xb, 0x0, 0x10, 0xfffffffffffffff0}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @generic={0x0, 0x7, 0x3, 0x101, 0x7ff}], &(0x7f0000000540)='syzkaller\x00', 0x3, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0x10, 0x0, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000640)=[r6, r7]}, 0x80) 04:39:21 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffec850000006d0000008500000008"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='rdma.current\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a80)={0x18, 0xa, &(0x7f00000004c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7f}, [@map_idx={0x18, 0x7, 0x5, 0x0, 0x10}, @cb_func={0x18, 0x9, 0x4, 0x0, 0x6}, @cb_func={0x18, 0x2, 0x4, 0x0, 0xfffffffffffffffd}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}]}, &(0x7f00000008c0)='syzkaller\x00', 0xbfe, 0xcb, &(0x7f0000000900)=""/203, 0x40f00, 0x13, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000a00)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000000a40)={0x4, 0xd, 0xb1, 0x1}, 0x10}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x20}, 0x48) r4 = openat$cgroup_ro(r2, &(0x7f00000003c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001580)={0x11, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1841000000000000ba"], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x1003, &(0x7f0000001a40)=""/4099, 0x41100, 0x0, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001500)={0x2, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000005c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4, r3, r4, r3, r2, 0xffffffffffffffff]}, 0x80) bpf$ITER_CREATE(0x21, &(0x7f0000000240), 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000019c0)={0x18, 0xd, &(0x7f0000000700)=ANY=[@ANYBLOB="180000000500000000000000000200009500000000000000184a0000fbffffff000000000000000018500000050000000000000000000000185900000200000000000000000000001761180010000000182a0000efad356868ed500603f59c3bbbfed90e3d64c8d53c0b", @ANYRES32=r3, @ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x62, &(0x7f0000001740)=""/98, 0x40f00, 0x14, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001880)={0x1, 0x1}, 0x8, 0x10, &(0x7f00000018c0)={0x4, 0x2, 0x81, 0x10000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001980)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, 0xffffffffffffffff, r2]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x14, 0x0, 0x0, 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0xf3, 0x3, 0x4, 0x40, 0x0, 0x200000000000000, 0xbc0a0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x848, 0x2, 0x3, 0x7, 0x8, 0x0, 0x7, 0x0, 0x1000000, 0x0, 0x80000001}, 0x0, 0x8, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r6, &(0x7f0000000000), 0x248800) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0xc, &(0x7f00000002c0)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffff8}, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @generic={0x9c, 0x4, 0x8, 0x2c, 0x20}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x1}, @generic={0x0, 0xe, 0xb, 0xbd5, 0x42}, @alu={0x7, 0x1, 0xd, 0xb, 0x0, 0x10, 0xfffffffffffffff0}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @generic={0x0, 0x7, 0x3, 0x101, 0x7ff}], &(0x7f0000000540)='syzkaller\x00', 0x3, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0x10, 0x0, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000640)=[r6, r7]}, 0x80) 04:39:22 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffec850000006d0000008500000008"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='rdma.current\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a80)={0x18, 0xa, &(0x7f00000004c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7f}, [@map_idx={0x18, 0x7, 0x5, 0x0, 0x10}, @cb_func={0x18, 0x9, 0x4, 0x0, 0x6}, @cb_func={0x18, 0x2, 0x4, 0x0, 0xfffffffffffffffd}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}]}, &(0x7f00000008c0)='syzkaller\x00', 0xbfe, 0xcb, &(0x7f0000000900)=""/203, 0x40f00, 0x13, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000a00)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000000a40)={0x4, 0xd, 0xb1, 0x1}, 0x10}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x20}, 0x48) r4 = openat$cgroup_ro(r2, &(0x7f00000003c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001580)={0x11, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1841000000000000ba"], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x1003, &(0x7f0000001a40)=""/4099, 0x41100, 0x0, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001500)={0x2, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000005c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4, r3, r4, r3, r2, 0xffffffffffffffff]}, 0x80) bpf$ITER_CREATE(0x21, &(0x7f0000000240), 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000019c0)={0x18, 0xd, &(0x7f0000000700)=ANY=[@ANYBLOB="180000000500000000000000000200009500000000000000184a0000fbffffff000000000000000018500000050000000000000000000000185900000200000000000000000000001761180010000000182a0000efad356868ed500603f59c3bbbfed90e3d64c8d53c0b", @ANYRES32=r3, @ANYBLOB="000000000609792aae009500000000000000b48a198aecf38a953f36f29dc82c3a4cf250071e2af84be2ec643aedfc0f4d2b5c21274cc79acffe59095f849b27b2bc41f2e1f783a7bafaed7bab43bd2cfbeae775896cd14abc28b10000000000000000000000000018877b7373f9980db834e1e196cedd5abc79f0d65d81c7cb40cfdfbb0eb0948b8be2c5c438d9502d421705953ebf48810411b14ba32999df9d456cf293d67032cfc4bf29cdd8e7042c23867f234cce3b9a4d6fa3429472352f3ee7d254776444adb59f7607a09ac3ce090738e39e2156e0f409f581960ec3ee7b296b861cd926d9b3c56621bd4695695e53c5d6cf70e73752d6f60ee598930819"], &(0x7f0000000000)='GPL\x00', 0x5, 0x62, &(0x7f0000001740)=""/98, 0x40f00, 0x14, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001880)={0x1, 0x1}, 0x8, 0x10, &(0x7f00000018c0)={0x4, 0x2, 0x81, 0x10000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001980)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, 0xffffffffffffffff, r2]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x14, 0x0, 0x0, 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0xf3, 0x3, 0x4, 0x40, 0x0, 0x200000000000000, 0xbc0a0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x848, 0x2, 0x3, 0x7, 0x8, 0x0, 0x7, 0x0, 0x1000000, 0x0, 0x80000001}, 0x0, 0x8, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r6, &(0x7f0000000000), 0x248800) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0xc, &(0x7f00000002c0)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffff8}, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @generic={0x9c, 0x4, 0x8, 0x2c, 0x20}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x1}, @generic={0x0, 0xe, 0xb, 0xbd5, 0x42}, @alu={0x7, 0x1, 0xd, 0xb, 0x0, 0x10, 0xfffffffffffffff0}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @generic={0x0, 0x7, 0x3, 0x101, 0x7ff}], &(0x7f0000000540)='syzkaller\x00', 0x3, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0x10, 0x0, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000640)=[r6, r7]}, 0x80) 04:39:25 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffec850000006d0000008500000008"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='rdma.current\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a80)={0x18, 0xa, &(0x7f00000004c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7f}, [@map_idx={0x18, 0x7, 0x5, 0x0, 0x10}, @cb_func={0x18, 0x9, 0x4, 0x0, 0x6}, @cb_func={0x18, 0x2, 0x4, 0x0, 0xfffffffffffffffd}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}]}, &(0x7f00000008c0)='syzkaller\x00', 0xbfe, 0xcb, &(0x7f0000000900)=""/203, 0x40f00, 0x13, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000a00)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000000a40)={0x4, 0xd, 0xb1, 0x1}, 0x10}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x20}, 0x48) r4 = openat$cgroup_ro(r2, &(0x7f00000003c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001580)={0x11, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1841000000000000ba"], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x1003, &(0x7f0000001a40)=""/4099, 0x41100, 0x0, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001500)={0x2, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000005c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4, r3, r4, r3, r2, 0xffffffffffffffff]}, 0x80) bpf$ITER_CREATE(0x21, &(0x7f0000000240), 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000019c0)={0x18, 0xd, &(0x7f0000000700)=ANY=[@ANYBLOB="180000000500000000000000000200009500000000000000184a0000fbffffff000000000000000018500000050000000000000000000000185900000200000000000000000000001761180010000000182a0000efad356868ed500603f59c3bbbfed90e3d64c8d53c0b", @ANYRES32=r3, @ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x62, &(0x7f0000001740)=""/98, 0x40f00, 0x14, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001880)={0x1, 0x1}, 0x8, 0x10, &(0x7f00000018c0)={0x4, 0x2, 0x81, 0x10000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001980)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, 0xffffffffffffffff, r2]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x14, 0x0, 0x0, 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0xf3, 0x3, 0x4, 0x40, 0x0, 0x200000000000000, 0xbc0a0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x848, 0x2, 0x3, 0x7, 0x8, 0x0, 0x7, 0x0, 0x1000000, 0x0, 0x80000001}, 0x0, 0x8, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r6, &(0x7f0000000000), 0x248800) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0xc, &(0x7f00000002c0)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffff8}, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @generic={0x9c, 0x4, 0x8, 0x2c, 0x20}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x1}, @generic={0x0, 0xe, 0xb, 0xbd5, 0x42}, @alu={0x7, 0x1, 0xd, 0xb, 0x0, 0x10, 0xfffffffffffffff0}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @generic={0x0, 0x7, 0x3, 0x101, 0x7ff}], &(0x7f0000000540)='syzkaller\x00', 0x3, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0x10, 0x0, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000640)=[r6, r7]}, 0x80) 04:39:25 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffec850000006d0000008500000008"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='rdma.current\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a80)={0x18, 0xa, &(0x7f00000004c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7f}, [@map_idx={0x18, 0x7, 0x5, 0x0, 0x10}, @cb_func={0x18, 0x9, 0x4, 0x0, 0x6}, @cb_func={0x18, 0x2, 0x4, 0x0, 0xfffffffffffffffd}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}]}, &(0x7f00000008c0)='syzkaller\x00', 0xbfe, 0xcb, &(0x7f0000000900)=""/203, 0x40f00, 0x13, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000a00)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000000a40)={0x4, 0xd, 0xb1, 0x1}, 0x10}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x20}, 0x48) r4 = openat$cgroup_ro(r2, &(0x7f00000003c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001580)={0x11, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1841000000000000ba"], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x1003, &(0x7f0000001a40)=""/4099, 0x41100, 0x0, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001500)={0x2, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000005c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4, r3, r4, r3, r2, 0xffffffffffffffff]}, 0x80) bpf$ITER_CREATE(0x21, &(0x7f0000000240), 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000019c0)={0x18, 0xd, &(0x7f0000000700)=ANY=[@ANYBLOB="180000000500000000000000000200009500000000000000184a0000fbffffff000000000000000018500000050000000000000000000000185900000200000000000000000000001761180010000000182a0000efad356868ed500603f59c3bbbfed90e3d64c8d53c0b", @ANYRES32=r3, @ANYBLOB="000000000609792aae009500000000000000b48a198aecf38a953f36f29dc82c3a4cf250071e2af84be2ec643aedfc0f4d2b5c21274cc79acffe59095f849b27b2bc41f2e1f783a7bafaed7bab43bd2cfbeae775896cd14abc28b10000000000000000000000000018877b7373f9980db834e1e196cedd5abc79f0d65d81c7cb40cfdfbb0eb0948b8be2c5c438d9502d421705953ebf48810411b14ba32999df9d456cf293d67032cfc4bf29cdd8e7042c23867f234cce3b9a4d6fa3429472352f3ee7d254776444adb59f7607a09ac3ce090738e39e2156e0f409f581960ec3ee7b296b861cd926d9b3c56621bd4695695e53c5d6cf70e73752d6f60ee598930819"], &(0x7f0000000000)='GPL\x00', 0x5, 0x62, &(0x7f0000001740)=""/98, 0x40f00, 0x14, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001880)={0x1, 0x1}, 0x8, 0x10, &(0x7f00000018c0)={0x4, 0x2, 0x81, 0x10000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001980)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, 0xffffffffffffffff, r2]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x14, 0x0, 0x0, 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0xf3, 0x3, 0x4, 0x40, 0x0, 0x200000000000000, 0xbc0a0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x848, 0x2, 0x3, 0x7, 0x8, 0x0, 0x7, 0x0, 0x1000000, 0x0, 0x80000001}, 0x0, 0x8, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r6, &(0x7f0000000000), 0x248800) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0xc, &(0x7f00000002c0)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffff8}, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @generic={0x9c, 0x4, 0x8, 0x2c, 0x20}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x1}, @generic={0x0, 0xe, 0xb, 0xbd5, 0x42}, @alu={0x7, 0x1, 0xd, 0xb, 0x0, 0x10, 0xfffffffffffffff0}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @generic={0x0, 0x7, 0x3, 0x101, 0x7ff}], &(0x7f0000000540)='syzkaller\x00', 0x3, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0x10, 0x0, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000640)=[r6, r7]}, 0x80) 04:39:25 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffec850000006d0000008500000008"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='rdma.current\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a80)={0x18, 0xa, &(0x7f00000004c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7f}, [@map_idx={0x18, 0x7, 0x5, 0x0, 0x10}, @cb_func={0x18, 0x9, 0x4, 0x0, 0x6}, @cb_func={0x18, 0x2, 0x4, 0x0, 0xfffffffffffffffd}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}]}, &(0x7f00000008c0)='syzkaller\x00', 0xbfe, 0xcb, &(0x7f0000000900)=""/203, 0x40f00, 0x13, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000a00)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000000a40)={0x4, 0xd, 0xb1, 0x1}, 0x10}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x20}, 0x48) r4 = openat$cgroup_ro(r2, &(0x7f00000003c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001580)={0x11, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1841000000000000ba"], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x1003, &(0x7f0000001a40)=""/4099, 0x41100, 0x0, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001500)={0x2, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000005c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4, r3, r4, r3, r2, 0xffffffffffffffff]}, 0x80) bpf$ITER_CREATE(0x21, &(0x7f0000000240), 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000019c0)={0x18, 0xd, &(0x7f0000000700)=ANY=[@ANYBLOB="180000000500000000000000000200009500000000000000184a0000fbffffff000000000000000018500000050000000000000000000000185900000200000000000000000000001761180010000000182a0000efad356868ed500603f59c3bbbfed90e3d64c8d53c0b", @ANYRES32=r3, @ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x62, &(0x7f0000001740)=""/98, 0x40f00, 0x14, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001880)={0x1, 0x1}, 0x8, 0x10, &(0x7f00000018c0)={0x4, 0x2, 0x81, 0x10000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001980)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, 0xffffffffffffffff, r2]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x14, 0x0, 0x0, 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0xf3, 0x3, 0x4, 0x40, 0x0, 0x200000000000000, 0xbc0a0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x848, 0x2, 0x3, 0x7, 0x8, 0x0, 0x7, 0x0, 0x1000000, 0x0, 0x80000001}, 0x0, 0x8, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r6, &(0x7f0000000000), 0x248800) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0xc, &(0x7f00000002c0)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffff8}, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @generic={0x9c, 0x4, 0x8, 0x2c, 0x20}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x1}, @generic={0x0, 0xe, 0xb, 0xbd5, 0x42}, @alu={0x7, 0x1, 0xd, 0xb, 0x0, 0x10, 0xfffffffffffffff0}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @generic={0x0, 0x7, 0x3, 0x101, 0x7ff}], &(0x7f0000000540)='syzkaller\x00', 0x3, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0x10, 0x0, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000640)=[r6, r7]}, 0x80) 04:39:25 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffec850000006d0000008500000008"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='rdma.current\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a80)={0x18, 0xa, &(0x7f00000004c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7f}, [@map_idx={0x18, 0x7, 0x5, 0x0, 0x10}, @cb_func={0x18, 0x9, 0x4, 0x0, 0x6}, @cb_func={0x18, 0x2, 0x4, 0x0, 0xfffffffffffffffd}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}]}, &(0x7f00000008c0)='syzkaller\x00', 0xbfe, 0xcb, &(0x7f0000000900)=""/203, 0x40f00, 0x13, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000a00)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000000a40)={0x4, 0xd, 0xb1, 0x1}, 0x10}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x20}, 0x48) r4 = openat$cgroup_ro(r2, &(0x7f00000003c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001580)={0x11, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1841000000000000ba"], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x1003, &(0x7f0000001a40)=""/4099, 0x41100, 0x0, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001500)={0x2, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000005c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4, r3, r4, r3, r2, 0xffffffffffffffff]}, 0x80) bpf$ITER_CREATE(0x21, &(0x7f0000000240), 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000019c0)={0x18, 0xd, &(0x7f0000000700)=ANY=[@ANYBLOB="180000000500000000000000000200009500000000000000184a0000fbffffff000000000000000018500000050000000000000000000000185900000200000000000000000000001761180010000000182a0000efad356868ed500603f59c3bbbfed90e3d64c8d53c0b", @ANYRES32=r3, @ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x62, &(0x7f0000001740)=""/98, 0x40f00, 0x14, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001880)={0x1, 0x1}, 0x8, 0x10, &(0x7f00000018c0)={0x4, 0x2, 0x81, 0x10000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001980)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, 0xffffffffffffffff, r2]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x14, 0x0, 0x0, 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0xf3, 0x3, 0x4, 0x40, 0x0, 0x200000000000000, 0xbc0a0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x848, 0x2, 0x3, 0x7, 0x8, 0x0, 0x7, 0x0, 0x1000000, 0x0, 0x80000001}, 0x0, 0x8, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r6, &(0x7f0000000000), 0x248800) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0xc, &(0x7f00000002c0)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffff8}, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @generic={0x9c, 0x4, 0x8, 0x2c, 0x20}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x1}, @generic={0x0, 0xe, 0xb, 0xbd5, 0x42}, @alu={0x7, 0x1, 0xd, 0xb, 0x0, 0x10, 0xfffffffffffffff0}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @generic={0x0, 0x7, 0x3, 0x101, 0x7ff}], &(0x7f0000000540)='syzkaller\x00', 0x3, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0x10, 0x0, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000640)=[r6, r7]}, 0x80) 04:39:25 executing program 0: r0 = semget$private(0x0, 0x3, 0x0) syz_emit_ethernet(0x6e, &(0x7f0000000180)={@broadcast, @link_local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "00f7ff", 0x38, 0x3a, 0x0, @local, @mcast2, {[], @param_prob={0x4, 0x0, 0x0, 0x0, {0x0, 0x6, 'BNE', 0x0, 0x33, 0x0, @local, @mcast2, [@hopopts={0x33}]}}}}}}}, 0x0) semop(r0, &(0x7f0000000000)=[{0x0, 0x7f}, {}], 0x2) r1 = semget(0x3, 0x7, 0x84) syz_emit_ethernet(0x5e, &(0x7f0000000200)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, @val={@val={0x9100, 0x5, 0x1, 0x2}, {0x8100, 0x5, 0x1, 0x9}}, {@canfd={0xd, {{0x4, 0x0, 0x1, 0x1}, 0x2a, 0x2, 0x0, 0x0, "e80372277012b14546b8d1556b7c48089694c79943e29da9d61302cc012935751915a5b8f8c411591dcb04c36dfbfa422aec04ec38887087917d848daa48cbd2"}}}}, &(0x7f0000000280)={0x1, 0x3, [0xb4c, 0x143, 0x6ce, 0x43]}) semtimedop(r1, &(0x7f0000000080)=[{0x4, 0x3, 0x800}, {0x2, 0x55, 0x1000}, {0x4, 0x4}, {0x1, 0x4, 0x1800}, {0x2, 0x4, 0x1000}, {0x2, 0xf716}], 0x6, &(0x7f00000000c0)={0x77359400}) semop(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x1000}], 0x1) r2 = semget(0x2, 0x1, 0x4a0) semctl$IPC_RMID(r2, 0x0, 0x0) semop(r2, &(0x7f0000000040)=[{0x2, 0x7f, 0x800}, {0x3, 0x0, 0x1800}, {0x1, 0xfff0, 0x1800}, {0x2, 0x1f}, {0x3, 0x2, 0x800}], 0x5) r3 = semget$private(0x0, 0x3, 0x0) semop(r3, &(0x7f0000000000)=[{0x0, 0x7f}, {}], 0x2) semctl$IPC_SET(r3, 0x0, 0x1, &(0x7f00000000c0)={{0x0, 0xffffffffffffffff, 0x0, 0xee01}}) syz_emit_ethernet(0xe9, &(0x7f00000002c0)={@empty, @multicast, @val={@val={0x9100, 0x4, 0x0, 0x1}, {0x8100, 0x2, 0x1, 0x4}}, {@llc={0x4, {@llc={0x4e, 0x0, 'a ', "9384587d2d271d9d63d163f3f7abfbcc4243b24146afbe363554325724f12f2f6cce7c3535adb903ff113585a0794319f9916e9a2699b48cfc7a03b7adc3273ffa8055ef69fce9448202d98af0b566788009741743f759d0e8becd9ba0b2db5fdb68e81c82d5cb5bf22485a47a73a57218a3719a704df3e44b1c19626c5af1ecc7104b6cfeee91b133664a490a541f90fc84d15bc79dc0f237590581e052681596cd6bfd5f4543b40a19d32c2cb320bc2710606ae1b05428408c39ece699fab4e2615ecc282d5215c521885a427a11"}}}}}, &(0x7f0000000400)={0x1, 0x3, [0x282, 0xbf1, 0x7ac, 0x2ab]}) semtimedop(r3, &(0x7f0000000100)=[{0x3, 0x0, 0x1800}, {0x2, 0x9, 0x1000}], 0x2, &(0x7f0000000140)={0x0, 0x3938700}) 04:39:25 executing program 4: r0 = semget$private(0x0, 0x3, 0x0) syz_emit_ethernet(0x6e, &(0x7f0000000180)={@broadcast, @link_local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "00f7ff", 0x38, 0x3a, 0x0, @local, @mcast2, {[], @param_prob={0x4, 0x0, 0x0, 0x0, {0x0, 0x6, 'BNE', 0x0, 0x33, 0x0, @local, @mcast2, [@hopopts={0x33}]}}}}}}}, 0x0) semop(r0, &(0x7f0000000000)=[{0x0, 0x7f}, {}], 0x2) r1 = semget(0x3, 0x7, 0x84) syz_emit_ethernet(0x5e, &(0x7f0000000200)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, @val={@val={0x9100, 0x5, 0x1, 0x2}, {0x8100, 0x5, 0x1, 0x9}}, {@canfd={0xd, {{0x4, 0x0, 0x1, 0x1}, 0x2a, 0x2, 0x0, 0x0, "e80372277012b14546b8d1556b7c48089694c79943e29da9d61302cc012935751915a5b8f8c411591dcb04c36dfbfa422aec04ec38887087917d848daa48cbd2"}}}}, &(0x7f0000000280)={0x1, 0x3, [0xb4c, 0x143, 0x6ce, 0x43]}) semtimedop(r1, &(0x7f0000000080)=[{0x4, 0x3, 0x800}, {0x2, 0x55, 0x1000}, {0x4, 0x4}, {0x1, 0x4, 0x1800}, {0x2, 0x4, 0x1000}, {0x2, 0xf716}], 0x6, &(0x7f00000000c0)={0x77359400}) semop(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x1000}], 0x1) r2 = semget(0x2, 0x1, 0x4a0) semctl$IPC_RMID(r2, 0x0, 0x0) semop(r2, &(0x7f0000000040)=[{0x2, 0x7f, 0x800}, {0x3, 0x0, 0x1800}, {0x1, 0xfff0, 0x1800}, {0x2, 0x1f}, {0x3, 0x2, 0x800}], 0x5) r3 = semget$private(0x0, 0x3, 0x0) semop(r3, &(0x7f0000000000)=[{0x0, 0x7f}, {}], 0x2) semctl$IPC_SET(r3, 0x0, 0x1, &(0x7f00000000c0)={{0x0, 0xffffffffffffffff, 0x0, 0xee01}}) syz_emit_ethernet(0xe9, &(0x7f00000002c0)={@empty, @multicast, @val={@val={0x9100, 0x4, 0x0, 0x1}, {0x8100, 0x2, 0x1, 0x4}}, {@llc={0x4, {@llc={0x4e, 0x0, 'a ', "9384587d2d271d9d63d163f3f7abfbcc4243b24146afbe363554325724f12f2f6cce7c3535adb903ff113585a0794319f9916e9a2699b48cfc7a03b7adc3273ffa8055ef69fce9448202d98af0b566788009741743f759d0e8becd9ba0b2db5fdb68e81c82d5cb5bf22485a47a73a57218a3719a704df3e44b1c19626c5af1ecc7104b6cfeee91b133664a490a541f90fc84d15bc79dc0f237590581e052681596cd6bfd5f4543b40a19d32c2cb320bc2710606ae1b05428408c39ece699fab4e2615ecc282d5215c521885a427a11"}}}}}, &(0x7f0000000400)={0x1, 0x3, [0x282, 0xbf1, 0x7ac, 0x2ab]}) semtimedop(r3, &(0x7f0000000100)=[{0x3, 0x0, 0x1800}, {0x2, 0x9, 0x1000}], 0x2, &(0x7f0000000140)={0x0, 0x3938700}) 04:39:25 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffec850000006d0000008500000008"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='rdma.current\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a80)={0x18, 0xa, &(0x7f00000004c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7f}, [@map_idx={0x18, 0x7, 0x5, 0x0, 0x10}, @cb_func={0x18, 0x9, 0x4, 0x0, 0x6}, @cb_func={0x18, 0x2, 0x4, 0x0, 0xfffffffffffffffd}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}]}, &(0x7f00000008c0)='syzkaller\x00', 0xbfe, 0xcb, &(0x7f0000000900)=""/203, 0x40f00, 0x13, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000a00)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000000a40)={0x4, 0xd, 0xb1, 0x1}, 0x10}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x20}, 0x48) r4 = openat$cgroup_ro(r2, &(0x7f00000003c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001580)={0x11, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1841000000000000ba"], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x1003, &(0x7f0000001a40)=""/4099, 0x41100, 0x0, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001500)={0x2, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000005c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4, r3, r4, r3, r2, 0xffffffffffffffff]}, 0x80) bpf$ITER_CREATE(0x21, &(0x7f0000000240), 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000019c0)={0x18, 0xd, &(0x7f0000000700)=ANY=[@ANYBLOB="180000000500000000000000000200009500000000000000184a0000fbffffff000000000000000018500000050000000000000000000000185900000200000000000000000000001761180010000000182a0000efad356868ed500603f59c3bbbfed90e3d64c8d53c0b", @ANYRES32=r3, @ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x62, &(0x7f0000001740)=""/98, 0x40f00, 0x14, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001880)={0x1, 0x1}, 0x8, 0x10, &(0x7f00000018c0)={0x4, 0x2, 0x81, 0x10000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001980)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, 0xffffffffffffffff, r2]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x14, 0x0, 0x0, 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0xf3, 0x3, 0x4, 0x40, 0x0, 0x200000000000000, 0xbc0a0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x848, 0x2, 0x3, 0x7, 0x8, 0x0, 0x7, 0x0, 0x1000000, 0x0, 0x80000001}, 0x0, 0x8, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r6, &(0x7f0000000000), 0x248800) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0xc, &(0x7f00000002c0)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffff8}, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @generic={0x9c, 0x4, 0x8, 0x2c, 0x20}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x1}, @generic={0x0, 0xe, 0xb, 0xbd5, 0x42}, @alu={0x7, 0x1, 0xd, 0xb, 0x0, 0x10, 0xfffffffffffffff0}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @generic={0x0, 0x7, 0x3, 0x101, 0x7ff}], &(0x7f0000000540)='syzkaller\x00', 0x3, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0x10, 0x0, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000640)=[r6, r7]}, 0x80) 04:39:25 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffec850000006d0000008500000008"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='rdma.current\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a80)={0x18, 0xa, &(0x7f00000004c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7f}, [@map_idx={0x18, 0x7, 0x5, 0x0, 0x10}, @cb_func={0x18, 0x9, 0x4, 0x0, 0x6}, @cb_func={0x18, 0x2, 0x4, 0x0, 0xfffffffffffffffd}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}]}, &(0x7f00000008c0)='syzkaller\x00', 0xbfe, 0xcb, &(0x7f0000000900)=""/203, 0x40f00, 0x13, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000a00)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000000a40)={0x4, 0xd, 0xb1, 0x1}, 0x10}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x20}, 0x48) r4 = openat$cgroup_ro(r2, &(0x7f00000003c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001580)={0x11, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1841000000000000ba"], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x1003, &(0x7f0000001a40)=""/4099, 0x41100, 0x0, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001500)={0x2, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000005c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4, r3, r4, r3, r2, 0xffffffffffffffff]}, 0x80) bpf$ITER_CREATE(0x21, &(0x7f0000000240), 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000019c0)={0x18, 0xd, &(0x7f0000000700)=ANY=[@ANYBLOB="180000000500000000000000000200009500000000000000184a0000fbffffff000000000000000018500000050000000000000000000000185900000200000000000000000000001761180010000000182a0000efad356868ed500603f59c3bbbfed90e3d64c8d53c0b", @ANYRES32=r3, @ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x62, &(0x7f0000001740)=""/98, 0x40f00, 0x14, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001880)={0x1, 0x1}, 0x8, 0x10, &(0x7f00000018c0)={0x4, 0x2, 0x81, 0x10000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001980)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, 0xffffffffffffffff, r2]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x14, 0x0, 0x0, 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0xf3, 0x3, 0x4, 0x40, 0x0, 0x200000000000000, 0xbc0a0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x848, 0x2, 0x3, 0x7, 0x8, 0x0, 0x7, 0x0, 0x1000000, 0x0, 0x80000001}, 0x0, 0x8, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r6, &(0x7f0000000000), 0x248800) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0xc, &(0x7f00000002c0)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffff8}, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @generic={0x9c, 0x4, 0x8, 0x2c, 0x20}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x1}, @generic={0x0, 0xe, 0xb, 0xbd5, 0x42}, @alu={0x7, 0x1, 0xd, 0xb, 0x0, 0x10, 0xfffffffffffffff0}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @generic={0x0, 0x7, 0x3, 0x101, 0x7ff}], &(0x7f0000000540)='syzkaller\x00', 0x3, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0x10, 0x0, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000640)=[r6, r7]}, 0x80) 04:39:25 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffec850000006d0000008500000008"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='rdma.current\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a80)={0x18, 0xa, &(0x7f00000004c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7f}, [@map_idx={0x18, 0x7, 0x5, 0x0, 0x10}, @cb_func={0x18, 0x9, 0x4, 0x0, 0x6}, @cb_func={0x18, 0x2, 0x4, 0x0, 0xfffffffffffffffd}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}]}, &(0x7f00000008c0)='syzkaller\x00', 0xbfe, 0xcb, &(0x7f0000000900)=""/203, 0x40f00, 0x13, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000a00)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000000a40)={0x4, 0xd, 0xb1, 0x1}, 0x10}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x20}, 0x48) r4 = openat$cgroup_ro(r2, &(0x7f00000003c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001580)={0x11, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1841000000000000ba"], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x1003, &(0x7f0000001a40)=""/4099, 0x41100, 0x0, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001500)={0x2, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000005c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4, r3, r4, r3, r2, 0xffffffffffffffff]}, 0x80) bpf$ITER_CREATE(0x21, &(0x7f0000000240), 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000019c0)={0x18, 0xd, &(0x7f0000000700)=ANY=[@ANYBLOB="180000000500000000000000000200009500000000000000184a0000fbffffff000000000000000018500000050000000000000000000000185900000200000000000000000000001761180010000000182a0000efad356868ed500603f59c3bbbfed90e3d64c8d53c0b", @ANYRES32=r3, @ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x62, &(0x7f0000001740)=""/98, 0x40f00, 0x14, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001880)={0x1, 0x1}, 0x8, 0x10, &(0x7f00000018c0)={0x4, 0x2, 0x81, 0x10000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001980)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, 0xffffffffffffffff, r2]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x14, 0x0, 0x0, 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0xf3, 0x3, 0x4, 0x40, 0x0, 0x200000000000000, 0xbc0a0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x848, 0x2, 0x3, 0x7, 0x8, 0x0, 0x7, 0x0, 0x1000000, 0x0, 0x80000001}, 0x0, 0x8, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r6, &(0x7f0000000000), 0x248800) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0xc, &(0x7f00000002c0)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffff8}, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @generic={0x9c, 0x4, 0x8, 0x2c, 0x20}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x1}, @generic={0x0, 0xe, 0xb, 0xbd5, 0x42}, @alu={0x7, 0x1, 0xd, 0xb, 0x0, 0x10, 0xfffffffffffffff0}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @generic={0x0, 0x7, 0x3, 0x101, 0x7ff}], &(0x7f0000000540)='syzkaller\x00', 0x3, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0x10, 0x0, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000640)=[r6, r7]}, 0x80) 04:39:26 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffec850000006d0000008500000008"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='rdma.current\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a80)={0x18, 0xa, &(0x7f00000004c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7f}, [@map_idx={0x18, 0x7, 0x5, 0x0, 0x10}, @cb_func={0x18, 0x9, 0x4, 0x0, 0x6}, @cb_func={0x18, 0x2, 0x4, 0x0, 0xfffffffffffffffd}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}]}, &(0x7f00000008c0)='syzkaller\x00', 0xbfe, 0xcb, &(0x7f0000000900)=""/203, 0x40f00, 0x13, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000a00)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000000a40)={0x4, 0xd, 0xb1, 0x1}, 0x10}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x20}, 0x48) r4 = openat$cgroup_ro(r2, &(0x7f00000003c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001580)={0x11, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1841000000000000ba"], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x1003, &(0x7f0000001a40)=""/4099, 0x41100, 0x0, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001500)={0x2, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000005c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4, r3, r4, r3, r2, 0xffffffffffffffff]}, 0x80) bpf$ITER_CREATE(0x21, &(0x7f0000000240), 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000019c0)={0x18, 0xd, &(0x7f0000000700)=ANY=[@ANYBLOB="180000000500000000000000000200009500000000000000184a0000fbffffff000000000000000018500000050000000000000000000000185900000200000000000000000000001761180010000000182a0000efad356868ed500603f59c3bbbfed90e3d64c8d53c0b", @ANYRES32=r3, @ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x62, &(0x7f0000001740)=""/98, 0x40f00, 0x14, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001880)={0x1, 0x1}, 0x8, 0x10, &(0x7f00000018c0)={0x4, 0x2, 0x81, 0x10000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001980)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, 0xffffffffffffffff, r2]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x14, 0x0, 0x0, 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0xf3, 0x3, 0x4, 0x40, 0x0, 0x200000000000000, 0xbc0a0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x848, 0x2, 0x3, 0x7, 0x8, 0x0, 0x7, 0x0, 0x1000000, 0x0, 0x80000001}, 0x0, 0x8, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r6, &(0x7f0000000000), 0x248800) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0xc, &(0x7f00000002c0)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffff8}, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @generic={0x9c, 0x4, 0x8, 0x2c, 0x20}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x1}, @generic={0x0, 0xe, 0xb, 0xbd5, 0x42}, @alu={0x7, 0x1, 0xd, 0xb, 0x0, 0x10, 0xfffffffffffffff0}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @generic={0x0, 0x7, 0x3, 0x101, 0x7ff}], &(0x7f0000000540)='syzkaller\x00', 0x3, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0x10, 0x0, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000640)=[r6, r7]}, 0x80) 04:39:26 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffec850000006d0000008500000008"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='rdma.current\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a80)={0x18, 0xa, &(0x7f00000004c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7f}, [@map_idx={0x18, 0x7, 0x5, 0x0, 0x10}, @cb_func={0x18, 0x9, 0x4, 0x0, 0x6}, @cb_func={0x18, 0x2, 0x4, 0x0, 0xfffffffffffffffd}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}]}, &(0x7f00000008c0)='syzkaller\x00', 0xbfe, 0xcb, &(0x7f0000000900)=""/203, 0x40f00, 0x13, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000a00)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000000a40)={0x4, 0xd, 0xb1, 0x1}, 0x10}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x20}, 0x48) r4 = openat$cgroup_ro(r2, &(0x7f00000003c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001580)={0x11, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1841000000000000ba"], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x1003, &(0x7f0000001a40)=""/4099, 0x41100, 0x0, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001500)={0x2, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000005c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4, r3, r4, r3, r2, 0xffffffffffffffff]}, 0x80) bpf$ITER_CREATE(0x21, &(0x7f0000000240), 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000019c0)={0x18, 0xd, &(0x7f0000000700)=ANY=[@ANYBLOB="180000000500000000000000000200009500000000000000184a0000fbffffff000000000000000018500000050000000000000000000000185900000200000000000000000000001761180010000000182a0000efad356868ed500603f59c3bbbfed90e3d64c8d53c0b", @ANYRES32=r3, @ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x62, &(0x7f0000001740)=""/98, 0x40f00, 0x14, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001880)={0x1, 0x1}, 0x8, 0x10, &(0x7f00000018c0)={0x4, 0x2, 0x81, 0x10000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001980)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, 0xffffffffffffffff, r2]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x14, 0x0, 0x0, 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0xf3, 0x3, 0x4, 0x40, 0x0, 0x200000000000000, 0xbc0a0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x848, 0x2, 0x3, 0x7, 0x8, 0x0, 0x7, 0x0, 0x1000000, 0x0, 0x80000001}, 0x0, 0x8, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r6, &(0x7f0000000000), 0x248800) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0xc, &(0x7f00000002c0)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffff8}, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @generic={0x9c, 0x4, 0x8, 0x2c, 0x20}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x1}, @generic={0x0, 0xe, 0xb, 0xbd5, 0x42}, @alu={0x7, 0x1, 0xd, 0xb, 0x0, 0x10, 0xfffffffffffffff0}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @generic={0x0, 0x7, 0x3, 0x101, 0x7ff}], &(0x7f0000000540)='syzkaller\x00', 0x3, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0x10, 0x0, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000640)=[r6, r7]}, 0x80) 04:39:26 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffec850000006d0000008500000008"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='rdma.current\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a80)={0x18, 0xa, &(0x7f00000004c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7f}, [@map_idx={0x18, 0x7, 0x5, 0x0, 0x10}, @cb_func={0x18, 0x9, 0x4, 0x0, 0x6}, @cb_func={0x18, 0x2, 0x4, 0x0, 0xfffffffffffffffd}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}]}, &(0x7f00000008c0)='syzkaller\x00', 0xbfe, 0xcb, &(0x7f0000000900)=""/203, 0x40f00, 0x13, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000a00)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000000a40)={0x4, 0xd, 0xb1, 0x1}, 0x10}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x20}, 0x48) r4 = openat$cgroup_ro(r2, &(0x7f00000003c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001580)={0x11, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1841000000000000ba"], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x1003, &(0x7f0000001a40)=""/4099, 0x41100, 0x0, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001500)={0x2, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000005c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4, r3, r4, r3, r2, 0xffffffffffffffff]}, 0x80) bpf$ITER_CREATE(0x21, &(0x7f0000000240), 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000019c0)={0x18, 0xd, &(0x7f0000000700)=ANY=[@ANYBLOB="180000000500000000000000000200009500000000000000184a0000fbffffff000000000000000018500000050000000000000000000000185900000200000000000000000000001761180010000000182a0000efad356868ed500603f59c3bbbfed90e3d64c8d53c0b", @ANYRES32=r3, @ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x62, &(0x7f0000001740)=""/98, 0x40f00, 0x14, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001880)={0x1, 0x1}, 0x8, 0x10, &(0x7f00000018c0)={0x4, 0x2, 0x81, 0x10000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001980)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, 0xffffffffffffffff, r2]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x14, 0x0, 0x0, 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0xf3, 0x3, 0x4, 0x40, 0x0, 0x200000000000000, 0xbc0a0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x848, 0x2, 0x3, 0x7, 0x8, 0x0, 0x7, 0x0, 0x1000000, 0x0, 0x80000001}, 0x0, 0x8, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r6, &(0x7f0000000000), 0x248800) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0xc, &(0x7f00000002c0)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffff8}, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @generic={0x9c, 0x4, 0x8, 0x2c, 0x20}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x1}, @generic={0x0, 0xe, 0xb, 0xbd5, 0x42}, @alu={0x7, 0x1, 0xd, 0xb, 0x0, 0x10, 0xfffffffffffffff0}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @generic={0x0, 0x7, 0x3, 0x101, 0x7ff}], &(0x7f0000000540)='syzkaller\x00', 0x3, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0x10, 0x0, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000640)=[r6, r7]}, 0x80) 04:39:26 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffec850000006d0000008500000008"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='rdma.current\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a80)={0x18, 0xa, &(0x7f00000004c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7f}, [@map_idx={0x18, 0x7, 0x5, 0x0, 0x10}, @cb_func={0x18, 0x9, 0x4, 0x0, 0x6}, @cb_func={0x18, 0x2, 0x4, 0x0, 0xfffffffffffffffd}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}]}, &(0x7f00000008c0)='syzkaller\x00', 0xbfe, 0xcb, &(0x7f0000000900)=""/203, 0x40f00, 0x13, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000a00)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000000a40)={0x4, 0xd, 0xb1, 0x1}, 0x10}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x20}, 0x48) r4 = openat$cgroup_ro(r2, &(0x7f00000003c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001580)={0x11, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1841000000000000ba"], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x1003, &(0x7f0000001a40)=""/4099, 0x41100, 0x0, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001500)={0x2, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000005c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4, r3, r4, r3, r2, 0xffffffffffffffff]}, 0x80) bpf$ITER_CREATE(0x21, &(0x7f0000000240), 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000019c0)={0x18, 0xd, &(0x7f0000000700)=ANY=[@ANYBLOB="180000000500000000000000000200009500000000000000184a0000fbffffff000000000000000018500000050000000000000000000000185900000200000000000000000000001761180010000000182a0000efad356868ed500603f59c3bbbfed90e3d64c8d53c0b", @ANYRES32=r3, @ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x62, &(0x7f0000001740)=""/98, 0x40f00, 0x14, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001880)={0x1, 0x1}, 0x8, 0x10, &(0x7f00000018c0)={0x4, 0x2, 0x81, 0x10000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001980)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, 0xffffffffffffffff, r2]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x14, 0x0, 0x0, 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0xf3, 0x3, 0x4, 0x40, 0x0, 0x200000000000000, 0xbc0a0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x848, 0x2, 0x3, 0x7, 0x8, 0x0, 0x7, 0x0, 0x1000000, 0x0, 0x80000001}, 0x0, 0x8, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r6, &(0x7f0000000000), 0x248800) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0xc, &(0x7f00000002c0)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffff8}, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @generic={0x9c, 0x4, 0x8, 0x2c, 0x20}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x1}, @generic={0x0, 0xe, 0xb, 0xbd5, 0x42}, @alu={0x7, 0x1, 0xd, 0xb, 0x0, 0x10, 0xfffffffffffffff0}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @generic={0x0, 0x7, 0x3, 0x101, 0x7ff}], &(0x7f0000000540)='syzkaller\x00', 0x3, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0x10, 0x0, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000640)=[r6, r7]}, 0x80) 04:39:26 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffec850000006d0000008500000008"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='rdma.current\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a80)={0x18, 0xa, &(0x7f00000004c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7f}, [@map_idx={0x18, 0x7, 0x5, 0x0, 0x10}, @cb_func={0x18, 0x9, 0x4, 0x0, 0x6}, @cb_func={0x18, 0x2, 0x4, 0x0, 0xfffffffffffffffd}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}]}, &(0x7f00000008c0)='syzkaller\x00', 0xbfe, 0xcb, &(0x7f0000000900)=""/203, 0x40f00, 0x13, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000a00)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000000a40)={0x4, 0xd, 0xb1, 0x1}, 0x10}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x20}, 0x48) r4 = openat$cgroup_ro(r2, &(0x7f00000003c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001580)={0x11, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1841000000000000ba"], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x1003, &(0x7f0000001a40)=""/4099, 0x41100, 0x0, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001500)={0x2, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000005c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4, r3, r4, r3, r2, 0xffffffffffffffff]}, 0x80) bpf$ITER_CREATE(0x21, &(0x7f0000000240), 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000019c0)={0x18, 0xd, &(0x7f0000000700)=ANY=[@ANYBLOB="180000000500000000000000000200009500000000000000184a0000fbffffff000000000000000018500000050000000000000000000000185900000200000000000000000000001761180010000000182a0000efad356868ed500603f59c3bbbfed90e3d64c8d53c0b", @ANYRES32=r3, @ANYBLOB="000000000609792aae009500000000000000b48a198aecf38a953f36f29dc82c3a4cf250071e2af84be2ec643aedfc0f4d2b5c21274cc79acffe59095f849b27b2bc41f2e1f783a7bafaed7bab43bd2cfbeae775896cd14abc28b10000000000000000000000000018877b7373f9980db834e1e196cedd5abc79f0d65d81c7cb40cfdfbb0eb0948b8be2c5c438d9502d421705953ebf48810411b14ba32999df9d456cf293d67032cfc4bf29cdd8e7042c23867f234cce3b9a4d6fa3429472352f3ee7d254776444adb59f7607a09ac3ce090738e39e2156e0f409f581960ec3ee7b296b861cd926d9b3c56621bd4695695e53c5d6cf70e73752d6f60ee598930819"], &(0x7f0000000000)='GPL\x00', 0x5, 0x62, &(0x7f0000001740)=""/98, 0x40f00, 0x14, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001880)={0x1, 0x1}, 0x8, 0x10, &(0x7f00000018c0)={0x4, 0x2, 0x81, 0x10000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001980)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, 0xffffffffffffffff, r2]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x14, 0x0, 0x0, 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0xf3, 0x3, 0x4, 0x40, 0x0, 0x200000000000000, 0xbc0a0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x848, 0x2, 0x3, 0x7, 0x8, 0x0, 0x7, 0x0, 0x1000000, 0x0, 0x80000001}, 0x0, 0x8, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r6, &(0x7f0000000000), 0x248800) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0xc, &(0x7f00000002c0)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffff8}, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @generic={0x9c, 0x4, 0x8, 0x2c, 0x20}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x1}, @generic={0x0, 0xe, 0xb, 0xbd5, 0x42}, @alu={0x7, 0x1, 0xd, 0xb, 0x0, 0x10, 0xfffffffffffffff0}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @generic={0x0, 0x7, 0x3, 0x101, 0x7ff}], &(0x7f0000000540)='syzkaller\x00', 0x3, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0x10, 0x0, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000640)=[r6, r7]}, 0x80) 04:39:26 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffec850000006d0000008500000008"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='rdma.current\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a80)={0x18, 0xa, &(0x7f00000004c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7f}, [@map_idx={0x18, 0x7, 0x5, 0x0, 0x10}, @cb_func={0x18, 0x9, 0x4, 0x0, 0x6}, @cb_func={0x18, 0x2, 0x4, 0x0, 0xfffffffffffffffd}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}]}, &(0x7f00000008c0)='syzkaller\x00', 0xbfe, 0xcb, &(0x7f0000000900)=""/203, 0x40f00, 0x13, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000a00)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000000a40)={0x4, 0xd, 0xb1, 0x1}, 0x10}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x20}, 0x48) r4 = openat$cgroup_ro(r2, &(0x7f00000003c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001580)={0x11, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1841000000000000ba"], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x1003, &(0x7f0000001a40)=""/4099, 0x41100, 0x0, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001500)={0x2, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000005c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4, r3, r4, r3, r2, 0xffffffffffffffff]}, 0x80) bpf$ITER_CREATE(0x21, &(0x7f0000000240), 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000019c0)={0x18, 0xd, &(0x7f0000000700)=ANY=[@ANYBLOB="180000000500000000000000000200009500000000000000184a0000fbffffff000000000000000018500000050000000000000000000000185900000200000000000000000000001761180010000000182a0000efad356868ed500603f59c3bbbfed90e3d64c8d53c0b", @ANYRES32=r3, @ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x62, &(0x7f0000001740)=""/98, 0x40f00, 0x14, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001880)={0x1, 0x1}, 0x8, 0x10, &(0x7f00000018c0)={0x4, 0x2, 0x81, 0x10000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001980)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, 0xffffffffffffffff, r2]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x14, 0x0, 0x0, 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0xf3, 0x3, 0x4, 0x40, 0x0, 0x200000000000000, 0xbc0a0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x848, 0x2, 0x3, 0x7, 0x8, 0x0, 0x7, 0x0, 0x1000000, 0x0, 0x80000001}, 0x0, 0x8, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r6, &(0x7f0000000000), 0x248800) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0xc, &(0x7f00000002c0)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffff8}, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @generic={0x9c, 0x4, 0x8, 0x2c, 0x20}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x1}, @generic={0x0, 0xe, 0xb, 0xbd5, 0x42}, @alu={0x7, 0x1, 0xd, 0xb, 0x0, 0x10, 0xfffffffffffffff0}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @generic={0x0, 0x7, 0x3, 0x101, 0x7ff}], &(0x7f0000000540)='syzkaller\x00', 0x3, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0x10, 0x0, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000640)=[r6, r7]}, 0x80) 04:39:32 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffec850000006d0000008500000008"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='rdma.current\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a80)={0x18, 0xa, &(0x7f00000004c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7f}, [@map_idx={0x18, 0x7, 0x5, 0x0, 0x10}, @cb_func={0x18, 0x9, 0x4, 0x0, 0x6}, @cb_func={0x18, 0x2, 0x4, 0x0, 0xfffffffffffffffd}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}]}, &(0x7f00000008c0)='syzkaller\x00', 0xbfe, 0xcb, &(0x7f0000000900)=""/203, 0x40f00, 0x13, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000a00)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000000a40)={0x4, 0xd, 0xb1, 0x1}, 0x10}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x20}, 0x48) r4 = openat$cgroup_ro(r2, &(0x7f00000003c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001580)={0x11, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1841000000000000ba"], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x1003, &(0x7f0000001a40)=""/4099, 0x41100, 0x0, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001500)={0x2, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000005c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4, r3, r4, r3, r2, 0xffffffffffffffff]}, 0x80) bpf$ITER_CREATE(0x21, &(0x7f0000000240), 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000019c0)={0x18, 0xd, &(0x7f0000000700)=ANY=[@ANYBLOB="180000000500000000000000000200009500000000000000184a0000fbffffff000000000000000018500000050000000000000000000000185900000200000000000000000000001761180010000000182a0000efad356868ed500603f59c3bbbfed90e3d64c8d53c0b", @ANYRES32=r3, @ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x62, &(0x7f0000001740)=""/98, 0x40f00, 0x14, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001880)={0x1, 0x1}, 0x8, 0x10, &(0x7f00000018c0)={0x4, 0x2, 0x81, 0x10000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001980)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, 0xffffffffffffffff, r2]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x14, 0x0, 0x0, 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0xf3, 0x3, 0x4, 0x40, 0x0, 0x200000000000000, 0xbc0a0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x848, 0x2, 0x3, 0x7, 0x8, 0x0, 0x7, 0x0, 0x1000000, 0x0, 0x80000001}, 0x0, 0x8, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r6, &(0x7f0000000000), 0x248800) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0xc, &(0x7f00000002c0)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffff8}, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @generic={0x9c, 0x4, 0x8, 0x2c, 0x20}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x1}, @generic={0x0, 0xe, 0xb, 0xbd5, 0x42}, @alu={0x7, 0x1, 0xd, 0xb, 0x0, 0x10, 0xfffffffffffffff0}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @generic={0x0, 0x7, 0x3, 0x101, 0x7ff}], &(0x7f0000000540)='syzkaller\x00', 0x3, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0x10, 0x0, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000640)=[r6, r7]}, 0x80) 04:39:32 executing program 0: r0 = semget$private(0x0, 0x3, 0x0) syz_emit_ethernet(0x6e, &(0x7f0000000180)={@broadcast, @link_local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "00f7ff", 0x38, 0x3a, 0x0, @local, @mcast2, {[], @param_prob={0x4, 0x0, 0x0, 0x0, {0x0, 0x6, 'BNE', 0x0, 0x33, 0x0, @local, @mcast2, [@hopopts={0x33}]}}}}}}}, 0x0) semop(r0, &(0x7f0000000000)=[{0x0, 0x7f}, {}], 0x2) r1 = semget(0x3, 0x7, 0x84) syz_emit_ethernet(0x5e, &(0x7f0000000200)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, @val={@val={0x9100, 0x5, 0x1, 0x2}, {0x8100, 0x5, 0x1, 0x9}}, {@canfd={0xd, {{0x4, 0x0, 0x1, 0x1}, 0x2a, 0x2, 0x0, 0x0, "e80372277012b14546b8d1556b7c48089694c79943e29da9d61302cc012935751915a5b8f8c411591dcb04c36dfbfa422aec04ec38887087917d848daa48cbd2"}}}}, &(0x7f0000000280)={0x1, 0x3, [0xb4c, 0x143, 0x6ce, 0x43]}) semtimedop(r1, &(0x7f0000000080)=[{0x4, 0x3, 0x800}, {0x2, 0x55, 0x1000}, {0x4, 0x4}, {0x1, 0x4, 0x1800}, {0x2, 0x4, 0x1000}, {0x2, 0xf716}], 0x6, &(0x7f00000000c0)={0x77359400}) semop(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x1000}], 0x1) r2 = semget(0x2, 0x1, 0x4a0) semctl$IPC_RMID(r2, 0x0, 0x0) semop(r2, &(0x7f0000000040)=[{0x2, 0x7f, 0x800}, {0x3, 0x0, 0x1800}, {0x1, 0xfff0, 0x1800}, {0x2, 0x1f}, {0x3, 0x2, 0x800}], 0x5) r3 = semget$private(0x0, 0x3, 0x0) semop(r3, &(0x7f0000000000)=[{0x0, 0x7f}, {}], 0x2) semctl$IPC_SET(r3, 0x0, 0x1, &(0x7f00000000c0)={{0x0, 0xffffffffffffffff, 0x0, 0xee01}}) syz_emit_ethernet(0xe9, &(0x7f00000002c0)={@empty, @multicast, @val={@val={0x9100, 0x4, 0x0, 0x1}, {0x8100, 0x2, 0x1, 0x4}}, {@llc={0x4, {@llc={0x4e, 0x0, 'a ', "9384587d2d271d9d63d163f3f7abfbcc4243b24146afbe363554325724f12f2f6cce7c3535adb903ff113585a0794319f9916e9a2699b48cfc7a03b7adc3273ffa8055ef69fce9448202d98af0b566788009741743f759d0e8becd9ba0b2db5fdb68e81c82d5cb5bf22485a47a73a57218a3719a704df3e44b1c19626c5af1ecc7104b6cfeee91b133664a490a541f90fc84d15bc79dc0f237590581e052681596cd6bfd5f4543b40a19d32c2cb320bc2710606ae1b05428408c39ece699fab4e2615ecc282d5215c521885a427a11"}}}}}, &(0x7f0000000400)={0x1, 0x3, [0x282, 0xbf1, 0x7ac, 0x2ab]}) semtimedop(r3, &(0x7f0000000100)=[{0x3, 0x0, 0x1800}, {0x2, 0x9, 0x1000}], 0x2, &(0x7f0000000140)={0x0, 0x3938700}) 04:39:32 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @remote}, 0x10) r2 = accept(r1, 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@mcast1, @in6=@dev={0xfe, 0x80, '\x00', 0x3e}, 0x4e22, 0x677e, 0x4e23, 0x0, 0xa, 0x0, 0x40, 0x1, 0x0, 0xffffffffffffffff}, {0x7, 0x401, 0x2, 0x180, 0x0, 0x7, 0x4, 0x101}, {0x8, 0xcdb4, 0xfffffffffffffffd, 0x83}, 0x0, 0x6e6bb4, 0x2, 0x1, 0x1, 0x3}, {{@in=@rand_addr=0x64010102, 0x4d2, 0xe6}, 0xa, @in6=@loopback, 0x3502, 0x0, 0x0, 0xf7, 0x8, 0x2, 0x4}}, 0xe8) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet6_int(r2, 0x29, 0x10, &(0x7f0000000100), &(0x7f0000000140)=0x4) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x8904, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, 0x0, 0x78) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000080)="da28ffce0776166ea5e6234e1b2f3efa", 0x10) ioctl$PIO_FONTX(r3, 0x8904, &(0x7f0000000000)={0x0, 0x0, 0x0}) getsockopt$sock_buf(r3, 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, 0x0, 0x0) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002340)='/sys/devices/system', 0x0, 0x0) ioctl$TUNSETGROUP(r4, 0x5451, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'erspan0\x00', &(0x7f0000000040)={'gre0\x00', 0x0, 0x8, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}}}}) dup(0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x8904, 0x0) openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:39:32 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffec850000006d0000008500000008"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='rdma.current\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a80)={0x18, 0xa, &(0x7f00000004c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7f}, [@map_idx={0x18, 0x7, 0x5, 0x0, 0x10}, @cb_func={0x18, 0x9, 0x4, 0x0, 0x6}, @cb_func={0x18, 0x2, 0x4, 0x0, 0xfffffffffffffffd}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}]}, &(0x7f00000008c0)='syzkaller\x00', 0xbfe, 0xcb, &(0x7f0000000900)=""/203, 0x40f00, 0x13, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000a00)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000000a40)={0x4, 0xd, 0xb1, 0x1}, 0x10}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x20}, 0x48) r4 = openat$cgroup_ro(r2, &(0x7f00000003c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001580)={0x11, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1841000000000000ba"], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x1003, &(0x7f0000001a40)=""/4099, 0x41100, 0x0, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001500)={0x2, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000005c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4, r3, r4, r3, r2, 0xffffffffffffffff]}, 0x80) bpf$ITER_CREATE(0x21, &(0x7f0000000240), 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000019c0)={0x18, 0xd, &(0x7f0000000700)=ANY=[@ANYBLOB="180000000500000000000000000200009500000000000000184a0000fbffffff000000000000000018500000050000000000000000000000185900000200000000000000000000001761180010000000182a0000efad356868ed500603f59c3bbbfed90e3d64c8d53c0b", @ANYRES32=r3, @ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x62, &(0x7f0000001740)=""/98, 0x40f00, 0x14, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001880)={0x1, 0x1}, 0x8, 0x10, &(0x7f00000018c0)={0x4, 0x2, 0x81, 0x10000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001980)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, 0xffffffffffffffff, r2]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x14, 0x0, 0x0, 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0xf3, 0x3, 0x4, 0x40, 0x0, 0x200000000000000, 0xbc0a0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x848, 0x2, 0x3, 0x7, 0x8, 0x0, 0x7, 0x0, 0x1000000, 0x0, 0x80000001}, 0x0, 0x8, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r6, &(0x7f0000000000), 0x248800) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0xc, &(0x7f00000002c0)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffff8}, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @generic={0x9c, 0x4, 0x8, 0x2c, 0x20}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x1}, @generic={0x0, 0xe, 0xb, 0xbd5, 0x42}, @alu={0x7, 0x1, 0xd, 0xb, 0x0, 0x10, 0xfffffffffffffff0}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @generic={0x0, 0x7, 0x3, 0x101, 0x7ff}], &(0x7f0000000540)='syzkaller\x00', 0x3, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0x10, 0x0, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000640)=[r6, r7]}, 0x80) 04:39:32 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffec850000006d0000008500000008"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='rdma.current\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a80)={0x18, 0xa, &(0x7f00000004c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7f}, [@map_idx={0x18, 0x7, 0x5, 0x0, 0x10}, @cb_func={0x18, 0x9, 0x4, 0x0, 0x6}, @cb_func={0x18, 0x2, 0x4, 0x0, 0xfffffffffffffffd}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}]}, &(0x7f00000008c0)='syzkaller\x00', 0xbfe, 0xcb, &(0x7f0000000900)=""/203, 0x40f00, 0x13, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000a00)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000000a40)={0x4, 0xd, 0xb1, 0x1}, 0x10}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x20}, 0x48) r4 = openat$cgroup_ro(r2, &(0x7f00000003c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001580)={0x11, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1841000000000000ba"], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x1003, &(0x7f0000001a40)=""/4099, 0x41100, 0x0, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001500)={0x2, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000005c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4, r3, r4, r3, r2, 0xffffffffffffffff]}, 0x80) bpf$ITER_CREATE(0x21, &(0x7f0000000240), 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000019c0)={0x18, 0xd, &(0x7f0000000700)=ANY=[@ANYBLOB="180000000500000000000000000200009500000000000000184a0000fbffffff000000000000000018500000050000000000000000000000185900000200000000000000000000001761180010000000182a0000efad356868ed500603f59c3bbbfed90e3d64c8d53c0b", @ANYRES32=r3, @ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x62, &(0x7f0000001740)=""/98, 0x40f00, 0x14, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001880)={0x1, 0x1}, 0x8, 0x10, &(0x7f00000018c0)={0x4, 0x2, 0x81, 0x10000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001980)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, 0xffffffffffffffff, r2]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x14, 0x0, 0x0, 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0xf3, 0x3, 0x4, 0x40, 0x0, 0x200000000000000, 0xbc0a0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x848, 0x2, 0x3, 0x7, 0x8, 0x0, 0x7, 0x0, 0x1000000, 0x0, 0x80000001}, 0x0, 0x8, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r6, &(0x7f0000000000), 0x248800) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0xc, &(0x7f00000002c0)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffff8}, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @generic={0x9c, 0x4, 0x8, 0x2c, 0x20}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x1}, @generic={0x0, 0xe, 0xb, 0xbd5, 0x42}, @alu={0x7, 0x1, 0xd, 0xb, 0x0, 0x10, 0xfffffffffffffff0}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @generic={0x0, 0x7, 0x3, 0x101, 0x7ff}], &(0x7f0000000540)='syzkaller\x00', 0x3, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0x10, 0x0, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000640)=[r6, r7]}, 0x80) 04:39:32 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffec850000006d0000008500000008"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='rdma.current\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a80)={0x18, 0xa, &(0x7f00000004c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7f}, [@map_idx={0x18, 0x7, 0x5, 0x0, 0x10}, @cb_func={0x18, 0x9, 0x4, 0x0, 0x6}, @cb_func={0x18, 0x2, 0x4, 0x0, 0xfffffffffffffffd}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}]}, &(0x7f00000008c0)='syzkaller\x00', 0xbfe, 0xcb, &(0x7f0000000900)=""/203, 0x40f00, 0x13, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000a00)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000000a40)={0x4, 0xd, 0xb1, 0x1}, 0x10}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x20}, 0x48) r4 = openat$cgroup_ro(r2, &(0x7f00000003c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001580)={0x11, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1841000000000000ba"], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x1003, &(0x7f0000001a40)=""/4099, 0x41100, 0x0, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001500)={0x2, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000005c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4, r3, r4, r3, r2, 0xffffffffffffffff]}, 0x80) bpf$ITER_CREATE(0x21, &(0x7f0000000240), 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000019c0)={0x18, 0xd, &(0x7f0000000700)=ANY=[@ANYBLOB="180000000500000000000000000200009500000000000000184a0000fbffffff000000000000000018500000050000000000000000000000185900000200000000000000000000001761180010000000182a0000efad356868ed500603f59c3bbbfed90e3d64c8d53c0b", @ANYRES32=r3, @ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x62, &(0x7f0000001740)=""/98, 0x40f00, 0x14, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001880)={0x1, 0x1}, 0x8, 0x10, &(0x7f00000018c0)={0x4, 0x2, 0x81, 0x10000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001980)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, 0xffffffffffffffff, r2]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x14, 0x0, 0x0, 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0xf3, 0x3, 0x4, 0x40, 0x0, 0x200000000000000, 0xbc0a0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x848, 0x2, 0x3, 0x7, 0x8, 0x0, 0x7, 0x0, 0x1000000, 0x0, 0x80000001}, 0x0, 0x8, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r6, &(0x7f0000000000), 0x248800) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0xc, &(0x7f00000002c0)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffff8}, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @generic={0x9c, 0x4, 0x8, 0x2c, 0x20}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x1}, @generic={0x0, 0xe, 0xb, 0xbd5, 0x42}, @alu={0x7, 0x1, 0xd, 0xb, 0x0, 0x10, 0xfffffffffffffff0}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @generic={0x0, 0x7, 0x3, 0x101, 0x7ff}], &(0x7f0000000540)='syzkaller\x00', 0x3, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0x10, 0x0, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000640)=[r6, r7]}, 0x80) 04:39:32 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @remote}, 0x10) r2 = accept(r1, 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@mcast1, @in6=@dev={0xfe, 0x80, '\x00', 0x3e}, 0x4e22, 0x677e, 0x4e23, 0x0, 0xa, 0x0, 0x40, 0x1, 0x0, 0xffffffffffffffff}, {0x7, 0x401, 0x2, 0x180, 0x0, 0x7, 0x4, 0x101}, {0x8, 0xcdb4, 0xfffffffffffffffd, 0x83}, 0x0, 0x6e6bb4, 0x2, 0x1, 0x1, 0x3}, {{@in=@rand_addr=0x64010102, 0x4d2, 0xe6}, 0xa, @in6=@loopback, 0x3502, 0x0, 0x0, 0xf7, 0x8, 0x2, 0x4}}, 0xe8) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet6_int(r2, 0x29, 0x10, &(0x7f0000000100), &(0x7f0000000140)=0x4) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x8904, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, 0x0, 0x78) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000080)="da28ffce0776166ea5e6234e1b2f3efa", 0x10) ioctl$PIO_FONTX(r3, 0x8904, &(0x7f0000000000)={0x0, 0x0, 0x0}) getsockopt$sock_buf(r3, 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, 0x0, 0x0) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002340)='/sys/devices/system', 0x0, 0x0) ioctl$TUNSETGROUP(r4, 0x5451, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'erspan0\x00', &(0x7f0000000040)={'gre0\x00', 0x0, 0x8, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}}}}) dup(0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x8904, 0x0) openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 93.547833][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. 04:39:32 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @remote}, 0x10) r2 = accept(r1, 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@mcast1, @in6=@dev={0xfe, 0x80, '\x00', 0x3e}, 0x4e22, 0x677e, 0x4e23, 0x0, 0xa, 0x0, 0x40, 0x1, 0x0, 0xffffffffffffffff}, {0x7, 0x401, 0x2, 0x180, 0x0, 0x7, 0x4, 0x101}, {0x8, 0xcdb4, 0xfffffffffffffffd, 0x83}, 0x0, 0x6e6bb4, 0x2, 0x1, 0x1, 0x3}, {{@in=@rand_addr=0x64010102, 0x4d2, 0xe6}, 0xa, @in6=@loopback, 0x3502, 0x0, 0x0, 0xf7, 0x8, 0x2, 0x4}}, 0xe8) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet6_int(r2, 0x29, 0x10, &(0x7f0000000100), &(0x7f0000000140)=0x4) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x8904, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, 0x0, 0x78) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000080)="da28ffce0776166ea5e6234e1b2f3efa", 0x10) ioctl$PIO_FONTX(r3, 0x8904, &(0x7f0000000000)={0x0, 0x0, 0x0}) getsockopt$sock_buf(r3, 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, 0x0, 0x0) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002340)='/sys/devices/system', 0x0, 0x0) ioctl$TUNSETGROUP(r4, 0x5451, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'erspan0\x00', &(0x7f0000000040)={'gre0\x00', 0x0, 0x8, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}}}}) dup(0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x8904, 0x0) openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:39:32 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @remote}, 0x10) r2 = accept(r1, 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@mcast1, @in6=@dev={0xfe, 0x80, '\x00', 0x3e}, 0x4e22, 0x677e, 0x4e23, 0x0, 0xa, 0x0, 0x40, 0x1, 0x0, 0xffffffffffffffff}, {0x7, 0x401, 0x2, 0x180, 0x0, 0x7, 0x4, 0x101}, {0x8, 0xcdb4, 0xfffffffffffffffd, 0x83}, 0x0, 0x6e6bb4, 0x2, 0x1, 0x1, 0x3}, {{@in=@rand_addr=0x64010102, 0x4d2, 0xe6}, 0xa, @in6=@loopback, 0x3502, 0x0, 0x0, 0xf7, 0x8, 0x2, 0x4}}, 0xe8) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet6_int(r2, 0x29, 0x10, &(0x7f0000000100), &(0x7f0000000140)=0x4) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x8904, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, 0x0, 0x78) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000080)="da28ffce0776166ea5e6234e1b2f3efa", 0x10) ioctl$PIO_FONTX(r3, 0x8904, &(0x7f0000000000)={0x0, 0x0, 0x0}) getsockopt$sock_buf(r3, 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, 0x0, 0x0) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002340)='/sys/devices/system', 0x0, 0x0) ioctl$TUNSETGROUP(r4, 0x5451, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'erspan0\x00', &(0x7f0000000040)={'gre0\x00', 0x0, 0x8, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}}}}) dup(0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x8904, 0x0) openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 93.622563][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 93.652614][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. 04:39:32 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @remote}, 0x10) r2 = accept(r1, 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@mcast1, @in6=@dev={0xfe, 0x80, '\x00', 0x3e}, 0x4e22, 0x677e, 0x4e23, 0x0, 0xa, 0x0, 0x40, 0x1, 0x0, 0xffffffffffffffff}, {0x7, 0x401, 0x2, 0x180, 0x0, 0x7, 0x4, 0x101}, {0x8, 0xcdb4, 0xfffffffffffffffd, 0x83}, 0x0, 0x6e6bb4, 0x2, 0x1, 0x1, 0x3}, {{@in=@rand_addr=0x64010102, 0x4d2, 0xe6}, 0xa, @in6=@loopback, 0x3502, 0x0, 0x0, 0xf7, 0x8, 0x2, 0x4}}, 0xe8) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet6_int(r2, 0x29, 0x10, &(0x7f0000000100), &(0x7f0000000140)=0x4) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x8904, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, 0x0, 0x78) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000080)="da28ffce0776166ea5e6234e1b2f3efa", 0x10) ioctl$PIO_FONTX(r3, 0x8904, &(0x7f0000000000)={0x0, 0x0, 0x0}) getsockopt$sock_buf(r3, 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, 0x0, 0x0) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002340)='/sys/devices/system', 0x0, 0x0) ioctl$TUNSETGROUP(r4, 0x5451, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'erspan0\x00', &(0x7f0000000040)={'gre0\x00', 0x0, 0x8, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}}}}) dup(0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x8904, 0x0) openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 93.706881][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. 04:39:32 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @remote}, 0x10) r2 = accept(r1, 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@mcast1, @in6=@dev={0xfe, 0x80, '\x00', 0x3e}, 0x4e22, 0x677e, 0x4e23, 0x0, 0xa, 0x0, 0x40, 0x1, 0x0, 0xffffffffffffffff}, {0x7, 0x401, 0x2, 0x180, 0x0, 0x7, 0x4, 0x101}, {0x8, 0xcdb4, 0xfffffffffffffffd, 0x83}, 0x0, 0x6e6bb4, 0x2, 0x1, 0x1, 0x3}, {{@in=@rand_addr=0x64010102, 0x4d2, 0xe6}, 0xa, @in6=@loopback, 0x3502, 0x0, 0x0, 0xf7, 0x8, 0x2, 0x4}}, 0xe8) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet6_int(r2, 0x29, 0x10, &(0x7f0000000100), &(0x7f0000000140)=0x4) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x8904, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, 0x0, 0x78) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000080)="da28ffce0776166ea5e6234e1b2f3efa", 0x10) ioctl$PIO_FONTX(r3, 0x8904, &(0x7f0000000000)={0x0, 0x0, 0x0}) getsockopt$sock_buf(r3, 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, 0x0, 0x0) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002340)='/sys/devices/system', 0x0, 0x0) ioctl$TUNSETGROUP(r4, 0x5451, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'erspan0\x00', &(0x7f0000000040)={'gre0\x00', 0x0, 0x8, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}}}}) dup(0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x8904, 0x0) openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:39:32 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffec850000006d0000008500000008"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='rdma.current\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a80)={0x18, 0xa, &(0x7f00000004c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7f}, [@map_idx={0x18, 0x7, 0x5, 0x0, 0x10}, @cb_func={0x18, 0x9, 0x4, 0x0, 0x6}, @cb_func={0x18, 0x2, 0x4, 0x0, 0xfffffffffffffffd}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}]}, &(0x7f00000008c0)='syzkaller\x00', 0xbfe, 0xcb, &(0x7f0000000900)=""/203, 0x40f00, 0x13, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000a00)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000000a40)={0x4, 0xd, 0xb1, 0x1}, 0x10}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x20}, 0x48) r4 = openat$cgroup_ro(r2, &(0x7f00000003c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001580)={0x11, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1841000000000000ba"], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x1003, &(0x7f0000001a40)=""/4099, 0x41100, 0x0, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001500)={0x2, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000005c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4, r3, r4, r3, r2, 0xffffffffffffffff]}, 0x80) bpf$ITER_CREATE(0x21, &(0x7f0000000240), 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000019c0)={0x18, 0xd, &(0x7f0000000700)=ANY=[@ANYBLOB="180000000500000000000000000200009500000000000000184a0000fbffffff000000000000000018500000050000000000000000000000185900000200000000000000000000001761180010000000182a0000efad356868ed500603f59c3bbbfed90e3d64c8d53c0b", @ANYRES32=r3, @ANYBLOB="000000000609792aae009500000000000000b48a198aecf38a953f36f29dc82c3a4cf250071e2af84be2ec643aedfc0f4d2b5c21274cc79acffe59095f849b27b2bc41f2e1f783a7bafaed7bab43bd2cfbeae775896cd14abc28b10000000000000000000000000018877b7373f9980db834e1e196cedd5abc79f0d65d81c7cb40cfdfbb0eb0948b8be2c5c438d9502d421705953ebf48810411b14ba32999df9d456cf293d67032cfc4bf29cdd8e7042c23867f234cce3b9a4d6fa3429472352f3ee7d254776444adb59f7607a09ac3ce090738e39e2156e0f409f581960ec3ee7b296b861cd926d9b3c56621bd4695695e53c5d6cf70e73752d6f60ee598930819"], &(0x7f0000000000)='GPL\x00', 0x5, 0x62, &(0x7f0000001740)=""/98, 0x40f00, 0x14, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001880)={0x1, 0x1}, 0x8, 0x10, &(0x7f00000018c0)={0x4, 0x2, 0x81, 0x10000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001980)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, 0xffffffffffffffff, r2]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x14, 0x0, 0x0, 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0xf3, 0x3, 0x4, 0x40, 0x0, 0x200000000000000, 0xbc0a0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x848, 0x2, 0x3, 0x7, 0x8, 0x0, 0x7, 0x0, 0x1000000, 0x0, 0x80000001}, 0x0, 0x8, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r6, &(0x7f0000000000), 0x248800) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0xc, &(0x7f00000002c0)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffff8}, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @generic={0x9c, 0x4, 0x8, 0x2c, 0x20}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x1}, @generic={0x0, 0xe, 0xb, 0xbd5, 0x42}, @alu={0x7, 0x1, 0xd, 0xb, 0x0, 0x10, 0xfffffffffffffff0}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @generic={0x0, 0x7, 0x3, 0x101, 0x7ff}], &(0x7f0000000540)='syzkaller\x00', 0x3, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0x10, 0x0, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000640)=[r6, r7]}, 0x80) [ 93.779619][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 93.792754][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. 04:39:40 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffec850000006d0000008500000008"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='rdma.current\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a80)={0x18, 0xa, &(0x7f00000004c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7f}, [@map_idx={0x18, 0x7, 0x5, 0x0, 0x10}, @cb_func={0x18, 0x9, 0x4, 0x0, 0x6}, @cb_func={0x18, 0x2, 0x4, 0x0, 0xfffffffffffffffd}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}]}, &(0x7f00000008c0)='syzkaller\x00', 0xbfe, 0xcb, &(0x7f0000000900)=""/203, 0x40f00, 0x13, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000a00)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000000a40)={0x4, 0xd, 0xb1, 0x1}, 0x10}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x20}, 0x48) r4 = openat$cgroup_ro(r2, &(0x7f00000003c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001580)={0x11, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1841000000000000ba"], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x1003, &(0x7f0000001a40)=""/4099, 0x41100, 0x0, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001500)={0x2, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000005c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4, r3, r4, r3, r2, 0xffffffffffffffff]}, 0x80) bpf$ITER_CREATE(0x21, &(0x7f0000000240), 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000019c0)={0x18, 0xd, &(0x7f0000000700)=ANY=[@ANYBLOB="180000000500000000000000000200009500000000000000184a0000fbffffff000000000000000018500000050000000000000000000000185900000200000000000000000000001761180010000000182a0000efad356868ed500603f59c3bbbfed90e3d64c8d53c0b", @ANYRES32=r3, @ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x62, &(0x7f0000001740)=""/98, 0x40f00, 0x14, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001880)={0x1, 0x1}, 0x8, 0x10, &(0x7f00000018c0)={0x4, 0x2, 0x81, 0x10000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001980)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, 0xffffffffffffffff, r2]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x14, 0x0, 0x0, 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0xf3, 0x3, 0x4, 0x40, 0x0, 0x200000000000000, 0xbc0a0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x848, 0x2, 0x3, 0x7, 0x8, 0x0, 0x7, 0x0, 0x1000000, 0x0, 0x80000001}, 0x0, 0x8, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r6, &(0x7f0000000000), 0x248800) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0xc, &(0x7f00000002c0)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffff8}, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @generic={0x9c, 0x4, 0x8, 0x2c, 0x20}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x1}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x1}, @generic={0x0, 0xe, 0xb, 0xbd5, 0x42}, @alu={0x7, 0x1, 0xd, 0xb, 0x0, 0x10, 0xfffffffffffffff0}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @generic={0x0, 0x7, 0x3, 0x101, 0x7ff}], &(0x7f0000000540)='syzkaller\x00', 0x3, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0x10, 0x0, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000640)=[r6, r7]}, 0x80) 04:39:40 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @remote}, 0x10) r2 = accept(r1, 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@mcast1, @in6=@dev={0xfe, 0x80, '\x00', 0x3e}, 0x4e22, 0x677e, 0x4e23, 0x0, 0xa, 0x0, 0x40, 0x1, 0x0, 0xffffffffffffffff}, {0x7, 0x401, 0x2, 0x180, 0x0, 0x7, 0x4, 0x101}, {0x8, 0xcdb4, 0xfffffffffffffffd, 0x83}, 0x0, 0x6e6bb4, 0x2, 0x1, 0x1, 0x3}, {{@in=@rand_addr=0x64010102, 0x4d2, 0xe6}, 0xa, @in6=@loopback, 0x3502, 0x0, 0x0, 0xf7, 0x8, 0x2, 0x4}}, 0xe8) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet6_int(r2, 0x29, 0x10, &(0x7f0000000100), &(0x7f0000000140)=0x4) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x8904, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, 0x0, 0x78) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000080)="da28ffce0776166ea5e6234e1b2f3efa", 0x10) ioctl$PIO_FONTX(r3, 0x8904, &(0x7f0000000000)={0x0, 0x0, 0x0}) getsockopt$sock_buf(r3, 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, 0x0, 0x0) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002340)='/sys/devices/system', 0x0, 0x0) ioctl$TUNSETGROUP(r4, 0x5451, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'erspan0\x00', &(0x7f0000000040)={'gre0\x00', 0x0, 0x8, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}}}}) dup(0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x8904, 0x0) openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:39:40 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @remote}, 0x10) r2 = accept(r1, 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@mcast1, @in6=@dev={0xfe, 0x80, '\x00', 0x3e}, 0x4e22, 0x677e, 0x4e23, 0x0, 0xa, 0x0, 0x40, 0x1, 0x0, 0xffffffffffffffff}, {0x7, 0x401, 0x2, 0x180, 0x0, 0x7, 0x4, 0x101}, {0x8, 0xcdb4, 0xfffffffffffffffd, 0x83}, 0x0, 0x6e6bb4, 0x2, 0x1, 0x1, 0x3}, {{@in=@rand_addr=0x64010102, 0x4d2, 0xe6}, 0xa, @in6=@loopback, 0x3502, 0x0, 0x0, 0xf7, 0x8, 0x2, 0x4}}, 0xe8) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet6_int(r2, 0x29, 0x10, &(0x7f0000000100), &(0x7f0000000140)=0x4) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x8904, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, 0x0, 0x78) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000080)="da28ffce0776166ea5e6234e1b2f3efa", 0x10) ioctl$PIO_FONTX(r3, 0x8904, &(0x7f0000000000)={0x0, 0x0, 0x0}) getsockopt$sock_buf(r3, 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, 0x0, 0x0) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002340)='/sys/devices/system', 0x0, 0x0) ioctl$TUNSETGROUP(r4, 0x5451, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'erspan0\x00', &(0x7f0000000040)={'gre0\x00', 0x0, 0x8, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}}}}) dup(0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x8904, 0x0) openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:39:40 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @remote}, 0x10) r2 = accept(r1, 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@mcast1, @in6=@dev={0xfe, 0x80, '\x00', 0x3e}, 0x4e22, 0x677e, 0x4e23, 0x0, 0xa, 0x0, 0x40, 0x1, 0x0, 0xffffffffffffffff}, {0x7, 0x401, 0x2, 0x180, 0x0, 0x7, 0x4, 0x101}, {0x8, 0xcdb4, 0xfffffffffffffffd, 0x83}, 0x0, 0x6e6bb4, 0x2, 0x1, 0x1, 0x3}, {{@in=@rand_addr=0x64010102, 0x4d2, 0xe6}, 0xa, @in6=@loopback, 0x3502, 0x0, 0x0, 0xf7, 0x8, 0x2, 0x4}}, 0xe8) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet6_int(r2, 0x29, 0x10, &(0x7f0000000100), &(0x7f0000000140)=0x4) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x8904, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, 0x0, 0x78) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000080)="da28ffce0776166ea5e6234e1b2f3efa", 0x10) ioctl$PIO_FONTX(r3, 0x8904, &(0x7f0000000000)={0x0, 0x0, 0x0}) getsockopt$sock_buf(r3, 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, 0x0, 0x0) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002340)='/sys/devices/system', 0x0, 0x0) ioctl$TUNSETGROUP(r4, 0x5451, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'erspan0\x00', &(0x7f0000000040)={'gre0\x00', 0x0, 0x8, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}}}}) dup(0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x8904, 0x0) openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:39:40 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @remote}, 0x10) r2 = accept(r1, 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@mcast1, @in6=@dev={0xfe, 0x80, '\x00', 0x3e}, 0x4e22, 0x677e, 0x4e23, 0x0, 0xa, 0x0, 0x40, 0x1, 0x0, 0xffffffffffffffff}, {0x7, 0x401, 0x2, 0x180, 0x0, 0x7, 0x4, 0x101}, {0x8, 0xcdb4, 0xfffffffffffffffd, 0x83}, 0x0, 0x6e6bb4, 0x2, 0x1, 0x1, 0x3}, {{@in=@rand_addr=0x64010102, 0x4d2, 0xe6}, 0xa, @in6=@loopback, 0x3502, 0x0, 0x0, 0xf7, 0x8, 0x2, 0x4}}, 0xe8) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet6_int(r2, 0x29, 0x10, &(0x7f0000000100), &(0x7f0000000140)=0x4) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x8904, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, 0x0, 0x78) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000080)="da28ffce0776166ea5e6234e1b2f3efa", 0x10) ioctl$PIO_FONTX(r3, 0x8904, &(0x7f0000000000)={0x0, 0x0, 0x0}) getsockopt$sock_buf(r3, 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, 0x0, 0x0) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002340)='/sys/devices/system', 0x0, 0x0) ioctl$TUNSETGROUP(r4, 0x5451, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'erspan0\x00', &(0x7f0000000040)={'gre0\x00', 0x0, 0x8, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}}}}) dup(0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x8904, 0x0) openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:39:40 executing program 0: r0 = memfd_create(&(0x7f0000000140)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa6Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xca\xd7Uw\x00\xbc\xfa2\xb3\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8b\x066\xb8G\xd1c\xe1$\xff\x97k\xde\xc5\xe96\xddU)\xc98M\xcd\xfb\xcc\x82n=\x7f=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93=\xabQ\xf7\x05\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xac \xe8\xb6\xdf\x16J\xab\xecC\xe2{\xfd\x8a\xb4\x8e\x9c\xfb\xf6\xe9\xd8]B6)\x9f\x9cR\xae\x12G\xd8\xa4y\xef\x02?\xf2\xe7}\ra\x97F', 0x0) r1 = dup(r0) write$cgroup_pid(r1, &(0x7f0000000040)=0xffffffffffffffff, 0xe) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) getsockopt$bt_hci(r2, 0x0, 0x3, &(0x7f0000000200)=""/170, &(0x7f0000000080)=0xaa) sendfile(r0, r1, &(0x7f0000000100), 0x6c03) quotactl$Q_SETINFO(0x0, &(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, 0x0, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) sendfile(r3, r3, 0x0, 0x8080fffffffe) 04:39:40 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @remote}, 0x10) r2 = accept(r1, 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@mcast1, @in6=@dev={0xfe, 0x80, '\x00', 0x3e}, 0x4e22, 0x677e, 0x4e23, 0x0, 0xa, 0x0, 0x40, 0x1, 0x0, 0xffffffffffffffff}, {0x7, 0x401, 0x2, 0x180, 0x0, 0x7, 0x4, 0x101}, {0x8, 0xcdb4, 0xfffffffffffffffd, 0x83}, 0x0, 0x6e6bb4, 0x2, 0x1, 0x1, 0x3}, {{@in=@rand_addr=0x64010102, 0x4d2, 0xe6}, 0xa, @in6=@loopback, 0x3502, 0x0, 0x0, 0xf7, 0x8, 0x2, 0x4}}, 0xe8) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet6_int(r2, 0x29, 0x10, &(0x7f0000000100), &(0x7f0000000140)=0x4) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x8904, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, 0x0, 0x78) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000080)="da28ffce0776166ea5e6234e1b2f3efa", 0x10) ioctl$PIO_FONTX(r3, 0x8904, &(0x7f0000000000)={0x0, 0x0, 0x0}) getsockopt$sock_buf(r3, 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, 0x0, 0x0) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002340)='/sys/devices/system', 0x0, 0x0) ioctl$TUNSETGROUP(r4, 0x5451, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'erspan0\x00', &(0x7f0000000040)={'gre0\x00', 0x0, 0x8, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}}}}) dup(0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x8904, 0x0) openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 100.870964][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 100.876719][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 100.883711][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 100.890032][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. 04:39:40 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @remote}, 0x10) r2 = accept(r1, 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@mcast1, @in6=@dev={0xfe, 0x80, '\x00', 0x3e}, 0x4e22, 0x677e, 0x4e23, 0x0, 0xa, 0x0, 0x40, 0x1, 0x0, 0xffffffffffffffff}, {0x7, 0x401, 0x2, 0x180, 0x0, 0x7, 0x4, 0x101}, {0x8, 0xcdb4, 0xfffffffffffffffd, 0x83}, 0x0, 0x6e6bb4, 0x2, 0x1, 0x1, 0x3}, {{@in=@rand_addr=0x64010102, 0x4d2, 0xe6}, 0xa, @in6=@loopback, 0x3502, 0x0, 0x0, 0xf7, 0x8, 0x2, 0x4}}, 0xe8) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet6_int(r2, 0x29, 0x10, &(0x7f0000000100), &(0x7f0000000140)=0x4) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x8904, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, 0x0, 0x78) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000080)="da28ffce0776166ea5e6234e1b2f3efa", 0x10) ioctl$PIO_FONTX(r3, 0x8904, &(0x7f0000000000)={0x0, 0x0, 0x0}) getsockopt$sock_buf(r3, 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, 0x0, 0x0) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002340)='/sys/devices/system', 0x0, 0x0) ioctl$TUNSETGROUP(r4, 0x5451, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'erspan0\x00', &(0x7f0000000040)={'gre0\x00', 0x0, 0x8, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}}}}) dup(0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x8904, 0x0) openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 100.907873][ T25] audit: type=1400 audit(1686371980.072:135): avc: denied { execute } for pid=3668 comm="syz-executor.0" path=2F6D656D66643A2D42D54E49C56A9A707070F00884A26D202864656C6574656429 dev="tmpfs" ino=1035 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 100.943958][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. 04:39:40 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(0xffffffffffffffff, 0x0, 0x0) bind$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @multicast2}}, 0x24) 04:39:40 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @remote}, 0x10) r2 = accept(r1, 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@mcast1, @in6=@dev={0xfe, 0x80, '\x00', 0x3e}, 0x4e22, 0x677e, 0x4e23, 0x0, 0xa, 0x0, 0x40, 0x1, 0x0, 0xffffffffffffffff}, {0x7, 0x401, 0x2, 0x180, 0x0, 0x7, 0x4, 0x101}, {0x8, 0xcdb4, 0xfffffffffffffffd, 0x83}, 0x0, 0x6e6bb4, 0x2, 0x1, 0x1, 0x3}, {{@in=@rand_addr=0x64010102, 0x4d2, 0xe6}, 0xa, @in6=@loopback, 0x3502, 0x0, 0x0, 0xf7, 0x8, 0x2, 0x4}}, 0xe8) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet6_int(r2, 0x29, 0x10, &(0x7f0000000100), &(0x7f0000000140)=0x4) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x8904, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, 0x0, 0x78) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000080)="da28ffce0776166ea5e6234e1b2f3efa", 0x10) ioctl$PIO_FONTX(r3, 0x8904, &(0x7f0000000000)={0x0, 0x0, 0x0}) getsockopt$sock_buf(r3, 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, 0x0, 0x0) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002340)='/sys/devices/system', 0x0, 0x0) ioctl$TUNSETGROUP(r4, 0x5451, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'erspan0\x00', &(0x7f0000000040)={'gre0\x00', 0x0, 0x8, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}}}}) dup(0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x8904, 0x0) openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:39:40 executing program 2: r0 = socket$inet(0x2, 0x2, 0x1) writev(r0, &(0x7f0000003680)=[{&(0x7f0000000240)="c020", 0x2}, {0x0, 0x20}], 0x2) 04:39:40 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(0xffffffffffffffff, 0x0, 0x0) bind$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @multicast2}}, 0x24) [ 100.955478][ T25] audit: type=1400 audit(1686371980.072:136): avc: denied { create } for pid=3668 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 100.961881][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 100.975155][ T25] audit: type=1400 audit(1686371980.072:137): avc: denied { getopt } for pid=3668 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 101.039948][ T25] audit: type=1400 audit(1686371980.192:138): avc: denied { create } for pid=3687 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 101.041357][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 101.059792][ T25] audit: type=1400 audit(1686371980.192:139): avc: denied { bind } for pid=3687 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 101.108286][ T25] audit: type=1400 audit(1686371980.242:140): avc: denied { create } for pid=3689 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 101.128137][ T25] audit: type=1400 audit(1686371980.242:141): avc: denied { write } for pid=3689 comm="syz-executor.2" path="socket:[19856]" dev="sockfs" ino=19856 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 04:39:46 executing program 2: r0 = socket$inet(0x2, 0x2, 0x1) writev(r0, &(0x7f0000003680)=[{&(0x7f0000000240)="c020", 0x2}, {0x0, 0x20}], 0x2) 04:39:46 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @remote}, 0x10) r2 = accept(r1, 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@mcast1, @in6=@dev={0xfe, 0x80, '\x00', 0x3e}, 0x4e22, 0x677e, 0x4e23, 0x0, 0xa, 0x0, 0x40, 0x1, 0x0, 0xffffffffffffffff}, {0x7, 0x401, 0x2, 0x180, 0x0, 0x7, 0x4, 0x101}, {0x8, 0xcdb4, 0xfffffffffffffffd, 0x83}, 0x0, 0x6e6bb4, 0x2, 0x1, 0x1, 0x3}, {{@in=@rand_addr=0x64010102, 0x4d2, 0xe6}, 0xa, @in6=@loopback, 0x3502, 0x0, 0x0, 0xf7, 0x8, 0x2, 0x4}}, 0xe8) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet6_int(r2, 0x29, 0x10, &(0x7f0000000100), &(0x7f0000000140)=0x4) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x8904, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, 0x0, 0x78) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000080)="da28ffce0776166ea5e6234e1b2f3efa", 0x10) ioctl$PIO_FONTX(r3, 0x8904, &(0x7f0000000000)={0x0, 0x0, 0x0}) getsockopt$sock_buf(r3, 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, 0x0, 0x0) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002340)='/sys/devices/system', 0x0, 0x0) ioctl$TUNSETGROUP(r4, 0x5451, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'erspan0\x00', &(0x7f0000000040)={'gre0\x00', 0x0, 0x8, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}}}}) dup(0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x8904, 0x0) openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:39:46 executing program 0: r0 = memfd_create(&(0x7f0000000140)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa6Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xca\xd7Uw\x00\xbc\xfa2\xb3\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8b\x066\xb8G\xd1c\xe1$\xff\x97k\xde\xc5\xe96\xddU)\xc98M\xcd\xfb\xcc\x82n=\x7f=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93=\xabQ\xf7\x05\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xac \xe8\xb6\xdf\x16J\xab\xecC\xe2{\xfd\x8a\xb4\x8e\x9c\xfb\xf6\xe9\xd8]B6)\x9f\x9cR\xae\x12G\xd8\xa4y\xef\x02?\xf2\xe7}\ra\x97F', 0x0) r1 = dup(r0) write$cgroup_pid(r1, &(0x7f0000000040)=0xffffffffffffffff, 0xe) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) getsockopt$bt_hci(r2, 0x0, 0x3, &(0x7f0000000200)=""/170, &(0x7f0000000080)=0xaa) sendfile(r0, r1, &(0x7f0000000100), 0x6c03) quotactl$Q_SETINFO(0x0, &(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, 0x0, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) sendfile(r3, r3, 0x0, 0x8080fffffffe) 04:39:46 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @remote}, 0x10) r2 = accept(r1, 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@mcast1, @in6=@dev={0xfe, 0x80, '\x00', 0x3e}, 0x4e22, 0x677e, 0x4e23, 0x0, 0xa, 0x0, 0x40, 0x1, 0x0, 0xffffffffffffffff}, {0x7, 0x401, 0x2, 0x180, 0x0, 0x7, 0x4, 0x101}, {0x8, 0xcdb4, 0xfffffffffffffffd, 0x83}, 0x0, 0x6e6bb4, 0x2, 0x1, 0x1, 0x3}, {{@in=@rand_addr=0x64010102, 0x4d2, 0xe6}, 0xa, @in6=@loopback, 0x3502, 0x0, 0x0, 0xf7, 0x8, 0x2, 0x4}}, 0xe8) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet6_int(r2, 0x29, 0x10, &(0x7f0000000100), &(0x7f0000000140)=0x4) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x8904, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, 0x0, 0x78) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000080)="da28ffce0776166ea5e6234e1b2f3efa", 0x10) ioctl$PIO_FONTX(r3, 0x8904, &(0x7f0000000000)={0x0, 0x0, 0x0}) getsockopt$sock_buf(r3, 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, 0x0, 0x0) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002340)='/sys/devices/system', 0x0, 0x0) ioctl$TUNSETGROUP(r4, 0x5451, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'erspan0\x00', &(0x7f0000000040)={'gre0\x00', 0x0, 0x8, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}}}}) dup(0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x8904, 0x0) openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:39:46 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(0xffffffffffffffff, 0x0, 0x0) bind$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @multicast2}}, 0x24) 04:39:46 executing program 1: r0 = memfd_create(&(0x7f0000000140)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa6Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xca\xd7Uw\x00\xbc\xfa2\xb3\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8b\x066\xb8G\xd1c\xe1$\xff\x97k\xde\xc5\xe96\xddU)\xc98M\xcd\xfb\xcc\x82n=\x7f=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93=\xabQ\xf7\x05\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xac \xe8\xb6\xdf\x16J\xab\xecC\xe2{\xfd\x8a\xb4\x8e\x9c\xfb\xf6\xe9\xd8]B6)\x9f\x9cR\xae\x12G\xd8\xa4y\xef\x02?\xf2\xe7}\ra\x97F', 0x0) r1 = dup(r0) write$cgroup_pid(r1, &(0x7f0000000040)=0xffffffffffffffff, 0xe) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) getsockopt$bt_hci(r2, 0x0, 0x3, &(0x7f0000000200)=""/170, &(0x7f0000000080)=0xaa) sendfile(r0, r1, &(0x7f0000000100), 0x6c03) quotactl$Q_SETINFO(0x0, &(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, 0x0, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) sendfile(r3, r3, 0x0, 0x8080fffffffe) 04:39:46 executing program 2: r0 = socket$inet(0x2, 0x2, 0x1) writev(r0, &(0x7f0000003680)=[{&(0x7f0000000240)="c020", 0x2}, {0x0, 0x20}], 0x2) 04:39:46 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(0xffffffffffffffff, 0x0, 0x0) bind$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @multicast2}}, 0x24) 04:39:46 executing program 4: r0 = memfd_create(&(0x7f0000000140)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa6Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xca\xd7Uw\x00\xbc\xfa2\xb3\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8b\x066\xb8G\xd1c\xe1$\xff\x97k\xde\xc5\xe96\xddU)\xc98M\xcd\xfb\xcc\x82n=\x7f=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93=\xabQ\xf7\x05\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xac \xe8\xb6\xdf\x16J\xab\xecC\xe2{\xfd\x8a\xb4\x8e\x9c\xfb\xf6\xe9\xd8]B6)\x9f\x9cR\xae\x12G\xd8\xa4y\xef\x02?\xf2\xe7}\ra\x97F', 0x0) r1 = dup(r0) write$cgroup_pid(r1, &(0x7f0000000040)=0xffffffffffffffff, 0xe) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) getsockopt$bt_hci(r2, 0x0, 0x3, &(0x7f0000000200)=""/170, &(0x7f0000000080)=0xaa) sendfile(r0, r1, &(0x7f0000000100), 0x6c03) quotactl$Q_SETINFO(0x0, &(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, 0x0, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) sendfile(r3, r3, 0x0, 0x8080fffffffe) 04:39:46 executing program 2: r0 = socket$inet(0x2, 0x2, 0x1) writev(r0, &(0x7f0000003680)=[{&(0x7f0000000240)="c020", 0x2}, {0x0, 0x20}], 0x2) [ 107.227270][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 107.237268][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. 04:39:46 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) socket$xdp(0x2c, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000040)="580000001400192340834b80043f679a2cff00804824ca945f640094000500289d5aaa000000000000008449bb06d383d537b300f0fffeff2c707f8f00ff200000000010000100090a00"/88, 0x58}], 0x1) 04:39:46 executing program 3: io_setup(0x6, &(0x7f0000000000)=0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x1e1241, 0x0) write$binfmt_aout(r1, &(0x7f0000000140)=ANY=[], 0xff2e) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "0040001e19113c81fcf76000"}) r2 = syz_open_pts(r1, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000340)=0x1b) dup3(r2, r1, 0x0) io_submit(r0, 0x2, &(0x7f0000000080)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 04:39:46 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@getaddr={0x14, 0x16, 0x201, 0x0, 0x0, {0x23}}, 0x14}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)={'syz1', "f72906678b7f80338f42b9dd2e5cae03c9586fab33b5450674d4f08ca6de3084681e74bcf4261a9a3175a6266f9c57e62eb43e2918eda5cab659de2c43c355453c2f2492ab88ccb34ca42a0a3ce75da43a77e46277e355cae6b6"}, 0x5e) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="6000000030003dfa0000000000000000000000004c000100480001000700010078740000380002802a000600260000006e676c65000000000000000000000000000000000000473c02effd000000000000000000080002"], 0x1}}, 0x0) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000280)={&(0x7f00000001c0)="665b25c505fbac779fee4bee75954a02474d04794161add9808ad103c6987c0c6fcf2f268cf444eae68121f088f19c36ec256038f0b6d14d940faedd8fbf01434dfc427f2dfdc93ecc7f467414c25b27e2329423383cb918694a3f3e771e452ebfefe66af9868f118e79f66c744f21ae0d0c74cc", &(0x7f0000000300)=""/250, &(0x7f0000000400)="3ad70b39e26590f2b2a22d772d8a17b3ae69227d73adb63cabc5b8d0ecacefa1462d770b7fe25fc70a7e04684d62226a59dbea278d9d2ef38f14156438b4f9f5ecb58da87ff86b98b88f22e10b461ad72afc1159a5ab3d9d2776b01e805293e4f589a3677c1e61caf53181762e306bc2e059a569ff6f3bc1d0434e55d7784f235465c061f88cf1d1a8f39862a2b0aff7b909ce5ec27cb387049d8147e1af68b1e8acb45e701018e49243c54afd8b37f0855fbd4ff96e529a495280", &(0x7f0000000240)="e41982c4d5c2e03c27392b8b9d405332c6b47857acdee9b2b6690a61da87e274", 0xffff}, 0x38) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = socket$netlink(0x10, 0x3, 0x0) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 04:39:46 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) socket$xdp(0x2c, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000040)="580000001400192340834b80043f679a2cff00804824ca945f640094000500289d5aaa000000000000008449bb06d383d537b300f0fffeff2c707f8f00ff200000000010000100090a00"/88, 0x58}], 0x1) [ 107.312642][ T25] audit: type=1400 audit(1686371986.472:142): avc: denied { create } for pid=3719 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 107.335772][ T25] audit: type=1400 audit(1686371986.472:143): avc: denied { create } for pid=3719 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 04:39:46 executing program 0: r0 = memfd_create(&(0x7f0000000140)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa6Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xca\xd7Uw\x00\xbc\xfa2\xb3\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8b\x066\xb8G\xd1c\xe1$\xff\x97k\xde\xc5\xe96\xddU)\xc98M\xcd\xfb\xcc\x82n=\x7f=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93=\xabQ\xf7\x05\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xac \xe8\xb6\xdf\x16J\xab\xecC\xe2{\xfd\x8a\xb4\x8e\x9c\xfb\xf6\xe9\xd8]B6)\x9f\x9cR\xae\x12G\xd8\xa4y\xef\x02?\xf2\xe7}\ra\x97F', 0x0) r1 = dup(r0) write$cgroup_pid(r1, &(0x7f0000000040)=0xffffffffffffffff, 0xe) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) getsockopt$bt_hci(r2, 0x0, 0x3, &(0x7f0000000200)=""/170, &(0x7f0000000080)=0xaa) sendfile(r0, r1, &(0x7f0000000100), 0x6c03) quotactl$Q_SETINFO(0x0, &(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, 0x0, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) sendfile(r3, r3, 0x0, 0x8080fffffffe) 04:39:46 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) socket$xdp(0x2c, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000040)="580000001400192340834b80043f679a2cff00804824ca945f640094000500289d5aaa000000000000008449bb06d383d537b300f0fffeff2c707f8f00ff200000000010000100090a00"/88, 0x58}], 0x1) [ 107.355494][ T25] audit: type=1400 audit(1686371986.472:144): avc: denied { write } for pid=3719 comm="syz-executor.5" path="socket:[19259]" dev="sockfs" ino=19259 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 107.380045][ T25] audit: type=1400 audit(1686371986.472:145): avc: denied { nlmsg_read } for pid=3719 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 04:39:46 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) socket$xdp(0x2c, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000040)="580000001400192340834b80043f679a2cff00804824ca945f640094000500289d5aaa000000000000008449bb06d383d537b300f0fffeff2c707f8f00ff200000000010000100090a00"/88, 0x58}], 0x1) [ 107.460824][ T3735] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 107.470069][ T3735] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 107.485354][ T3735] x_tables: ip_tables: .0 target: invalid size 8 (kernel) != (user) 6 [ 108.225417][ T3735] syz-executor.2 (3735) used greatest stack depth: 10056 bytes left 04:39:52 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x2}, 0x48) 04:39:52 executing program 3: io_setup(0x6, &(0x7f0000000000)=0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x1e1241, 0x0) write$binfmt_aout(r1, &(0x7f0000000140)=ANY=[], 0xff2e) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "0040001e19113c81fcf76000"}) r2 = syz_open_pts(r1, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000340)=0x1b) dup3(r2, r1, 0x0) io_submit(r0, 0x2, &(0x7f0000000080)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 04:39:52 executing program 4: r0 = memfd_create(&(0x7f0000000140)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa6Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xca\xd7Uw\x00\xbc\xfa2\xb3\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8b\x066\xb8G\xd1c\xe1$\xff\x97k\xde\xc5\xe96\xddU)\xc98M\xcd\xfb\xcc\x82n=\x7f=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93=\xabQ\xf7\x05\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xac \xe8\xb6\xdf\x16J\xab\xecC\xe2{\xfd\x8a\xb4\x8e\x9c\xfb\xf6\xe9\xd8]B6)\x9f\x9cR\xae\x12G\xd8\xa4y\xef\x02?\xf2\xe7}\ra\x97F', 0x0) r1 = dup(r0) write$cgroup_pid(r1, &(0x7f0000000040)=0xffffffffffffffff, 0xe) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) getsockopt$bt_hci(r2, 0x0, 0x3, &(0x7f0000000200)=""/170, &(0x7f0000000080)=0xaa) sendfile(r0, r1, &(0x7f0000000100), 0x6c03) quotactl$Q_SETINFO(0x0, &(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, 0x0, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) sendfile(r3, r3, 0x0, 0x8080fffffffe) 04:39:52 executing program 1: r0 = memfd_create(&(0x7f0000000140)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa6Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xca\xd7Uw\x00\xbc\xfa2\xb3\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8b\x066\xb8G\xd1c\xe1$\xff\x97k\xde\xc5\xe96\xddU)\xc98M\xcd\xfb\xcc\x82n=\x7f=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93=\xabQ\xf7\x05\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xac \xe8\xb6\xdf\x16J\xab\xecC\xe2{\xfd\x8a\xb4\x8e\x9c\xfb\xf6\xe9\xd8]B6)\x9f\x9cR\xae\x12G\xd8\xa4y\xef\x02?\xf2\xe7}\ra\x97F', 0x0) r1 = dup(r0) write$cgroup_pid(r1, &(0x7f0000000040)=0xffffffffffffffff, 0xe) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) getsockopt$bt_hci(r2, 0x0, 0x3, &(0x7f0000000200)=""/170, &(0x7f0000000080)=0xaa) sendfile(r0, r1, &(0x7f0000000100), 0x6c03) quotactl$Q_SETINFO(0x0, &(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, 0x0, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) sendfile(r3, r3, 0x0, 0x8080fffffffe) 04:39:52 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@getaddr={0x14, 0x16, 0x201, 0x0, 0x0, {0x23}}, 0x14}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)={'syz1', "f72906678b7f80338f42b9dd2e5cae03c9586fab33b5450674d4f08ca6de3084681e74bcf4261a9a3175a6266f9c57e62eb43e2918eda5cab659de2c43c355453c2f2492ab88ccb34ca42a0a3ce75da43a77e46277e355cae6b6"}, 0x5e) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="6000000030003dfa0000000000000000000000004c000100480001000700010078740000380002802a000600260000006e676c65000000000000000000000000000000000000473c02effd000000000000000000080002"], 0x1}}, 0x0) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000280)={&(0x7f00000001c0)="665b25c505fbac779fee4bee75954a02474d04794161add9808ad103c6987c0c6fcf2f268cf444eae68121f088f19c36ec256038f0b6d14d940faedd8fbf01434dfc427f2dfdc93ecc7f467414c25b27e2329423383cb918694a3f3e771e452ebfefe66af9868f118e79f66c744f21ae0d0c74cc", &(0x7f0000000300)=""/250, &(0x7f0000000400)="3ad70b39e26590f2b2a22d772d8a17b3ae69227d73adb63cabc5b8d0ecacefa1462d770b7fe25fc70a7e04684d62226a59dbea278d9d2ef38f14156438b4f9f5ecb58da87ff86b98b88f22e10b461ad72afc1159a5ab3d9d2776b01e805293e4f589a3677c1e61caf53181762e306bc2e059a569ff6f3bc1d0434e55d7784f235465c061f88cf1d1a8f39862a2b0aff7b909ce5ec27cb387049d8147e1af68b1e8acb45e701018e49243c54afd8b37f0855fbd4ff96e529a495280", &(0x7f0000000240)="e41982c4d5c2e03c27392b8b9d405332c6b47857acdee9b2b6690a61da87e274", 0xffff}, 0x38) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = socket$netlink(0x10, 0x3, 0x0) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 04:39:52 executing program 0: r0 = memfd_create(&(0x7f0000000140)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa6Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xca\xd7Uw\x00\xbc\xfa2\xb3\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8b\x066\xb8G\xd1c\xe1$\xff\x97k\xde\xc5\xe96\xddU)\xc98M\xcd\xfb\xcc\x82n=\x7f=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93=\xabQ\xf7\x05\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xac \xe8\xb6\xdf\x16J\xab\xecC\xe2{\xfd\x8a\xb4\x8e\x9c\xfb\xf6\xe9\xd8]B6)\x9f\x9cR\xae\x12G\xd8\xa4y\xef\x02?\xf2\xe7}\ra\x97F', 0x0) r1 = dup(r0) write$cgroup_pid(r1, &(0x7f0000000040)=0xffffffffffffffff, 0xe) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) getsockopt$bt_hci(r2, 0x0, 0x3, &(0x7f0000000200)=""/170, &(0x7f0000000080)=0xaa) sendfile(r0, r1, &(0x7f0000000100), 0x6c03) quotactl$Q_SETINFO(0x0, &(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, 0x0, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) sendfile(r3, r3, 0x0, 0x8080fffffffe) 04:39:52 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x2}, 0x48) 04:39:52 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x2}, 0x48) 04:39:52 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x2}, 0x48) 04:39:52 executing program 5: io_setup(0x6, &(0x7f0000000000)=0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x1e1241, 0x0) write$binfmt_aout(r1, &(0x7f0000000140)=ANY=[], 0xff2e) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "0040001e19113c81fcf76000"}) r2 = syz_open_pts(r1, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000340)=0x1b) dup3(r2, r1, 0x0) io_submit(r0, 0x2, &(0x7f0000000080)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 04:39:52 executing program 0: io_setup(0x6, &(0x7f0000000000)=0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x1e1241, 0x0) write$binfmt_aout(r1, &(0x7f0000000140)=ANY=[], 0xff2e) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "0040001e19113c81fcf76000"}) r2 = syz_open_pts(r1, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000340)=0x1b) dup3(r2, r1, 0x0) io_submit(r0, 0x2, &(0x7f0000000080)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 04:39:52 executing program 4: r0 = memfd_create(&(0x7f0000000140)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa6Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xca\xd7Uw\x00\xbc\xfa2\xb3\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8b\x066\xb8G\xd1c\xe1$\xff\x97k\xde\xc5\xe96\xddU)\xc98M\xcd\xfb\xcc\x82n=\x7f=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93=\xabQ\xf7\x05\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xac \xe8\xb6\xdf\x16J\xab\xecC\xe2{\xfd\x8a\xb4\x8e\x9c\xfb\xf6\xe9\xd8]B6)\x9f\x9cR\xae\x12G\xd8\xa4y\xef\x02?\xf2\xe7}\ra\x97F', 0x0) r1 = dup(r0) write$cgroup_pid(r1, &(0x7f0000000040)=0xffffffffffffffff, 0xe) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) getsockopt$bt_hci(r2, 0x0, 0x3, &(0x7f0000000200)=""/170, &(0x7f0000000080)=0xaa) sendfile(r0, r1, &(0x7f0000000100), 0x6c03) quotactl$Q_SETINFO(0x0, &(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, 0x0, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) sendfile(r3, r3, 0x0, 0x8080fffffffe) [ 113.614929][ T3758] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 113.624159][ T3758] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 113.637720][ T3758] x_tables: ip_tables: .0 target: invalid size 8 (kernel) != (user) 6 04:39:57 executing program 1: r0 = memfd_create(&(0x7f0000000140)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa6Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xca\xd7Uw\x00\xbc\xfa2\xb3\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8b\x066\xb8G\xd1c\xe1$\xff\x97k\xde\xc5\xe96\xddU)\xc98M\xcd\xfb\xcc\x82n=\x7f=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93=\xabQ\xf7\x05\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xac \xe8\xb6\xdf\x16J\xab\xecC\xe2{\xfd\x8a\xb4\x8e\x9c\xfb\xf6\xe9\xd8]B6)\x9f\x9cR\xae\x12G\xd8\xa4y\xef\x02?\xf2\xe7}\ra\x97F', 0x0) r1 = dup(r0) write$cgroup_pid(r1, &(0x7f0000000040)=0xffffffffffffffff, 0xe) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) getsockopt$bt_hci(r2, 0x0, 0x3, &(0x7f0000000200)=""/170, &(0x7f0000000080)=0xaa) sendfile(r0, r1, &(0x7f0000000100), 0x6c03) quotactl$Q_SETINFO(0x0, &(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, 0x0, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) sendfile(r3, r3, 0x0, 0x8080fffffffe) 04:39:57 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@getaddr={0x14, 0x16, 0x201, 0x0, 0x0, {0x23}}, 0x14}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)={'syz1', "f72906678b7f80338f42b9dd2e5cae03c9586fab33b5450674d4f08ca6de3084681e74bcf4261a9a3175a6266f9c57e62eb43e2918eda5cab659de2c43c355453c2f2492ab88ccb34ca42a0a3ce75da43a77e46277e355cae6b6"}, 0x5e) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="6000000030003dfa0000000000000000000000004c000100480001000700010078740000380002802a000600260000006e676c65000000000000000000000000000000000000473c02effd000000000000000000080002"], 0x1}}, 0x0) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000280)={&(0x7f00000001c0)="665b25c505fbac779fee4bee75954a02474d04794161add9808ad103c6987c0c6fcf2f268cf444eae68121f088f19c36ec256038f0b6d14d940faedd8fbf01434dfc427f2dfdc93ecc7f467414c25b27e2329423383cb918694a3f3e771e452ebfefe66af9868f118e79f66c744f21ae0d0c74cc", &(0x7f0000000300)=""/250, &(0x7f0000000400)="3ad70b39e26590f2b2a22d772d8a17b3ae69227d73adb63cabc5b8d0ecacefa1462d770b7fe25fc70a7e04684d62226a59dbea278d9d2ef38f14156438b4f9f5ecb58da87ff86b98b88f22e10b461ad72afc1159a5ab3d9d2776b01e805293e4f589a3677c1e61caf53181762e306bc2e059a569ff6f3bc1d0434e55d7784f235465c061f88cf1d1a8f39862a2b0aff7b909ce5ec27cb387049d8147e1af68b1e8acb45e701018e49243c54afd8b37f0855fbd4ff96e529a495280", &(0x7f0000000240)="e41982c4d5c2e03c27392b8b9d405332c6b47857acdee9b2b6690a61da87e274", 0xffff}, 0x38) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = socket$netlink(0x10, 0x3, 0x0) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 04:39:57 executing program 3: io_setup(0x6, &(0x7f0000000000)=0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x1e1241, 0x0) write$binfmt_aout(r1, &(0x7f0000000140)=ANY=[], 0xff2e) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "0040001e19113c81fcf76000"}) r2 = syz_open_pts(r1, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000340)=0x1b) dup3(r2, r1, 0x0) io_submit(r0, 0x2, &(0x7f0000000080)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 04:39:57 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@getaddr={0x14, 0x16, 0x201, 0x0, 0x0, {0x23}}, 0x14}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)={'syz1', "f72906678b7f80338f42b9dd2e5cae03c9586fab33b5450674d4f08ca6de3084681e74bcf4261a9a3175a6266f9c57e62eb43e2918eda5cab659de2c43c355453c2f2492ab88ccb34ca42a0a3ce75da43a77e46277e355cae6b6"}, 0x5e) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="6000000030003dfa0000000000000000000000004c000100480001000700010078740000380002802a000600260000006e676c65000000000000000000000000000000000000473c02effd000000000000000000080002"], 0x1}}, 0x0) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000280)={&(0x7f00000001c0)="665b25c505fbac779fee4bee75954a02474d04794161add9808ad103c6987c0c6fcf2f268cf444eae68121f088f19c36ec256038f0b6d14d940faedd8fbf01434dfc427f2dfdc93ecc7f467414c25b27e2329423383cb918694a3f3e771e452ebfefe66af9868f118e79f66c744f21ae0d0c74cc", &(0x7f0000000300)=""/250, &(0x7f0000000400)="3ad70b39e26590f2b2a22d772d8a17b3ae69227d73adb63cabc5b8d0ecacefa1462d770b7fe25fc70a7e04684d62226a59dbea278d9d2ef38f14156438b4f9f5ecb58da87ff86b98b88f22e10b461ad72afc1159a5ab3d9d2776b01e805293e4f589a3677c1e61caf53181762e306bc2e059a569ff6f3bc1d0434e55d7784f235465c061f88cf1d1a8f39862a2b0aff7b909ce5ec27cb387049d8147e1af68b1e8acb45e701018e49243c54afd8b37f0855fbd4ff96e529a495280", &(0x7f0000000240)="e41982c4d5c2e03c27392b8b9d405332c6b47857acdee9b2b6690a61da87e274", 0xffff}, 0x38) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = socket$netlink(0x10, 0x3, 0x0) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 04:39:57 executing program 5: io_setup(0x6, &(0x7f0000000000)=0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x1e1241, 0x0) write$binfmt_aout(r1, &(0x7f0000000140)=ANY=[], 0xff2e) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "0040001e19113c81fcf76000"}) r2 = syz_open_pts(r1, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000340)=0x1b) dup3(r2, r1, 0x0) io_submit(r0, 0x2, &(0x7f0000000080)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 04:39:57 executing program 0: io_setup(0x6, &(0x7f0000000000)=0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x1e1241, 0x0) write$binfmt_aout(r1, &(0x7f0000000140)=ANY=[], 0xff2e) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "0040001e19113c81fcf76000"}) r2 = syz_open_pts(r1, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000340)=0x1b) dup3(r2, r1, 0x0) io_submit(r0, 0x2, &(0x7f0000000080)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) [ 118.567969][ T3784] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 118.577213][ T3784] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 118.586757][ T3784] x_tables: ip_tables: .0 target: invalid size 8 (kernel) != (user) 6 [ 118.594976][ T3787] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 118.604240][ T3787] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 118.613584][ T3787] x_tables: ip_tables: .0 target: invalid size 8 (kernel) != (user) 6 04:39:58 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@getaddr={0x14, 0x16, 0x201, 0x0, 0x0, {0x23}}, 0x14}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)={'syz1', "f72906678b7f80338f42b9dd2e5cae03c9586fab33b5450674d4f08ca6de3084681e74bcf4261a9a3175a6266f9c57e62eb43e2918eda5cab659de2c43c355453c2f2492ab88ccb34ca42a0a3ce75da43a77e46277e355cae6b6"}, 0x5e) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="6000000030003dfa0000000000000000000000004c000100480001000700010078740000380002802a000600260000006e676c65000000000000000000000000000000000000473c02effd000000000000000000080002"], 0x1}}, 0x0) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000280)={&(0x7f00000001c0)="665b25c505fbac779fee4bee75954a02474d04794161add9808ad103c6987c0c6fcf2f268cf444eae68121f088f19c36ec256038f0b6d14d940faedd8fbf01434dfc427f2dfdc93ecc7f467414c25b27e2329423383cb918694a3f3e771e452ebfefe66af9868f118e79f66c744f21ae0d0c74cc", &(0x7f0000000300)=""/250, &(0x7f0000000400)="3ad70b39e26590f2b2a22d772d8a17b3ae69227d73adb63cabc5b8d0ecacefa1462d770b7fe25fc70a7e04684d62226a59dbea278d9d2ef38f14156438b4f9f5ecb58da87ff86b98b88f22e10b461ad72afc1159a5ab3d9d2776b01e805293e4f589a3677c1e61caf53181762e306bc2e059a569ff6f3bc1d0434e55d7784f235465c061f88cf1d1a8f39862a2b0aff7b909ce5ec27cb387049d8147e1af68b1e8acb45e701018e49243c54afd8b37f0855fbd4ff96e529a495280", &(0x7f0000000240)="e41982c4d5c2e03c27392b8b9d405332c6b47857acdee9b2b6690a61da87e274", 0xffff}, 0x38) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = socket$netlink(0x10, 0x3, 0x0) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 04:39:58 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@getaddr={0x14, 0x16, 0x201, 0x0, 0x0, {0x23}}, 0x14}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)={'syz1', "f72906678b7f80338f42b9dd2e5cae03c9586fab33b5450674d4f08ca6de3084681e74bcf4261a9a3175a6266f9c57e62eb43e2918eda5cab659de2c43c355453c2f2492ab88ccb34ca42a0a3ce75da43a77e46277e355cae6b6"}, 0x5e) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="6000000030003dfa0000000000000000000000004c000100480001000700010078740000380002802a000600260000006e676c65000000000000000000000000000000000000473c02effd000000000000000000080002"], 0x1}}, 0x0) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000280)={&(0x7f00000001c0)="665b25c505fbac779fee4bee75954a02474d04794161add9808ad103c6987c0c6fcf2f268cf444eae68121f088f19c36ec256038f0b6d14d940faedd8fbf01434dfc427f2dfdc93ecc7f467414c25b27e2329423383cb918694a3f3e771e452ebfefe66af9868f118e79f66c744f21ae0d0c74cc", &(0x7f0000000300)=""/250, &(0x7f0000000400)="3ad70b39e26590f2b2a22d772d8a17b3ae69227d73adb63cabc5b8d0ecacefa1462d770b7fe25fc70a7e04684d62226a59dbea278d9d2ef38f14156438b4f9f5ecb58da87ff86b98b88f22e10b461ad72afc1159a5ab3d9d2776b01e805293e4f589a3677c1e61caf53181762e306bc2e059a569ff6f3bc1d0434e55d7784f235465c061f88cf1d1a8f39862a2b0aff7b909ce5ec27cb387049d8147e1af68b1e8acb45e701018e49243c54afd8b37f0855fbd4ff96e529a495280", &(0x7f0000000240)="e41982c4d5c2e03c27392b8b9d405332c6b47857acdee9b2b6690a61da87e274", 0xffff}, 0x38) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = socket$netlink(0x10, 0x3, 0x0) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 04:39:58 executing program 0: io_setup(0x6, &(0x7f0000000000)=0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x1e1241, 0x0) write$binfmt_aout(r1, &(0x7f0000000140)=ANY=[], 0xff2e) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "0040001e19113c81fcf76000"}) r2 = syz_open_pts(r1, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000340)=0x1b) dup3(r2, r1, 0x0) io_submit(r0, 0x2, &(0x7f0000000080)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 04:39:58 executing program 5: io_setup(0x6, &(0x7f0000000000)=0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x1e1241, 0x0) write$binfmt_aout(r1, &(0x7f0000000140)=ANY=[], 0xff2e) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "0040001e19113c81fcf76000"}) r2 = syz_open_pts(r1, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000340)=0x1b) dup3(r2, r1, 0x0) io_submit(r0, 0x2, &(0x7f0000000080)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 04:39:58 executing program 3: io_setup(0x6, &(0x7f0000000000)=0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x1e1241, 0x0) write$binfmt_aout(r1, &(0x7f0000000140)=ANY=[], 0xff2e) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "0040001e19113c81fcf76000"}) r2 = syz_open_pts(r1, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000340)=0x1b) dup3(r2, r1, 0x0) io_submit(r0, 0x2, &(0x7f0000000080)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) [ 119.420140][ T3794] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 119.429498][ T3794] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 119.451129][ T3794] x_tables: ip_tables: .0 target: invalid size 8 (kernel) != (user) 6 [ 119.467286][ T3795] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 119.476530][ T3795] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 119.487413][ T3795] x_tables: ip_tables: .0 target: invalid size 8 (kernel) != (user) 6 04:39:59 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@getaddr={0x14, 0x16, 0x201, 0x0, 0x0, {0x23}}, 0x14}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)={'syz1', "f72906678b7f80338f42b9dd2e5cae03c9586fab33b5450674d4f08ca6de3084681e74bcf4261a9a3175a6266f9c57e62eb43e2918eda5cab659de2c43c355453c2f2492ab88ccb34ca42a0a3ce75da43a77e46277e355cae6b6"}, 0x5e) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="6000000030003dfa0000000000000000000000004c000100480001000700010078740000380002802a000600260000006e676c65000000000000000000000000000000000000473c02effd000000000000000000080002"], 0x1}}, 0x0) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000280)={&(0x7f00000001c0)="665b25c505fbac779fee4bee75954a02474d04794161add9808ad103c6987c0c6fcf2f268cf444eae68121f088f19c36ec256038f0b6d14d940faedd8fbf01434dfc427f2dfdc93ecc7f467414c25b27e2329423383cb918694a3f3e771e452ebfefe66af9868f118e79f66c744f21ae0d0c74cc", &(0x7f0000000300)=""/250, &(0x7f0000000400)="3ad70b39e26590f2b2a22d772d8a17b3ae69227d73adb63cabc5b8d0ecacefa1462d770b7fe25fc70a7e04684d62226a59dbea278d9d2ef38f14156438b4f9f5ecb58da87ff86b98b88f22e10b461ad72afc1159a5ab3d9d2776b01e805293e4f589a3677c1e61caf53181762e306bc2e059a569ff6f3bc1d0434e55d7784f235465c061f88cf1d1a8f39862a2b0aff7b909ce5ec27cb387049d8147e1af68b1e8acb45e701018e49243c54afd8b37f0855fbd4ff96e529a495280", &(0x7f0000000240)="e41982c4d5c2e03c27392b8b9d405332c6b47857acdee9b2b6690a61da87e274", 0xffff}, 0x38) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = socket$netlink(0x10, 0x3, 0x0) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 04:39:59 executing program 2: r0 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f00000002c0)='[*]\x00', &(0x7f00000004c0)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xdbt%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\xdc\x92\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xe4#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajjW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97J`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)6v\x8d4\xe4\x80\xa3C\x96\x9a\xb8\x9cY\xaeJ7\x0f\x19A\xa6\x92\xc6\xf3\xf4\x98S\xabj\xdfU:\x03dH\x1d?\xe1\x94p%\t\n\xa0V\x04\xe7\xa8\xc7\xd1\xff\xabo>\xe1\x8e\xbc?\xfb\xa3JN\xe1\x93)\x0e\x87\xb9\xbc\x7f\x12\xc2\x01\t \x8f}\xf2\x10\x9f\xcc\x82\xc9\x17[\xd8\fx\xa2\x19\xf9^d\xcfw]\x96\x80#\x8f\xe4R2\xdas\x17\xb9L\x16!V\x14m1$? P:\xbe\x04Ke\x02\b\xb4K\x96\xe9\x92\v\x10\x88<\xeb.rZ\x01P\r\xca\xa6c3h\xc4ET\xa3\x80\xb4+NL\xe8Jz\x91\xc2\xfeS\n\x00\x93\x90\n\x0f\xa8^\xb3\xe85\x9e|\xef\xe3\xd1\xd179\xff\xbeG\x16\xef\x02[gt6\xd7\x86\x11fp\xf4U?\xc1\x17!\x19B\x88\x9ezk\xd9wo\xc6\xb5\xa9\xc2\x10\x8b\xa9\xee<\xab\f\xec\x9fTwiq\xbf\x8d\x96\x83T\xf4-1g\xaczu)\x1aU\xfe\x9dx\xd6\xc8\xb9\xe3\x82\x85\xf3\xa9\x83\x89\xb6\xce\xe9\t\xdd\xa4\xbfw0H\xf6\x13\xfb4\x8f\x96\xc0i\x89\x97\x8az\xdd\x8e\xac\xce&\xbea\xe5\x82\x88i9\x0eh\xca\xce\xa7\xbd\xdd(_d\xb4\xd7\x90#\x01\x9b\xc8w}\x7f\xff\xc9\xe0\xcaT\xa8s\x1b\xdf>H\xb7Abf\xbe\xca\n7a_\xafG8', 0x0) [ 120.223742][ T25] audit: type=1400 audit(1686371999.382:146): avc: denied { mount } for pid=3805 comm="syz-executor.2" name="/" dev="ramfs" ino=20036 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 120.270151][ T3807] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 120.279414][ T3807] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 120.288680][ T3807] x_tables: ip_tables: .0 target: invalid size 8 (kernel) != (user) 6 04:40:08 executing program 5: r0 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f00000002c0)='[*]\x00', &(0x7f00000004c0)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xdbt%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\xdc\x92\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xe4#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajjW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97J`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)6v\x8d4\xe4\x80\xa3C\x96\x9a\xb8\x9cY\xaeJ7\x0f\x19A\xa6\x92\xc6\xf3\xf4\x98S\xabj\xdfU:\x03dH\x1d?\xe1\x94p%\t\n\xa0V\x04\xe7\xa8\xc7\xd1\xff\xabo>\xe1\x8e\xbc?\xfb\xa3JN\xe1\x93)\x0e\x87\xb9\xbc\x7f\x12\xc2\x01\t \x8f}\xf2\x10\x9f\xcc\x82\xc9\x17[\xd8\fx\xa2\x19\xf9^d\xcfw]\x96\x80#\x8f\xe4R2\xdas\x17\xb9L\x16!V\x14m1$? P:\xbe\x04Ke\x02\b\xb4K\x96\xe9\x92\v\x10\x88<\xeb.rZ\x01P\r\xca\xa6c3h\xc4ET\xa3\x80\xb4+NL\xe8Jz\x91\xc2\xfeS\n\x00\x93\x90\n\x0f\xa8^\xb3\xe85\x9e|\xef\xe3\xd1\xd179\xff\xbeG\x16\xef\x02[gt6\xd7\x86\x11fp\xf4U?\xc1\x17!\x19B\x88\x9ezk\xd9wo\xc6\xb5\xa9\xc2\x10\x8b\xa9\xee<\xab\f\xec\x9fTwiq\xbf\x8d\x96\x83T\xf4-1g\xaczu)\x1aU\xfe\x9dx\xd6\xc8\xb9\xe3\x82\x85\xf3\xa9\x83\x89\xb6\xce\xe9\t\xdd\xa4\xbfw0H\xf6\x13\xfb4\x8f\x96\xc0i\x89\x97\x8az\xdd\x8e\xac\xce&\xbea\xe5\x82\x88i9\x0eh\xca\xce\xa7\xbd\xdd(_d\xb4\xd7\x90#\x01\x9b\xc8w}\x7f\xff\xc9\xe0\xcaT\xa8s\x1b\xdf>H\xb7Abf\xbe\xca\n7a_\xafG8', 0x0) 04:40:08 executing program 2: r0 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f00000002c0)='[*]\x00', &(0x7f00000004c0)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xdbt%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\xdc\x92\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xe4#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajjW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97J`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)6v\x8d4\xe4\x80\xa3C\x96\x9a\xb8\x9cY\xaeJ7\x0f\x19A\xa6\x92\xc6\xf3\xf4\x98S\xabj\xdfU:\x03dH\x1d?\xe1\x94p%\t\n\xa0V\x04\xe7\xa8\xc7\xd1\xff\xabo>\xe1\x8e\xbc?\xfb\xa3JN\xe1\x93)\x0e\x87\xb9\xbc\x7f\x12\xc2\x01\t \x8f}\xf2\x10\x9f\xcc\x82\xc9\x17[\xd8\fx\xa2\x19\xf9^d\xcfw]\x96\x80#\x8f\xe4R2\xdas\x17\xb9L\x16!V\x14m1$? P:\xbe\x04Ke\x02\b\xb4K\x96\xe9\x92\v\x10\x88<\xeb.rZ\x01P\r\xca\xa6c3h\xc4ET\xa3\x80\xb4+NL\xe8Jz\x91\xc2\xfeS\n\x00\x93\x90\n\x0f\xa8^\xb3\xe85\x9e|\xef\xe3\xd1\xd179\xff\xbeG\x16\xef\x02[gt6\xd7\x86\x11fp\xf4U?\xc1\x17!\x19B\x88\x9ezk\xd9wo\xc6\xb5\xa9\xc2\x10\x8b\xa9\xee<\xab\f\xec\x9fTwiq\xbf\x8d\x96\x83T\xf4-1g\xaczu)\x1aU\xfe\x9dx\xd6\xc8\xb9\xe3\x82\x85\xf3\xa9\x83\x89\xb6\xce\xe9\t\xdd\xa4\xbfw0H\xf6\x13\xfb4\x8f\x96\xc0i\x89\x97\x8az\xdd\x8e\xac\xce&\xbea\xe5\x82\x88i9\x0eh\xca\xce\xa7\xbd\xdd(_d\xb4\xd7\x90#\x01\x9b\xc8w}\x7f\xff\xc9\xe0\xcaT\xa8s\x1b\xdf>H\xb7Abf\xbe\xca\n7a_\xafG8', 0x0) 04:40:08 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, 0x0, 0x0) 04:40:08 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x58, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x12}]}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}]}, 0x58}}, 0x0) 04:40:08 executing program 4: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r0, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x1d) socket$nl_sock_diag(0x10, 0x3, 0x4) 04:40:08 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x44, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x16}]}, @NFT_MSG_NEWSETELEM={0x38, 0xc, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0xc, 0x3, 0x0, 0x1, [{0x8, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY={0x4}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xc4}}, 0x0) 04:40:08 executing program 4: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r0, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x1d) socket$nl_sock_diag(0x10, 0x3, 0x4) 04:40:08 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x58, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x12}]}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}]}, 0x58}}, 0x0) 04:40:08 executing program 2: r0 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f00000002c0)='[*]\x00', &(0x7f00000004c0)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xdbt%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\xdc\x92\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xe4#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajjW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97J`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)6v\x8d4\xe4\x80\xa3C\x96\x9a\xb8\x9cY\xaeJ7\x0f\x19A\xa6\x92\xc6\xf3\xf4\x98S\xabj\xdfU:\x03dH\x1d?\xe1\x94p%\t\n\xa0V\x04\xe7\xa8\xc7\xd1\xff\xabo>\xe1\x8e\xbc?\xfb\xa3JN\xe1\x93)\x0e\x87\xb9\xbc\x7f\x12\xc2\x01\t \x8f}\xf2\x10\x9f\xcc\x82\xc9\x17[\xd8\fx\xa2\x19\xf9^d\xcfw]\x96\x80#\x8f\xe4R2\xdas\x17\xb9L\x16!V\x14m1$? P:\xbe\x04Ke\x02\b\xb4K\x96\xe9\x92\v\x10\x88<\xeb.rZ\x01P\r\xca\xa6c3h\xc4ET\xa3\x80\xb4+NL\xe8Jz\x91\xc2\xfeS\n\x00\x93\x90\n\x0f\xa8^\xb3\xe85\x9e|\xef\xe3\xd1\xd179\xff\xbeG\x16\xef\x02[gt6\xd7\x86\x11fp\xf4U?\xc1\x17!\x19B\x88\x9ezk\xd9wo\xc6\xb5\xa9\xc2\x10\x8b\xa9\xee<\xab\f\xec\x9fTwiq\xbf\x8d\x96\x83T\xf4-1g\xaczu)\x1aU\xfe\x9dx\xd6\xc8\xb9\xe3\x82\x85\xf3\xa9\x83\x89\xb6\xce\xe9\t\xdd\xa4\xbfw0H\xf6\x13\xfb4\x8f\x96\xc0i\x89\x97\x8az\xdd\x8e\xac\xce&\xbea\xe5\x82\x88i9\x0eh\xca\xce\xa7\xbd\xdd(_d\xb4\xd7\x90#\x01\x9b\xc8w}\x7f\xff\xc9\xe0\xcaT\xa8s\x1b\xdf>H\xb7Abf\xbe\xca\n7a_\xafG8', 0x0) 04:40:08 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, 0x0, 0x0) 04:40:08 executing program 5: r0 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f00000002c0)='[*]\x00', &(0x7f00000004c0)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xdbt%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\xdc\x92\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xe4#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajjW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97J`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)6v\x8d4\xe4\x80\xa3C\x96\x9a\xb8\x9cY\xaeJ7\x0f\x19A\xa6\x92\xc6\xf3\xf4\x98S\xabj\xdfU:\x03dH\x1d?\xe1\x94p%\t\n\xa0V\x04\xe7\xa8\xc7\xd1\xff\xabo>\xe1\x8e\xbc?\xfb\xa3JN\xe1\x93)\x0e\x87\xb9\xbc\x7f\x12\xc2\x01\t \x8f}\xf2\x10\x9f\xcc\x82\xc9\x17[\xd8\fx\xa2\x19\xf9^d\xcfw]\x96\x80#\x8f\xe4R2\xdas\x17\xb9L\x16!V\x14m1$? P:\xbe\x04Ke\x02\b\xb4K\x96\xe9\x92\v\x10\x88<\xeb.rZ\x01P\r\xca\xa6c3h\xc4ET\xa3\x80\xb4+NL\xe8Jz\x91\xc2\xfeS\n\x00\x93\x90\n\x0f\xa8^\xb3\xe85\x9e|\xef\xe3\xd1\xd179\xff\xbeG\x16\xef\x02[gt6\xd7\x86\x11fp\xf4U?\xc1\x17!\x19B\x88\x9ezk\xd9wo\xc6\xb5\xa9\xc2\x10\x8b\xa9\xee<\xab\f\xec\x9fTwiq\xbf\x8d\x96\x83T\xf4-1g\xaczu)\x1aU\xfe\x9dx\xd6\xc8\xb9\xe3\x82\x85\xf3\xa9\x83\x89\xb6\xce\xe9\t\xdd\xa4\xbfw0H\xf6\x13\xfb4\x8f\x96\xc0i\x89\x97\x8az\xdd\x8e\xac\xce&\xbea\xe5\x82\x88i9\x0eh\xca\xce\xa7\xbd\xdd(_d\xb4\xd7\x90#\x01\x9b\xc8w}\x7f\xff\xc9\xe0\xcaT\xa8s\x1b\xdf>H\xb7Abf\xbe\xca\n7a_\xafG8', 0x0) [ 128.867289][ T25] audit: type=1400 audit(1686372008.032:147): avc: denied { create } for pid=3813 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 04:40:08 executing program 4: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r0, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x1d) socket$nl_sock_diag(0x10, 0x3, 0x4) 04:40:08 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, 0x0, 0x0) 04:40:08 executing program 4: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r0, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x1d) socket$nl_sock_diag(0x10, 0x3, 0x4) 04:40:08 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, 0x0, 0x0) [ 128.900903][ T25] audit: type=1400 audit(1686372008.032:148): avc: denied { create } for pid=3818 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=netlink_tcpdiag_socket permissive=1 [ 128.922405][ T25] audit: type=1400 audit(1686372008.052:149): avc: denied { create } for pid=3815 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 128.943376][ T25] audit: type=1400 audit(1686372008.052:150): avc: denied { write } for pid=3815 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 04:40:08 executing program 2: r0 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f00000002c0)='[*]\x00', &(0x7f00000004c0)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xdbt%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\xdc\x92\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xe4#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajjW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97J`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)6v\x8d4\xe4\x80\xa3C\x96\x9a\xb8\x9cY\xaeJ7\x0f\x19A\xa6\x92\xc6\xf3\xf4\x98S\xabj\xdfU:\x03dH\x1d?\xe1\x94p%\t\n\xa0V\x04\xe7\xa8\xc7\xd1\xff\xabo>\xe1\x8e\xbc?\xfb\xa3JN\xe1\x93)\x0e\x87\xb9\xbc\x7f\x12\xc2\x01\t \x8f}\xf2\x10\x9f\xcc\x82\xc9\x17[\xd8\fx\xa2\x19\xf9^d\xcfw]\x96\x80#\x8f\xe4R2\xdas\x17\xb9L\x16!V\x14m1$? P:\xbe\x04Ke\x02\b\xb4K\x96\xe9\x92\v\x10\x88<\xeb.rZ\x01P\r\xca\xa6c3h\xc4ET\xa3\x80\xb4+NL\xe8Jz\x91\xc2\xfeS\n\x00\x93\x90\n\x0f\xa8^\xb3\xe85\x9e|\xef\xe3\xd1\xd179\xff\xbeG\x16\xef\x02[gt6\xd7\x86\x11fp\xf4U?\xc1\x17!\x19B\x88\x9ezk\xd9wo\xc6\xb5\xa9\xc2\x10\x8b\xa9\xee<\xab\f\xec\x9fTwiq\xbf\x8d\x96\x83T\xf4-1g\xaczu)\x1aU\xfe\x9dx\xd6\xc8\xb9\xe3\x82\x85\xf3\xa9\x83\x89\xb6\xce\xe9\t\xdd\xa4\xbfw0H\xf6\x13\xfb4\x8f\x96\xc0i\x89\x97\x8az\xdd\x8e\xac\xce&\xbea\xe5\x82\x88i9\x0eh\xca\xce\xa7\xbd\xdd(_d\xb4\xd7\x90#\x01\x9b\xc8w}\x7f\xff\xc9\xe0\xcaT\xa8s\x1b\xdf>H\xb7Abf\xbe\xca\n7a_\xafG8', 0x0) 04:40:08 executing program 5: r0 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f00000002c0)='[*]\x00', &(0x7f00000004c0)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xdbt%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\xdc\x92\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xe4#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajjW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97J`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)6v\x8d4\xe4\x80\xa3C\x96\x9a\xb8\x9cY\xaeJ7\x0f\x19A\xa6\x92\xc6\xf3\xf4\x98S\xabj\xdfU:\x03dH\x1d?\xe1\x94p%\t\n\xa0V\x04\xe7\xa8\xc7\xd1\xff\xabo>\xe1\x8e\xbc?\xfb\xa3JN\xe1\x93)\x0e\x87\xb9\xbc\x7f\x12\xc2\x01\t \x8f}\xf2\x10\x9f\xcc\x82\xc9\x17[\xd8\fx\xa2\x19\xf9^d\xcfw]\x96\x80#\x8f\xe4R2\xdas\x17\xb9L\x16!V\x14m1$? P:\xbe\x04Ke\x02\b\xb4K\x96\xe9\x92\v\x10\x88<\xeb.rZ\x01P\r\xca\xa6c3h\xc4ET\xa3\x80\xb4+NL\xe8Jz\x91\xc2\xfeS\n\x00\x93\x90\n\x0f\xa8^\xb3\xe85\x9e|\xef\xe3\xd1\xd179\xff\xbeG\x16\xef\x02[gt6\xd7\x86\x11fp\xf4U?\xc1\x17!\x19B\x88\x9ezk\xd9wo\xc6\xb5\xa9\xc2\x10\x8b\xa9\xee<\xab\f\xec\x9fTwiq\xbf\x8d\x96\x83T\xf4-1g\xaczu)\x1aU\xfe\x9dx\xd6\xc8\xb9\xe3\x82\x85\xf3\xa9\x83\x89\xb6\xce\xe9\t\xdd\xa4\xbfw0H\xf6\x13\xfb4\x8f\x96\xc0i\x89\x97\x8az\xdd\x8e\xac\xce&\xbea\xe5\x82\x88i9\x0eh\xca\xce\xa7\xbd\xdd(_d\xb4\xd7\x90#\x01\x9b\xc8w}\x7f\xff\xc9\xe0\xcaT\xa8s\x1b\xdf>H\xb7Abf\xbe\xca\n7a_\xafG8', 0x0) [ 128.964176][ T25] audit: type=1400 audit(1686372008.052:151): avc: denied { setopt } for pid=3813 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 129.012931][ T25] audit: type=1400 audit(1686372008.092:152): avc: denied { read } for pid=3826 comm="syz-executor.0" dev="nsfs" ino=4026532673 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 129.034410][ T25] audit: type=1400 audit(1686372008.092:153): avc: denied { open } for pid=3826 comm="syz-executor.0" path="net:[4026532673]" dev="nsfs" ino=4026532673 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 04:40:14 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x44, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x16}]}, @NFT_MSG_NEWSETELEM={0x38, 0xc, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0xc, 0x3, 0x0, 0x1, [{0x8, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY={0x4}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xc4}}, 0x0) 04:40:14 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x58, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x12}]}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}]}, 0x58}}, 0x0) 04:40:14 executing program 0: unshare(0x400) r0 = syz_open_dev$evdev(&(0x7f00000001c0), 0x0, 0x0) ioctl$EVIOCSABS0(r0, 0x401845c0, 0x0) 04:40:14 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a80)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}]}, @NFT_MSG_NEWSETELEM={0x20, 0x2, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xa4}}, 0x0) 04:40:14 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x0, 0x80000001, 0x0, 0x98c8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffec850000006d000000850000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={r1, 0x58, &(0x7f0000000300)}, 0x10) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_service_time\x00', 0x26e1, 0x0) close(0xffffffffffffffff) close(r2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r2, &(0x7f0000000080), 0x11ffffce1) recvmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x7ffff09a}], 0x1, 0x0, 0xf2, 0xa0}, 0x0) 04:40:14 executing program 5: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x6, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000942000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000140)='./bus\x00', 0x1eb142, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) 04:40:14 executing program 0: unshare(0x400) r0 = syz_open_dev$evdev(&(0x7f00000001c0), 0x0, 0x0) ioctl$EVIOCSABS0(r0, 0x401845c0, 0x0) 04:40:14 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x58, 0x2, 0x6, 0x5, 0x0, 0xf0ffff, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x12}]}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}]}, 0x58}}, 0x0) 04:40:14 executing program 0: unshare(0x400) r0 = syz_open_dev$evdev(&(0x7f00000001c0), 0x0, 0x0) ioctl$EVIOCSABS0(r0, 0x401845c0, 0x0) 04:40:14 executing program 0: unshare(0x400) r0 = syz_open_dev$evdev(&(0x7f00000001c0), 0x0, 0x0) ioctl$EVIOCSABS0(r0, 0x401845c0, 0x0) 04:40:14 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a80)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}]}, @NFT_MSG_NEWSETELEM={0x20, 0x2, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xa4}}, 0x0) [ 135.137177][ T25] audit: type=1400 audit(1686372014.302:154): avc: denied { read } for pid=3853 comm="syz-executor.0" name="event0" dev="devtmpfs" ino=217 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 135.139502][ T3859] mmap: syz-executor.5 (3859) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. 04:40:14 executing program 5: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x6, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000942000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000140)='./bus\x00', 0x1eb142, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) 04:40:18 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x44, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x16}]}, @NFT_MSG_NEWSETELEM={0x38, 0xc, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0xc, 0x3, 0x0, 0x1, [{0x8, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY={0x4}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xc4}}, 0x0) 04:40:18 executing program 3: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x6, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000942000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000140)='./bus\x00', 0x1eb142, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) 04:40:18 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff010000850000000e000000850000005000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x9) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002080)={0xffffffffffffffff}) r2 = socket(0x200000100000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'wg0\x00', 0x0}) bind$packet(r2, &(0x7f00000000c0)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[], 0x48}}, 0x0) 04:40:18 executing program 5: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x6, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000942000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000140)='./bus\x00', 0x1eb142, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) 04:40:18 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a80)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}]}, @NFT_MSG_NEWSETELEM={0x20, 0x2, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xa4}}, 0x0) 04:40:18 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x0, 0x80000001, 0x0, 0x98c8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffec850000006d000000850000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={r1, 0x58, &(0x7f0000000300)}, 0x10) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_service_time\x00', 0x26e1, 0x0) close(0xffffffffffffffff) close(r2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r2, &(0x7f0000000080), 0x11ffffce1) recvmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x7ffff09a}], 0x1, 0x0, 0xf2, 0xa0}, 0x0) 04:40:18 executing program 3: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x6, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000942000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000140)='./bus\x00', 0x1eb142, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) 04:40:18 executing program 5: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x6, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000942000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000140)='./bus\x00', 0x1eb142, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) 04:40:18 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff010000850000000e000000850000005000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x9) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002080)={0xffffffffffffffff}) r2 = socket(0x200000100000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'wg0\x00', 0x0}) bind$packet(r2, &(0x7f00000000c0)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[], 0x48}}, 0x0) 04:40:18 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a80)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}]}, @NFT_MSG_NEWSETELEM={0x20, 0x2, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xa4}}, 0x0) [ 139.382960][ T25] audit: type=1400 audit(1686372018.542:155): avc: denied { create } for pid=3878 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 04:40:18 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x0, 0x80000001, 0x0, 0x98c8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffec850000006d000000850000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={r1, 0x58, &(0x7f0000000300)}, 0x10) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_service_time\x00', 0x26e1, 0x0) close(0xffffffffffffffff) close(r2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r2, &(0x7f0000000080), 0x11ffffce1) recvmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x7ffff09a}], 0x1, 0x0, 0xf2, 0xa0}, 0x0) 04:40:18 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff010000850000000e000000850000005000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x9) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002080)={0xffffffffffffffff}) r2 = socket(0x200000100000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'wg0\x00', 0x0}) bind$packet(r2, &(0x7f00000000c0)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[], 0x48}}, 0x0) [ 139.449557][ T25] audit: type=1400 audit(1686372018.542:156): avc: denied { bind } for pid=3878 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 139.469412][ T25] audit: type=1400 audit(1686372018.542:157): avc: denied { write } for pid=3878 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 04:40:22 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x44, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x16}]}, @NFT_MSG_NEWSETELEM={0x38, 0xc, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0xc, 0x3, 0x0, 0x1, [{0x8, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY={0x4}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xc4}}, 0x0) 04:40:22 executing program 3: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x6, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000942000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000140)='./bus\x00', 0x1eb142, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) 04:40:22 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff010000850000000e000000850000005000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x9) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002080)={0xffffffffffffffff}) r2 = socket(0x200000100000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'wg0\x00', 0x0}) bind$packet(r2, &(0x7f00000000c0)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[], 0x48}}, 0x0) 04:40:22 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x0, 0x80000001, 0x0, 0x98c8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffec850000006d000000850000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={r1, 0x58, &(0x7f0000000300)}, 0x10) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_service_time\x00', 0x26e1, 0x0) close(0xffffffffffffffff) close(r2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r2, &(0x7f0000000080), 0x11ffffce1) recvmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x7ffff09a}], 0x1, 0x0, 0xf2, 0xa0}, 0x0) 04:40:22 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x0, 0x80000001, 0x0, 0x98c8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffec850000006d000000850000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={r1, 0x58, &(0x7f0000000300)}, 0x10) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_service_time\x00', 0x26e1, 0x0) close(0xffffffffffffffff) close(r2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r2, &(0x7f0000000080), 0x11ffffce1) recvmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x7ffff09a}], 0x1, 0x0, 0xf2, 0xa0}, 0x0) 04:40:22 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x0, 0x80000001, 0x0, 0x98c8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffec850000006d000000850000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={r1, 0x58, &(0x7f0000000300)}, 0x10) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_service_time\x00', 0x26e1, 0x0) close(0xffffffffffffffff) close(r2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r2, &(0x7f0000000080), 0x11ffffce1) recvmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x7ffff09a}], 0x1, 0x0, 0xf2, 0xa0}, 0x0) 04:40:22 executing program 3: syz_emit_ethernet(0x56, &(0x7f0000000000)={@local, @local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, {[@timestamp={0x3, 0x3}]}}}}}}}}, 0x0) 04:40:22 executing program 3: syz_emit_ethernet(0x56, &(0x7f0000000000)={@local, @local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, {[@timestamp={0x3, 0x3}]}}}}}}}}, 0x0) 04:40:22 executing program 0: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000580)='./file0\x00', 0x0, &(0x7f0000000180)={[{@fat=@fmask={'fmask', 0x3d, 0x1000}}, {@fat=@tz_utc}, {@nodots}, {@dots}, {@fat=@umask={'umask', 0x3d, 0xfff}}, {@nodots}, {@fat=@check_strict}]}, 0x1, 0x584, &(0x7f00000010c0)="$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") r0 = open(&(0x7f0000000580)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000300)='./file0\x00', 0x0) 04:40:22 executing program 3: syz_emit_ethernet(0x56, &(0x7f0000000000)={@local, @local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, {[@timestamp={0x3, 0x3}]}}}}}}}}, 0x0) 04:40:22 executing program 3: syz_emit_ethernet(0x56, &(0x7f0000000000)={@local, @local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, {[@timestamp={0x3, 0x3}]}}}}}}}}, 0x0) [ 143.705676][ T3917] loop0: detected capacity change from 0 to 2048 [ 143.730830][ T3917] FAT-fs (loop0): Directory bread(block 1310756) failed [ 143.745101][ T3917] FAT-fs (loop0): Directory bread(block 1310757) failed 04:40:22 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000500)='./file1\x00', 0x4500, &(0x7f0000000000)=ANY=[@ANYBLOB="007aa4592773c1dcf5000000"], 0x0, 0x4b4, &(0x7f0000000540)="$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") open(&(0x7f0000000180)='./bus\x00', 0x14d27e, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000380)='./bus\x00', 0x141842, 0x0) write(r0, &(0x7f0000004200)="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", 0xffe00) quotactl$Q_SETQUOTA(0xffffffff80000600, &(0x7f0000000180)=@loop={'/dev/loop', 0x0}, 0x0, &(0x7f0000000080)) [ 143.768823][ T3917] FAT-fs (loop0): Directory bread(block 1310758) failed [ 143.776131][ T3917] FAT-fs (loop0): Directory bread(block 1310759) failed [ 143.784314][ T3917] FAT-fs (loop0): Directory bread(block 1310760) failed [ 143.793354][ T3917] FAT-fs (loop0): Directory bread(block 1310761) failed [ 143.801457][ T3917] FAT-fs (loop0): Directory bread(block 1310762) failed [ 143.808748][ T3917] FAT-fs (loop0): Directory bread(block 1310763) failed [ 143.813668][ T3931] loop3: detected capacity change from 0 to 512 [ 143.816324][ T3917] FAT-fs (loop0): Directory bread(block 1310764) failed [ 143.829093][ T3917] FAT-fs (loop0): Directory bread(block 1310765) failed [ 143.845224][ T25] audit: type=1400 audit(1686372023.012:158): avc: denied { mount } for pid=3916 comm="syz-executor.0" name="/" dev="loop0" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dosfs_t tclass=filesystem permissive=1 [ 143.868873][ T25] audit: type=1400 audit(1686372023.032:159): avc: denied { unmount } for pid=3076 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dosfs_t tclass=filesystem permissive=1 [ 143.895811][ T25] audit: type=1400 audit(1686372023.062:160): avc: denied { mounton } for pid=3930 comm="syz-executor.3" path="/root/syzkaller-testdir3472632451/syzkaller.MWPM9k/41/bus" dev="sda1" ino=1947 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=file permissive=1 [ 143.923807][ T25] audit: type=1400 audit(1686372023.092:161): avc: denied { unmount } for pid=3060 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 04:40:29 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x0, 0x80000001, 0x0, 0x98c8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffec850000006d000000850000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={r1, 0x58, &(0x7f0000000300)}, 0x10) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_service_time\x00', 0x26e1, 0x0) close(0xffffffffffffffff) close(r2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r2, &(0x7f0000000080), 0x11ffffce1) recvmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x7ffff09a}], 0x1, 0x0, 0xf2, 0xa0}, 0x0) 04:40:29 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000500)='./file1\x00', 0x4500, &(0x7f0000000000)=ANY=[@ANYBLOB="007aa4592773c1dcf5000000"], 0x0, 0x4b4, &(0x7f0000000540)="$eJzs3d9rW9cdAPDvvbay/HBmZ9tDFlgWlgwnbJHseEnMHrIMxvIU2Ja9Z54tG2PZMpacxCYMh/0BgzHWQp/61JdC/4BCyZ9QCoH2vbSlpbRJ+9CHtiqSrtLElWKHyL5gfz5wfM+5V9L3e2x0dc+9x7oB7FunIuJqRAxExLmIGM7Wp1m51mxstB/36OHd6WZJotG48VkSSbau81pJtjzSfkocjIi/XYv4Z/LDuLW19YWpSqW8krVL9cXlUm1t/fz84tRcea68NDExfmny8uTFybG+9HMkIq786aP//+e1P19567e337/5ydl/NdMayrY/2Y9+ane90PpddAxGxMpOBMvBQLYs5JwHAADb0zzG/0lE/Kp1/D8cA62jUwAAAGAvafxhKL5OIhoAAADAnpW25sAmaTGbCzAUaVostufw/iwOp5Vqrf6b2erq0kx7ruxIFNLZ+Up5LJsrPBKFpNkez+bYdtoXNrUnIuJYRPxv+FCrXZyuVmbyPvkBAAAA+8SRTeP/L4fb438AAABgjxnJOwEAAABgxxn/AwAAwN5n/A8AAAB72l+uX2+WRuf+1zO31lYXqrfOz5RrC8XF1enidHVluThXrc61vrNvcavXq1Sry7+LpdU7pXq5Vi/V1tZvLlZXl+o355+6BTYAAACwi4798v57SURs/P5QqzQdyDspYFckz/PgD3cuD2D3DeSdAJCbwbwTAHJTyDsBIHdbnQfoOXnn7f7nAgAA7IzRn/e+/u/cAOxtad4JAAC7zvV/2L8KZgDCvvfjLba/+PX/RuO5EgIAAPpuqFWStJhdCxyKNC0WI462bgtQSGbnK+WxbHzw7nDhR832eOuZyfP97zAAAAAAAAAAAAAAAAAAAAAAAAAA7GONRhINAAAAYE+LSD9OWt/mHzE6fGZo8/mBA8lXw61lRNx+5cZLd6bq9ZXx5vrPH6+vv5ytv5DHGQwAAABgs844vTOOBwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIB+evTw7nSn7GbcT/8YESPd4g/GwdbyYBQi4vAXSQw+8bwkIgb6EH/jXkQc7xY/aaYVI1kW3eIfyjF+GhFH+hAf9rP7zf3P1W7vvzROtZbd33+DWXlRvfd/6eP930CP/c/RbcY48eCNUs/49yJODHbf/3TiJz3in95m/H/8fX2917bGqxGjXT9/kqdileqLy6Xa2vr5+cWpufJceWliYvzS5OXJi5Njpdn5Sjn72TXGf3/x5rfP6v/hHvFHtuj/mW32/5sHdx7+tF0tdIt/9nT3z9/jPeKn2Wffr7N6c/top77Rrj/p5OvvnHxW/2d69H+rv//Zbfb/3F///cE2HwoA7ILa2vrCVKVSXlFRUVF5XMl7zwQAAPTb9wf9eWcCAAAAAAAAAAAAAAAAAAAA+9dufJ3Y5pgb+XQVAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOCZvgsAAP//96DU7Q==") open(&(0x7f0000000180)='./bus\x00', 0x14d27e, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000380)='./bus\x00', 0x141842, 0x0) write(r0, &(0x7f0000004200)="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", 0xffe00) quotactl$Q_SETQUOTA(0xffffffff80000600, &(0x7f0000000180)=@loop={'/dev/loop', 0x0}, 0x0, &(0x7f0000000080)) 04:40:29 executing program 0: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000580)='./file0\x00', 0x0, &(0x7f0000000180)={[{@fat=@fmask={'fmask', 0x3d, 0x1000}}, {@fat=@tz_utc}, {@nodots}, {@dots}, {@fat=@umask={'umask', 0x3d, 0xfff}}, {@nodots}, {@fat=@check_strict}]}, 0x1, 0x584, &(0x7f00000010c0)="$eJzs2s9qE1EUB+CTNv/sxq7FxYAbV0V9AoNUEANCJQvFhQOtCzMiTEAm3VjfwyfweXySLqS7SDND29gqtSaZ2H4fhHvm/pLhXEhyE7hv734Y7n4cvXvz/Wt0HyfRjIi1o4jNWIv1KDWiNR3XpnU7zjqYuYpuAAArb2cn7dXdA/PQ/G2S5720ERGdc8ng24KbAgAAAAAAAAAAYEEud/6/dInz/wDAf8D5/+svz3tpu/r9Nsv5fwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAKA+R5PJ7ckfHnX3BwDMn/0fAG6ev9z/mydVe+mtAgBz4v8/ANw8L1+9ft7r97d3kqQbcXhQDIpBOZb502f97QfJ1Obpqw6LYrB+kj8s82Q2b8VGlT+6MG/H/Xtlfpw9edH/Je/E7uKXDwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJyxlZzYPJ09LCadKt+6OC8Gx+OndnldPmE2b8ad5pIWAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMzFaLw/TLNsL6+KL9X86cxVi9a0aMXnGG/8y30WVzRWo41zRXc12ph30Tn3Zrumxfsfk6ka22g041b1Sb7qfWr8UgIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGo1Gu8P0yzby0d1dwIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAArIrReH+YZtlevsCi7jUCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACwfD8DAAD//wjxicw=") r0 = open(&(0x7f0000000580)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000300)='./file0\x00', 0x0) 04:40:29 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x0, 0x80000001, 0x0, 0x98c8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffec850000006d000000850000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={r1, 0x58, &(0x7f0000000300)}, 0x10) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_service_time\x00', 0x26e1, 0x0) close(0xffffffffffffffff) close(r2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r2, &(0x7f0000000080), 0x11ffffce1) recvmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x7ffff09a}], 0x1, 0x0, 0xf2, 0xa0}, 0x0) 04:40:29 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x0, 0x80000001, 0x0, 0x98c8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffec850000006d000000850000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={r1, 0x58, &(0x7f0000000300)}, 0x10) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_service_time\x00', 0x26e1, 0x0) close(0xffffffffffffffff) close(r2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r2, &(0x7f0000000080), 0x11ffffce1) recvmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x7ffff09a}], 0x1, 0x0, 0xf2, 0xa0}, 0x0) 04:40:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000500)='./file1\x00', 0x4500, &(0x7f0000000000)=ANY=[@ANYBLOB="007aa4592773c1dcf5000000"], 0x0, 0x4b4, &(0x7f0000000540)="$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") open(&(0x7f0000000180)='./bus\x00', 0x14d27e, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000380)='./bus\x00', 0x141842, 0x0) write(r0, &(0x7f0000004200)="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", 0xffe00) quotactl$Q_SETQUOTA(0xffffffff80000600, &(0x7f0000000180)=@loop={'/dev/loop', 0x0}, 0x0, &(0x7f0000000080)) [ 149.955780][ T3939] loop3: detected capacity change from 0 to 512 [ 149.967237][ T3941] loop0: detected capacity change from 0 to 2048 [ 149.987573][ T3941] FAT-fs (loop0): Directory bread(block 1310756) failed [ 150.003179][ T3941] FAT-fs (loop0): Directory bread(block 1310757) failed [ 150.019815][ T3941] FAT-fs (loop0): Directory bread(block 1310758) failed [ 150.028853][ T3939] EXT4-fs (loop3): 1 orphan inode deleted [ 150.032902][ T3941] FAT-fs (loop0): Directory bread(block 1310759) failed [ 150.034624][ T3939] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 150.041520][ T3941] FAT-fs (loop0): Directory bread(block 1310760) failed [ 150.061514][ T3941] FAT-fs (loop0): Directory bread(block 1310761) failed [ 150.068495][ T3941] FAT-fs (loop0): Directory bread(block 1310762) failed [ 150.075447][ T3941] FAT-fs (loop0): Directory bread(block 1310763) failed [ 150.082391][ T3941] FAT-fs (loop0): Directory bread(block 1310764) failed [ 150.089445][ T3941] FAT-fs (loop0): Directory bread(block 1310765) failed 04:40:29 executing program 0: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000580)='./file0\x00', 0x0, &(0x7f0000000180)={[{@fat=@fmask={'fmask', 0x3d, 0x1000}}, {@fat=@tz_utc}, {@nodots}, {@dots}, {@fat=@umask={'umask', 0x3d, 0xfff}}, {@nodots}, {@fat=@check_strict}]}, 0x1, 0x584, &(0x7f00000010c0)="$eJzs2s9qE1EUB+CTNv/sxq7FxYAbV0V9AoNUEANCJQvFhQOtCzMiTEAm3VjfwyfweXySLqS7SDND29gqtSaZ2H4fhHvm/pLhXEhyE7hv734Y7n4cvXvz/Wt0HyfRjIi1o4jNWIv1KDWiNR3XpnU7zjqYuYpuAAArb2cn7dXdA/PQ/G2S5720ERGdc8ng24KbAgAAAAAAAAAAYEEud/6/dInz/wDAf8D5/+svz3tpu/r9Nsv5fwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAKA+R5PJ7ckfHnX3BwDMn/0fAG6ev9z/mydVe+mtAgBz4v8/ANw8L1+9ft7r97d3kqQbcXhQDIpBOZb502f97QfJ1Obpqw6LYrB+kj8s82Q2b8VGlT+6MG/H/Xtlfpw9edH/Je/E7uKXDwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJyxlZzYPJ09LCadKt+6OC8Gx+OndnldPmE2b8ad5pIWAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMzFaLw/TLNsL6+KL9X86cxVi9a0aMXnGG/8y30WVzRWo41zRXc12ph30Tn3Zrumxfsfk6ka22g041b1Sb7qfWr8UgIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGo1Gu8P0yzby0d1dwIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAArIrReH+YZtlevsCi7jUCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACwfD8DAAD//wjxicw=") r0 = open(&(0x7f0000000580)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000300)='./file0\x00', 0x0) [ 150.090753][ T25] audit: type=1400 audit(1686372029.262:162): avc: denied { mount } for pid=3936 comm="syz-executor.3" name="/" dev="loop3" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 150.098215][ T3939] ext4 filesystem being mounted at /root/syzkaller-testdir3472632451/syzkaller.MWPM9k/42/file1 supports timestamps until 2038-01-19 (0x7fffffff) 04:40:29 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000500)='./file1\x00', 0x4500, &(0x7f0000000000)=ANY=[@ANYBLOB="007aa4592773c1dcf5000000"], 0x0, 0x4b4, &(0x7f0000000540)="$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") open(&(0x7f0000000180)='./bus\x00', 0x14d27e, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000380)='./bus\x00', 0x141842, 0x0) write(r0, &(0x7f0000004200)="74efc4c419fdb8d66b12a7bbf371d056ad6f01e9762d70401d1c9d331b48b925e9e6a7759abb206b9b18bfc3f3f96adb2b37c2121ef21e91bac768dd33df29649da1d82e826a55c4d620b6f510daee26004b741c951d528d806efbe00c439f2df46d3adf8be24e280b948a49afd17d56437c6e752d84f99bf37a88f0c54488dd13b848f2381d7d2aecb68ed16762e4a3c1a847565364b9f1af92c9c89e06e89fe6179cb7078a742cb968a9f09cc690dc473df29d6ad9af5879e9a2618c63702117a3a63d3a4236baee86f5f452e9663a795306dabb97db884348ab437bdc13b7cfb03eff1cf216f09d21078e1852fc7c96413d9d65c52ce9baa6bc26de7f028738a17120de30a433c9c3c8e276f3ae5e18a1f95767fffe8e98b0c3f134f12263b01c36866d4e0e856cc14ecf50279adb9438c6219c49cae973d8e7faf33dcdeb96d7ef7e89ae828cb91df22939307bb1f7fb7392e1e24f6b63166b89937c00eb8fea0245cd93e4aa803160bd71c1a0bbb6b8285d8ab654485ab985f1dd2eb9abf53131a9680dcafe4000d3ea528dd52aba3e4ff6a3883ec614253d5627bd91522d881128328ed1e00907fa6cc48cec5268bbedd85ec02d8bac3183460dd1a27fbc06b5642473a41a6cbfb07f53deab2473b37c3d10a125d610f1b9ea5c83e7d462048f25fc1e79295eeff750a23faf5d542758c421bb0673504c9dbae2959f77", 0xffe00) quotactl$Q_SETQUOTA(0xffffffff80000600, &(0x7f0000000180)=@loop={'/dev/loop', 0x0}, 0x0, &(0x7f0000000080)) [ 150.163222][ T3939] EXT4-fs error (device loop3): ext4_map_blocks:579: inode #3: block 9: comm syz-executor.3: lblock 0 mapped to illegal pblock 9 (length 1) [ 150.177869][ T3939] Quota error (device loop3): v2_write_file_info: Can't write info structure [ 150.200579][ T25] audit: type=1400 audit(1686372029.362:163): avc: denied { unmount } for pid=3060 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 150.213511][ T3957] loop0: detected capacity change from 0 to 2048 [ 150.223478][ T3060] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 150.237575][ T3060] EXT4-fs error (device loop3) in ext4_reserve_inode_write:5744: Corrupt filesystem [ 150.238294][ T3957] FAT-fs (loop0): Directory bread(block 1310756) failed [ 150.247199][ T3060] EXT4-fs error (device loop3): ext4_quota_off:7082: inode #3: comm syz-executor.3: mark_inode_dirty error [ 150.254313][ T3957] FAT-fs (loop0): Directory bread(block 1310757) failed [ 150.272337][ T3957] FAT-fs (loop0): Directory bread(block 1310758) failed [ 150.279344][ T3957] FAT-fs (loop0): Directory bread(block 1310759) failed [ 150.286301][ T3957] FAT-fs (loop0): Directory bread(block 1310760) failed [ 150.293304][ T3957] FAT-fs (loop0): Directory bread(block 1310761) failed [ 150.300699][ T3957] FAT-fs (loop0): Directory bread(block 1310762) failed [ 150.303043][ T3959] loop3: detected capacity change from 0 to 512 04:40:29 executing program 0: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000580)='./file0\x00', 0x0, &(0x7f0000000180)={[{@fat=@fmask={'fmask', 0x3d, 0x1000}}, {@fat=@tz_utc}, {@nodots}, {@dots}, {@fat=@umask={'umask', 0x3d, 0xfff}}, {@nodots}, {@fat=@check_strict}]}, 0x1, 0x584, &(0x7f00000010c0)="$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") r0 = open(&(0x7f0000000580)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000300)='./file0\x00', 0x0) [ 150.307863][ T3957] FAT-fs (loop0): Directory bread(block 1310763) failed [ 150.320976][ T3957] FAT-fs (loop0): Directory bread(block 1310764) failed [ 150.328115][ T3957] FAT-fs (loop0): Directory bread(block 1310765) failed [ 150.331124][ T3959] EXT4-fs (loop3): 1 orphan inode deleted [ 150.341058][ T3959] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 150.357712][ T3959] ext4 filesystem being mounted at /root/syzkaller-testdir3472632451/syzkaller.MWPM9k/43/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 150.392050][ T3959] EXT4-fs error (device loop3): ext4_map_blocks:579: inode #3: block 9: comm syz-executor.3: lblock 0 mapped to illegal pblock 9 (length 1) [ 150.406780][ T3963] loop0: detected capacity change from 0 to 2048 04:40:29 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000500)='./file1\x00', 0x4500, &(0x7f0000000000)=ANY=[@ANYBLOB="007aa4592773c1dcf5000000"], 0x0, 0x4b4, &(0x7f0000000540)="$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") open(&(0x7f0000000180)='./bus\x00', 0x14d27e, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000380)='./bus\x00', 0x141842, 0x0) write(r0, &(0x7f0000004200)="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", 0xffe00) quotactl$Q_SETQUOTA(0xffffffff80000600, &(0x7f0000000180)=@loop={'/dev/loop', 0x0}, 0x0, &(0x7f0000000080)) [ 150.406790][ T3959] Quota error (device loop3): v2_write_file_info: Can't write info structure [ 150.423513][ T3060] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 150.425314][ T3963] FAT-fs (loop0): Directory bread(block 1310756) failed [ 150.439657][ T3963] FAT-fs (loop0): Directory bread(block 1310757) failed [ 150.440132][ T3060] EXT4-fs error (device loop3) in ext4_reserve_inode_write:5744: Corrupt filesystem [ 150.448639][ T3963] FAT-fs (loop0): Directory bread(block 1310758) failed [ 150.460054][ T3060] EXT4-fs error (device loop3): ext4_quota_off:7082: inode #3: comm syz-executor.3: mark_inode_dirty error [ 150.463044][ T3963] FAT-fs (loop0): Directory bread(block 1310759) failed [ 150.481426][ T3963] FAT-fs (loop0): Directory bread(block 1310760) failed [ 150.489372][ T3963] FAT-fs (loop0): Directory bread(block 1310761) failed [ 150.496557][ T3963] FAT-fs (loop0): Directory bread(block 1310762) failed [ 150.503671][ T3963] FAT-fs (loop0): Directory bread(block 1310763) failed [ 150.507705][ T3965] loop3: detected capacity change from 0 to 512 [ 150.511243][ T3963] FAT-fs (loop0): Directory bread(block 1310764) failed [ 150.524442][ T3963] FAT-fs (loop0): Directory bread(block 1310765) failed [ 150.526781][ T3965] EXT4-fs (loop3): 1 orphan inode deleted [ 150.537264][ T3965] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. 04:40:29 executing program 0: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000500)='./file1\x00', 0x4500, &(0x7f0000000000)=ANY=[@ANYBLOB="007aa4592773c1dcf5000000"], 0x0, 0x4b4, &(0x7f0000000540)="$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") open(&(0x7f0000000180)='./bus\x00', 0x14d27e, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000380)='./bus\x00', 0x141842, 0x0) write(r0, &(0x7f0000004200)="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", 0xffe00) quotactl$Q_SETQUOTA(0xffffffff80000600, &(0x7f0000000180)=@loop={'/dev/loop', 0x0}, 0x0, &(0x7f0000000080)) [ 150.553211][ T3965] ext4 filesystem being mounted at /root/syzkaller-testdir3472632451/syzkaller.MWPM9k/44/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 150.585630][ T3965] EXT4-fs error (device loop3): ext4_map_blocks:579: inode #3: block 9: comm syz-executor.3: lblock 0 mapped to illegal pblock 9 (length 1) [ 150.588713][ T3969] loop0: detected capacity change from 0 to 512 [ 150.601518][ T3965] Quota error (device loop3): v2_write_file_info: Can't write info structure [ 150.626427][ T3060] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. 04:40:29 executing program 3: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000580)='./file0\x00', 0x0, &(0x7f0000000180)={[{@fat=@fmask={'fmask', 0x3d, 0x1000}}, {@fat=@tz_utc}, {@nodots}, {@dots}, {@fat=@umask={'umask', 0x3d, 0xfff}}, {@nodots}, {@fat=@check_strict}]}, 0x1, 0x584, &(0x7f00000010c0)="$eJzs2s9qE1EUB+CTNv/sxq7FxYAbV0V9AoNUEANCJQvFhQOtCzMiTEAm3VjfwyfweXySLqS7SDND29gqtSaZ2H4fhHvm/pLhXEhyE7hv734Y7n4cvXvz/Wt0HyfRjIi1o4jNWIv1KDWiNR3XpnU7zjqYuYpuAAArb2cn7dXdA/PQ/G2S5720ERGdc8ng24KbAgAAAAAAAAAAYEEud/6/dInz/wDAf8D5/+svz3tpu/r9Nsv5fwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAKA+R5PJ7ckfHnX3BwDMn/0fAG6ev9z/mydVe+mtAgBz4v8/ANw8L1+9ft7r97d3kqQbcXhQDIpBOZb502f97QfJ1Obpqw6LYrB+kj8s82Q2b8VGlT+6MG/H/Xtlfpw9edH/Je/E7uKXDwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJyxlZzYPJ09LCadKt+6OC8Gx+OndnldPmE2b8ad5pIWAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMzFaLw/TLNsL6+KL9X86cxVi9a0aMXnGG/8y30WVzRWo41zRXc12ph30Tn3Zrumxfsfk6ka22g041b1Sb7qfWr8UgIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGo1Gu8P0yzby0d1dwIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAArIrReH+YZtlevsCi7jUCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACwfD8DAAD//wjxicw=") r0 = open(&(0x7f0000000580)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000300)='./file0\x00', 0x0) [ 150.627648][ T3969] EXT4-fs (loop0): 1 orphan inode deleted [ 150.641148][ T3969] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 150.653683][ T3969] ext4 filesystem being mounted at /root/syzkaller-testdir3517194488/syzkaller.8lHx1T/49/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 150.653726][ T3060] EXT4-fs error (device loop3) in ext4_reserve_inode_write:5744: Corrupt filesystem [ 150.654057][ T3060] EXT4-fs error (device loop3): ext4_quota_off:7082: inode #3: comm syz-executor.3: mark_inode_dirty error [ 150.705499][ T3969] EXT4-fs error (device loop0): ext4_map_blocks:579: inode #3: block 9: comm syz-executor.0: lblock 0 mapped to illegal pblock 9 (length 1) [ 150.715040][ T3973] loop3: detected capacity change from 0 to 2048 [ 150.720379][ T3969] Quota error (device loop0): v2_write_file_info: Can't write info structure [ 150.730725][ T3973] FAT-fs (loop3): Directory bread(block 1310756) failed [ 150.742485][ T3973] FAT-fs (loop3): Directory bread(block 1310757) failed [ 150.750340][ T3973] FAT-fs (loop3): Directory bread(block 1310758) failed [ 150.757502][ T3973] FAT-fs (loop3): Directory bread(block 1310759) failed [ 150.764763][ T3973] FAT-fs (loop3): Directory bread(block 1310760) failed [ 150.771998][ T3973] FAT-fs (loop3): Directory bread(block 1310761) failed 04:40:30 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000680)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @gretap={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_ENCAP_DPORT={0x6}, @IFLA_GRE_ENCAP_SPORT={0x6}]}}}]}, 0x44}}, 0x0) 04:40:30 executing program 0: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000500)='./file1\x00', 0x4500, &(0x7f0000000000)=ANY=[@ANYBLOB="007aa4592773c1dcf5000000"], 0x0, 0x4b4, &(0x7f0000000540)="$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") open(&(0x7f0000000180)='./bus\x00', 0x14d27e, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000380)='./bus\x00', 0x141842, 0x0) write(r0, &(0x7f0000004200)="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", 0xffe00) quotactl$Q_SETQUOTA(0xffffffff80000600, &(0x7f0000000180)=@loop={'/dev/loop', 0x0}, 0x0, &(0x7f0000000080)) 04:40:30 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x0, 0x80000001, 0x0, 0x98c8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffec850000006d000000850000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={r1, 0x58, &(0x7f0000000300)}, 0x10) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_service_time\x00', 0x26e1, 0x0) close(0xffffffffffffffff) close(r2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r2, &(0x7f0000000080), 0x11ffffce1) recvmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x7ffff09a}], 0x1, 0x0, 0xf2, 0xa0}, 0x0) [ 150.772308][ T3076] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 150.779183][ T3973] FAT-fs (loop3): Directory bread(block 1310762) failed [ 150.809283][ T3076] EXT4-fs error (device loop0) in ext4_reserve_inode_write:5744: Corrupt filesystem [ 150.814862][ T3973] FAT-fs (loop3): Directory bread(block 1310763) failed 04:40:30 executing program 2: r0 = socket$igmp(0x2, 0x3, 0x2) setresuid(0xffffffffffffffff, 0xee01, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x60, 0x0, 0x0) 04:40:30 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000680)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @gretap={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_ENCAP_DPORT={0x6}, @IFLA_GRE_ENCAP_SPORT={0x6}]}}}]}, 0x44}}, 0x0) [ 150.841159][ T3076] EXT4-fs error (device loop0): ext4_quota_off:7082: inode #3: comm syz-executor.0: mark_inode_dirty error [ 150.843075][ T3973] FAT-fs (loop3): Directory bread(block 1310764) failed [ 150.864237][ T3973] FAT-fs (loop3): Directory bread(block 1310765) failed [ 150.871283][ T25] audit: type=1400 audit(1686372030.032:164): avc: denied { setopt } for pid=3978 comm="syz-executor.2" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 150.928030][ T3983] loop0: detected capacity change from 0 to 512 [ 150.949065][ T3983] EXT4-fs (loop0): 1 orphan inode deleted [ 150.954829][ T3983] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 150.967653][ T3983] ext4 filesystem being mounted at /root/syzkaller-testdir3517194488/syzkaller.8lHx1T/50/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 151.010115][ T3983] EXT4-fs error (device loop0): ext4_map_blocks:579: inode #3: block 9: comm syz-executor.0: lblock 0 mapped to illegal pblock 9 (length 1) [ 151.025609][ T3983] Quota error (device loop0): v2_write_file_info: Can't write info structure [ 151.042019][ T3076] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 151.052104][ T3076] EXT4-fs error (device loop0) in ext4_reserve_inode_write:5744: Corrupt filesystem [ 151.061882][ T3076] EXT4-fs error (device loop0): ext4_quota_off:7082: inode #3: comm syz-executor.0: mark_inode_dirty error [ 158.204951][ T3989] loop1: detected capacity change from 0 to 512 [ 158.216272][ T3989] EXT4-fs (loop1): 1 orphan inode deleted [ 158.222019][ T3989] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 158.234725][ T3989] ext4 filesystem being mounted at /root/syzkaller-testdir1458668384/syzkaller.IpXBvW/25/file1 supports timestamps until 2038-01-19 (0x7fffffff) 04:40:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000500)='./file1\x00', 0x4500, &(0x7f0000000000)=ANY=[@ANYBLOB="007aa4592773c1dcf5000000"], 0x0, 0x4b4, &(0x7f0000000540)="$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") open(&(0x7f0000000180)='./bus\x00', 0x14d27e, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000380)='./bus\x00', 0x141842, 0x0) write(r0, &(0x7f0000004200)="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", 0xffe00) quotactl$Q_SETQUOTA(0xffffffff80000600, &(0x7f0000000180)=@loop={'/dev/loop', 0x0}, 0x0, &(0x7f0000000080)) 04:40:38 executing program 2: r0 = socket$igmp(0x2, 0x3, 0x2) setresuid(0xffffffffffffffff, 0xee01, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x60, 0x0, 0x0) 04:40:38 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000680)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @gretap={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_ENCAP_DPORT={0x6}, @IFLA_GRE_ENCAP_SPORT={0x6}]}}}]}, 0x44}}, 0x0) 04:40:38 executing program 3: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000580)='./file0\x00', 0x0, &(0x7f0000000180)={[{@fat=@fmask={'fmask', 0x3d, 0x1000}}, {@fat=@tz_utc}, {@nodots}, {@dots}, {@fat=@umask={'umask', 0x3d, 0xfff}}, {@nodots}, {@fat=@check_strict}]}, 0x1, 0x584, &(0x7f00000010c0)="$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") r0 = open(&(0x7f0000000580)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000300)='./file0\x00', 0x0) 04:40:38 executing program 0: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000500)='./file1\x00', 0x4500, &(0x7f0000000000)=ANY=[@ANYBLOB="007aa4592773c1dcf5000000"], 0x0, 0x4b4, &(0x7f0000000540)="$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") open(&(0x7f0000000180)='./bus\x00', 0x14d27e, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000380)='./bus\x00', 0x141842, 0x0) write(r0, &(0x7f0000004200)="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", 0xffe00) quotactl$Q_SETQUOTA(0xffffffff80000600, &(0x7f0000000180)=@loop={'/dev/loop', 0x0}, 0x0, &(0x7f0000000080)) 04:40:38 executing program 4: r0 = socket$igmp(0x2, 0x3, 0x2) setresuid(0xffffffffffffffff, 0xee01, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x60, 0x0, 0x0) 04:40:38 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000680)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @gretap={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_ENCAP_DPORT={0x6}, @IFLA_GRE_ENCAP_SPORT={0x6}]}}}]}, 0x44}}, 0x0) 04:40:38 executing program 4: r0 = socket$igmp(0x2, 0x3, 0x2) setresuid(0xffffffffffffffff, 0xee01, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x60, 0x0, 0x0) 04:40:38 executing program 2: r0 = socket$igmp(0x2, 0x3, 0x2) setresuid(0xffffffffffffffff, 0xee01, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x60, 0x0, 0x0) [ 159.157691][ T4001] loop0: detected capacity change from 0 to 512 [ 159.161811][ T3999] loop3: detected capacity change from 0 to 2048 [ 159.165858][ T3058] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 159.180303][ T3999] FAT-fs (loop3): Directory bread(block 1310756) failed 04:40:38 executing program 4: r0 = socket$igmp(0x2, 0x3, 0x2) setresuid(0xffffffffffffffff, 0xee01, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x60, 0x0, 0x0) 04:40:38 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x2}, 0x1c) shutdown(r0, 0x1) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000680)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x2, 0x0, 0x7f, 0x2a}, 0x9c) [ 159.205469][ T3999] FAT-fs (loop3): Directory bread(block 1310757) failed [ 159.212686][ T3999] FAT-fs (loop3): Directory bread(block 1310758) failed [ 159.227420][ T3999] FAT-fs (loop3): Directory bread(block 1310759) failed [ 159.237692][ T3999] FAT-fs (loop3): Directory bread(block 1310760) failed 04:40:38 executing program 2: r0 = socket$igmp(0x2, 0x3, 0x2) setresuid(0xffffffffffffffff, 0xee01, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x60, 0x0, 0x0) [ 159.247527][ T25] audit: type=1400 audit(1686372038.412:165): avc: denied { connect } for pid=4015 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 159.249540][ T4001] EXT4-fs (loop0): 1 orphan inode deleted [ 159.267396][ T25] audit: type=1400 audit(1686372038.412:166): avc: denied { name_connect } for pid=4015 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 159.293601][ T4001] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 159.306481][ T4001] ext4 filesystem being mounted at /root/syzkaller-testdir3517194488/syzkaller.8lHx1T/51/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 159.316012][ T3999] FAT-fs (loop3): Directory bread(block 1310761) failed [ 159.332700][ T25] audit: type=1400 audit(1686372038.472:167): avc: denied { mount } for pid=3998 comm="syz-executor.0" name="/" dev="loop0" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 159.350906][ T4001] EXT4-fs error (device loop0): ext4_map_blocks:579: inode #3: block 9: comm syz-executor.0: lblock 0 mapped to illegal pblock 9 (length 1) [ 159.354906][ T3999] FAT-fs (loop3): Directory bread(block 1310762) failed [ 159.375920][ T25] audit: type=1400 audit(1686372038.542:168): avc: denied { shutdown } for pid=4015 comm="syz-executor.5" laddr=fe80::a lport=40614 faddr=fe88::6 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 159.377896][ T4001] Quota error (device loop0): v2_write_file_info: Can't write info structure [ 159.399294][ T25] audit: type=1400 audit(1686372038.542:169): avc: denied { setopt } for pid=4015 comm="syz-executor.5" laddr=fe80::a lport=40614 faddr=fe88::6 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 159.399700][ T3999] FAT-fs (loop3): Directory bread(block 1310763) failed [ 159.439958][ T3999] FAT-fs (loop3): Directory bread(block 1310764) failed [ 159.447411][ T3999] FAT-fs (loop3): Directory bread(block 1310765) failed [ 159.447975][ T25] audit: type=1400 audit(1686372038.612:170): avc: denied { unmount } for pid=3076 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 159.476962][ T3076] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 159.486870][ T3076] EXT4-fs error (device loop0) in ext4_reserve_inode_write:5744: Corrupt filesystem [ 159.500954][ T3076] EXT4-fs error (device loop0): ext4_quota_off:7082: inode #3: comm syz-executor.0: mark_inode_dirty error 04:40:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000500)='./file1\x00', 0x4500, &(0x7f0000000000)=ANY=[@ANYBLOB="007aa4592773c1dcf5000000"], 0x0, 0x4b4, &(0x7f0000000540)="$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") open(&(0x7f0000000180)='./bus\x00', 0x14d27e, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000380)='./bus\x00', 0x141842, 0x0) write(r0, &(0x7f0000004200)="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", 0xffe00) quotactl$Q_SETQUOTA(0xffffffff80000600, &(0x7f0000000180)=@loop={'/dev/loop', 0x0}, 0x0, &(0x7f0000000080)) 04:40:45 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x2}, 0x1c) shutdown(r0, 0x1) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000680)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x2, 0x0, 0x7f, 0x2a}, 0x9c) 04:40:45 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) syz_clone(0xc0920400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 04:40:45 executing program 0: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x2}, 0x1c) shutdown(r0, 0x1) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000680)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x2, 0x0, 0x7f, 0x2a}, 0x9c) 04:40:45 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000040)=@newspdinfo={0x1c, 0x24, 0x1, 0x0, 0x0, 0x0, [@XFRMA_SPD_IPV6_HTHRESH={0x6}]}, 0x1c}}, 0x0) 04:40:45 executing program 3: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000580)='./file0\x00', 0x0, &(0x7f0000000180)={[{@fat=@fmask={'fmask', 0x3d, 0x1000}}, {@fat=@tz_utc}, {@nodots}, {@dots}, {@fat=@umask={'umask', 0x3d, 0xfff}}, {@nodots}, {@fat=@check_strict}]}, 0x1, 0x584, &(0x7f00000010c0)="$eJzs2s9qE1EUB+CTNv/sxq7FxYAbV0V9AoNUEANCJQvFhQOtCzMiTEAm3VjfwyfweXySLqS7SDND29gqtSaZ2H4fhHvm/pLhXEhyE7hv734Y7n4cvXvz/Wt0HyfRjIi1o4jNWIv1KDWiNR3XpnU7zjqYuYpuAAArb2cn7dXdA/PQ/G2S5720ERGdc8ng24KbAgAAAAAAAAAAYEEud/6/dInz/wDAf8D5/+svz3tpu/r9Nsv5fwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAKA+R5PJ7ckfHnX3BwDMn/0fAG6ev9z/mydVe+mtAgBz4v8/ANw8L1+9ft7r97d3kqQbcXhQDIpBOZb502f97QfJ1Obpqw6LYrB+kj8s82Q2b8VGlT+6MG/H/Xtlfpw9edH/Je/E7uKXDwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJyxlZzYPJ09LCadKt+6OC8Gx+OndnldPmE2b8ad5pIWAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMzFaLw/TLNsL6+KL9X86cxVi9a0aMXnGG/8y30WVzRWo41zRXc12ph30Tn3Zrumxfsfk6ka22g041b1Sb7qfWr8UgIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGo1Gu8P0yzby0d1dwIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAArIrReH+YZtlevsCi7jUCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACwfD8DAAD//wjxicw=") r0 = open(&(0x7f0000000580)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000300)='./file0\x00', 0x0) 04:40:45 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000040)=@newspdinfo={0x1c, 0x24, 0x1, 0x0, 0x0, 0x0, [@XFRMA_SPD_IPV6_HTHRESH={0x6}]}, 0x1c}}, 0x0) [ 166.403191][ T4033] loop3: detected capacity change from 0 to 2048 [ 166.413492][ T25] audit: type=1400 audit(1686372045.572:171): avc: denied { create } for pid=4029 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 166.447169][ T4033] FAT-fs (loop3): Directory bread(block 1310756) failed [ 166.454163][ T4033] FAT-fs (loop3): Directory bread(block 1310757) failed [ 166.469159][ T25] audit: type=1400 audit(1686372045.572:172): avc: denied { write } for pid=4029 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 166.481385][ T4033] FAT-fs (loop3): Directory bread(block 1310758) failed 04:40:45 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000040)=@newspdinfo={0x1c, 0x24, 0x1, 0x0, 0x0, 0x0, [@XFRMA_SPD_IPV6_HTHRESH={0x6}]}, 0x1c}}, 0x0) 04:40:45 executing program 0: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x2}, 0x1c) shutdown(r0, 0x1) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000680)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x2, 0x0, 0x7f, 0x2a}, 0x9c) 04:40:45 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000040)=@newspdinfo={0x1c, 0x24, 0x1, 0x0, 0x0, 0x0, [@XFRMA_SPD_IPV6_HTHRESH={0x6}]}, 0x1c}}, 0x0) 04:40:45 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x2}, 0x1c) shutdown(r0, 0x1) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000680)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x2, 0x0, 0x7f, 0x2a}, 0x9c) [ 166.489558][ T25] audit: type=1400 audit(1686372045.572:173): avc: denied { nlmsg_write } for pid=4029 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 166.509377][ T4033] FAT-fs (loop3): Directory bread(block 1310759) failed [ 166.531319][ T4033] FAT-fs (loop3): Directory bread(block 1310760) failed [ 166.554843][ T4033] FAT-fs (loop3): Directory bread(block 1310761) failed [ 166.571782][ T4033] FAT-fs (loop3): Directory bread(block 1310762) failed [ 166.587366][ T4033] FAT-fs (loop3): Directory bread(block 1310763) failed 04:40:45 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000640), 0xffffffffffffffff) sendmsg$NL802154_CMD_DEL_SEC_DEV(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_SEC_DEVICE={0x10, 0x2c, 0x0, 0x1, {0xc}}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x30}}, 0x0) [ 166.602975][ T4033] FAT-fs (loop3): Directory bread(block 1310764) failed [ 166.612602][ T4033] FAT-fs (loop3): Directory bread(block 1310765) failed 04:40:52 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000f00000095"], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000200)='kfree\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x7}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) r3 = socket$inet6(0xa, 0x803, 0x6) connect$inet6(r3, &(0x7f0000000240)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r3, r1}) sendmsg$rds(r2, &(0x7f0000002940)={0x0, 0x0, &(0x7f0000002800)=[{&(0x7f0000002980)=""/4112, 0xfffffde7}], 0x1}, 0x0) write(r2, 0x0, 0x0) 04:40:52 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000640), 0xffffffffffffffff) sendmsg$NL802154_CMD_DEL_SEC_DEV(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_SEC_DEVICE={0x10, 0x2c, 0x0, 0x1, {0xc}}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x30}}, 0x0) 04:40:52 executing program 0: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x2}, 0x1c) shutdown(r0, 0x1) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000680)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x2, 0x0, 0x7f, 0x2a}, 0x9c) 04:40:52 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x2}, 0x1c) shutdown(r0, 0x1) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000680)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x2, 0x0, 0x7f, 0x2a}, 0x9c) 04:40:52 executing program 3: r0 = epoll_create1(0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001dc0)='/proc/slabinfo\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000500)) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f00000004c0)) epoll_pwait(r0, &(0x7f0000000200)=[{}], 0x1, 0x6a28, 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000080)={0x4000200f}) 04:40:52 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) syz_clone(0xc0920400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 04:40:52 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000640), 0xffffffffffffffff) sendmsg$NL802154_CMD_DEL_SEC_DEV(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_SEC_DEVICE={0x10, 0x2c, 0x0, 0x1, {0xc}}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x30}}, 0x0) 04:40:52 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000640), 0xffffffffffffffff) sendmsg$NL802154_CMD_DEL_SEC_DEV(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_SEC_DEVICE={0x10, 0x2c, 0x0, 0x1, {0xc}}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x30}}, 0x0) 04:40:52 executing program 3: r0 = epoll_create1(0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001dc0)='/proc/slabinfo\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000500)) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f00000004c0)) epoll_pwait(r0, &(0x7f0000000200)=[{}], 0x1, 0x6a28, 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000080)={0x4000200f}) 04:40:52 executing program 4: r0 = epoll_create1(0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001dc0)='/proc/slabinfo\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000500)) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f00000004c0)) epoll_pwait(r0, &(0x7f0000000200)=[{}], 0x1, 0x6a28, 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000080)={0x4000200f}) 04:40:52 executing program 0: r0 = epoll_create1(0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001dc0)='/proc/slabinfo\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000500)) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f00000004c0)) epoll_pwait(r0, &(0x7f0000000200)=[{}], 0x1, 0x6a28, 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000080)={0x4000200f}) 04:40:52 executing program 5: r0 = epoll_create1(0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001dc0)='/proc/slabinfo\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000500)) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f00000004c0)) epoll_pwait(r0, &(0x7f0000000200)=[{}], 0x1, 0x6a28, 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000080)={0x4000200f}) 04:40:55 executing program 1: r0 = epoll_create1(0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001dc0)='/proc/slabinfo\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000500)) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f00000004c0)) epoll_pwait(r0, &(0x7f0000000200)=[{}], 0x1, 0x6a28, 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000080)={0x4000200f}) 04:40:55 executing program 3: r0 = epoll_create1(0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001dc0)='/proc/slabinfo\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000500)) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f00000004c0)) epoll_pwait(r0, &(0x7f0000000200)=[{}], 0x1, 0x6a28, 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000080)={0x4000200f}) 04:40:55 executing program 4: r0 = epoll_create1(0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001dc0)='/proc/slabinfo\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000500)) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f00000004c0)) epoll_pwait(r0, &(0x7f0000000200)=[{}], 0x1, 0x6a28, 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000080)={0x4000200f}) 04:40:55 executing program 0: r0 = epoll_create1(0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001dc0)='/proc/slabinfo\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000500)) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f00000004c0)) epoll_pwait(r0, &(0x7f0000000200)=[{}], 0x1, 0x6a28, 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000080)={0x4000200f}) 04:40:55 executing program 5: r0 = epoll_create1(0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001dc0)='/proc/slabinfo\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000500)) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f00000004c0)) epoll_pwait(r0, &(0x7f0000000200)=[{}], 0x1, 0x6a28, 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000080)={0x4000200f}) 04:40:55 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) syz_clone(0xc0920400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 04:40:55 executing program 4: r0 = epoll_create1(0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001dc0)='/proc/slabinfo\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000500)) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f00000004c0)) epoll_pwait(r0, &(0x7f0000000200)=[{}], 0x1, 0x6a28, 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000080)={0x4000200f}) 04:40:55 executing program 5: r0 = epoll_create1(0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001dc0)='/proc/slabinfo\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000500)) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f00000004c0)) epoll_pwait(r0, &(0x7f0000000200)=[{}], 0x1, 0x6a28, 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000080)={0x4000200f}) 04:40:55 executing program 3: r0 = epoll_create1(0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001dc0)='/proc/slabinfo\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000500)) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f00000004c0)) epoll_pwait(r0, &(0x7f0000000200)=[{}], 0x1, 0x6a28, 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000080)={0x4000200f}) 04:40:55 executing program 0: r0 = epoll_create1(0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001dc0)='/proc/slabinfo\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000500)) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f00000004c0)) epoll_pwait(r0, &(0x7f0000000200)=[{}], 0x1, 0x6a28, 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000080)={0x4000200f}) 04:40:55 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) syz_clone(0xc0920400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 04:40:55 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CCA_ED_LEVEL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)={0x28, r1, 0x4199f09936169415, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) r2 = syz_genetlink_get_family_id$netlbl_unlabel(0x0, 0xffffffffffffffff) sendmsg$NLBL_UNLABEL_C_LIST(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x58, r2, 0x200, 0x70bd2b, 0x25dfdbfe, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @private1}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}]}, 0x58}, 0x1, 0x0, 0x0, 0x8004}, 0x840) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f00000005c0)=@updsa={0x104, 0x1a, 0x1, 0x0, 0x0, {{@in=@empty, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in6=@mcast1, 0x13, 0x3c}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@coaddr={0x14, 0xe, @in=@remote}]}, 0x104}}, 0x0) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f00000001c0)=ANY=[], 0x208e24b) sendfile(r3, r5, 0x0, 0x100000f2090700) setsockopt$sock_timeval(r3, 0x1, 0x20, &(0x7f0000000040)={0x77359400}, 0x10) 04:40:58 executing program 1: r0 = epoll_create1(0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001dc0)='/proc/slabinfo\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000500)) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f00000004c0)) epoll_pwait(r0, &(0x7f0000000200)=[{}], 0x1, 0x6a28, 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000080)={0x4000200f}) 04:40:58 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@dev, 0x0, 0x0, 0x2, 0x1, 0x0, 0x600}, 0x21) r1 = openat$incfs(0xffffffffffffffff, &(0x7f0000000000)='.pending_reads\x00', 0x40a01, 0x2) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0xff, 0x9}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x1}, 0x20) setsockopt$inet6_int(r3, 0x29, 0x18, &(0x7f0000000340)=0x6, 0x4) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000080)={{{@in6=@rand_addr=' \x01\x00', @in=@dev={0xac, 0x14, 0x14, 0x26}, 0x4e20, 0x6, 0x4e23, 0x400, 0x2, 0x100, 0x80, 0x2b, 0x0, r4}, {0x2, 0x4, 0x7f, 0x1, 0xfffffffffffffffa, 0x100000000, 0x1000, 0x37d20455}, {0x4, 0x4, 0x7, 0x4}, 0x0, 0x6e6bb3, 0x0, 0x1, 0x2, 0x3}, {{@in=@multicast2, 0x4d3, 0x6c}, 0x2, @in6=@dev={0xfe, 0x80, '\x00', 0x41}, 0x3506, 0x0, 0x0, 0x40, 0x8, 0x8, 0x1c643f22}}, 0xe8) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0x0, 0x1d30}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0xe235, 0x3, 0x6, 0x40, r5, 0xffffd07c, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4, 0x5}, 0x48) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r6, 0x29, 0x45, &(0x7f00000002c0)={'HL\x00'}, &(0x7f0000000300)=0x1e) 04:40:58 executing program 0: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x84040}, 0x18) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0xc0c0583b, 0xfffffffffffffffe) 04:40:58 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=@newsa={0x140, 0x10, 0x713, 0x0, 0x0, {{@in6=@ipv4={'\x00', '\xff\xff', @loopback}, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in=@private, 0x0, 0x32}, @in6=@local, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_aead={0x50, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x20, 0x80, "558c4dbb"}}]}, 0x140}}, 0x0) 04:40:58 executing program 2: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000300)={0x54, 0x12, 0x303, 0x0, 0x0, {}, [@INET_DIAG_REQ_BYTECODE={0x8, 0x1, "01ec3c84"}]}, 0x54}}, 0x0) 04:40:58 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CCA_ED_LEVEL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)={0x28, r1, 0x4199f09936169415, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) r2 = syz_genetlink_get_family_id$netlbl_unlabel(0x0, 0xffffffffffffffff) sendmsg$NLBL_UNLABEL_C_LIST(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x58, r2, 0x200, 0x70bd2b, 0x25dfdbfe, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @private1}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}]}, 0x58}, 0x1, 0x0, 0x0, 0x8004}, 0x840) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f00000005c0)=@updsa={0x104, 0x1a, 0x1, 0x0, 0x0, {{@in=@empty, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in6=@mcast1, 0x13, 0x3c}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@coaddr={0x14, 0xe, @in=@remote}]}, 0x104}}, 0x0) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f00000001c0)=ANY=[], 0x208e24b) sendfile(r3, r5, 0x0, 0x100000f2090700) setsockopt$sock_timeval(r3, 0x1, 0x20, &(0x7f0000000040)={0x77359400}, 0x10) 04:40:58 executing program 2: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000300)={0x54, 0x12, 0x303, 0x0, 0x0, {}, [@INET_DIAG_REQ_BYTECODE={0x8, 0x1, "01ec3c84"}]}, 0x54}}, 0x0) 04:40:58 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@dev, 0x0, 0x0, 0x2, 0x1, 0x0, 0x600}, 0x21) r1 = openat$incfs(0xffffffffffffffff, &(0x7f0000000000)='.pending_reads\x00', 0x40a01, 0x2) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0xff, 0x9}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x1}, 0x20) setsockopt$inet6_int(r3, 0x29, 0x18, &(0x7f0000000340)=0x6, 0x4) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000080)={{{@in6=@rand_addr=' \x01\x00', @in=@dev={0xac, 0x14, 0x14, 0x26}, 0x4e20, 0x6, 0x4e23, 0x400, 0x2, 0x100, 0x80, 0x2b, 0x0, r4}, {0x2, 0x4, 0x7f, 0x1, 0xfffffffffffffffa, 0x100000000, 0x1000, 0x37d20455}, {0x4, 0x4, 0x7, 0x4}, 0x0, 0x6e6bb3, 0x0, 0x1, 0x2, 0x3}, {{@in=@multicast2, 0x4d3, 0x6c}, 0x2, @in6=@dev={0xfe, 0x80, '\x00', 0x41}, 0x3506, 0x0, 0x0, 0x40, 0x8, 0x8, 0x1c643f22}}, 0xe8) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0x0, 0x1d30}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0xe235, 0x3, 0x6, 0x40, r5, 0xffffd07c, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4, 0x5}, 0x48) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r6, 0x29, 0x45, &(0x7f00000002c0)={'HL\x00'}, &(0x7f0000000300)=0x1e) 04:40:58 executing program 0: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x84040}, 0x18) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0xc0c0583b, 0xfffffffffffffffe) 04:40:58 executing program 2: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000300)={0x54, 0x12, 0x303, 0x0, 0x0, {}, [@INET_DIAG_REQ_BYTECODE={0x8, 0x1, "01ec3c84"}]}, 0x54}}, 0x0) 04:40:58 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@dev, 0x0, 0x0, 0x2, 0x1, 0x0, 0x600}, 0x21) r1 = openat$incfs(0xffffffffffffffff, &(0x7f0000000000)='.pending_reads\x00', 0x40a01, 0x2) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0xff, 0x9}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x1}, 0x20) setsockopt$inet6_int(r3, 0x29, 0x18, &(0x7f0000000340)=0x6, 0x4) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000080)={{{@in6=@rand_addr=' \x01\x00', @in=@dev={0xac, 0x14, 0x14, 0x26}, 0x4e20, 0x6, 0x4e23, 0x400, 0x2, 0x100, 0x80, 0x2b, 0x0, r4}, {0x2, 0x4, 0x7f, 0x1, 0xfffffffffffffffa, 0x100000000, 0x1000, 0x37d20455}, {0x4, 0x4, 0x7, 0x4}, 0x0, 0x6e6bb3, 0x0, 0x1, 0x2, 0x3}, {{@in=@multicast2, 0x4d3, 0x6c}, 0x2, @in6=@dev={0xfe, 0x80, '\x00', 0x41}, 0x3506, 0x0, 0x0, 0x40, 0x8, 0x8, 0x1c643f22}}, 0xe8) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0x0, 0x1d30}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0xe235, 0x3, 0x6, 0x40, r5, 0xffffd07c, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4, 0x5}, 0x48) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r6, 0x29, 0x45, &(0x7f00000002c0)={'HL\x00'}, &(0x7f0000000300)=0x1e) [ 179.566450][ T25] audit: type=1400 audit(1686372058.732:174): avc: denied { getopt } for pid=4124 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 04:40:58 executing program 0: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x84040}, 0x18) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0xc0c0583b, 0xfffffffffffffffe) 04:41:09 executing program 1: r0 = epoll_create1(0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001dc0)='/proc/slabinfo\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000500)) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f00000004c0)) epoll_pwait(r0, &(0x7f0000000200)=[{}], 0x1, 0x6a28, 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000080)={0x4000200f}) 04:41:09 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@dev, 0x0, 0x0, 0x2, 0x1, 0x0, 0x600}, 0x21) r1 = openat$incfs(0xffffffffffffffff, &(0x7f0000000000)='.pending_reads\x00', 0x40a01, 0x2) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0xff, 0x9}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x1}, 0x20) setsockopt$inet6_int(r3, 0x29, 0x18, &(0x7f0000000340)=0x6, 0x4) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000080)={{{@in6=@rand_addr=' \x01\x00', @in=@dev={0xac, 0x14, 0x14, 0x26}, 0x4e20, 0x6, 0x4e23, 0x400, 0x2, 0x100, 0x80, 0x2b, 0x0, r4}, {0x2, 0x4, 0x7f, 0x1, 0xfffffffffffffffa, 0x100000000, 0x1000, 0x37d20455}, {0x4, 0x4, 0x7, 0x4}, 0x0, 0x6e6bb3, 0x0, 0x1, 0x2, 0x3}, {{@in=@multicast2, 0x4d3, 0x6c}, 0x2, @in6=@dev={0xfe, 0x80, '\x00', 0x41}, 0x3506, 0x0, 0x0, 0x40, 0x8, 0x8, 0x1c643f22}}, 0xe8) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0x0, 0x1d30}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0xe235, 0x3, 0x6, 0x40, r5, 0xffffd07c, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4, 0x5}, 0x48) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r6, 0x29, 0x45, &(0x7f00000002c0)={'HL\x00'}, &(0x7f0000000300)=0x1e) 04:41:09 executing program 2: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000300)={0x54, 0x12, 0x303, 0x0, 0x0, {}, [@INET_DIAG_REQ_BYTECODE={0x8, 0x1, "01ec3c84"}]}, 0x54}}, 0x0) 04:41:09 executing program 0: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x84040}, 0x18) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0xc0c0583b, 0xfffffffffffffffe) 04:41:09 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=@newsa={0x140, 0x10, 0x713, 0x0, 0x0, {{@in6=@ipv4={'\x00', '\xff\xff', @loopback}, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in=@private, 0x0, 0x32}, @in6=@local, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_aead={0x50, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x20, 0x80, "558c4dbb"}}]}, 0x140}}, 0x0) 04:41:09 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CCA_ED_LEVEL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)={0x28, r1, 0x4199f09936169415, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) r2 = syz_genetlink_get_family_id$netlbl_unlabel(0x0, 0xffffffffffffffff) sendmsg$NLBL_UNLABEL_C_LIST(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x58, r2, 0x200, 0x70bd2b, 0x25dfdbfe, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @private1}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}]}, 0x58}, 0x1, 0x0, 0x0, 0x8004}, 0x840) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f00000005c0)=@updsa={0x104, 0x1a, 0x1, 0x0, 0x0, {{@in=@empty, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in6=@mcast1, 0x13, 0x3c}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@coaddr={0x14, 0xe, @in=@remote}]}, 0x104}}, 0x0) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f00000001c0)=ANY=[], 0x208e24b) sendfile(r3, r5, 0x0, 0x100000f2090700) setsockopt$sock_timeval(r3, 0x1, 0x20, &(0x7f0000000040)={0x77359400}, 0x10) 04:41:09 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=@newsa={0x140, 0x10, 0x713, 0x0, 0x0, {{@in6=@ipv4={'\x00', '\xff\xff', @loopback}, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in=@private, 0x0, 0x32}, @in6=@local, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_aead={0x50, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x20, 0x80, "558c4dbb"}}]}, 0x140}}, 0x0) 04:41:09 executing program 0: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x84040}, 0x18) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0xc0c0583b, 0xfffffffffffffffe) 04:41:09 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@dev, 0x0, 0x0, 0x2, 0x1, 0x0, 0x600}, 0x21) r1 = openat$incfs(0xffffffffffffffff, &(0x7f0000000000)='.pending_reads\x00', 0x40a01, 0x2) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0xff, 0x9}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x1}, 0x20) setsockopt$inet6_int(r3, 0x29, 0x18, &(0x7f0000000340)=0x6, 0x4) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000080)={{{@in6=@rand_addr=' \x01\x00', @in=@dev={0xac, 0x14, 0x14, 0x26}, 0x4e20, 0x6, 0x4e23, 0x400, 0x2, 0x100, 0x80, 0x2b, 0x0, r4}, {0x2, 0x4, 0x7f, 0x1, 0xfffffffffffffffa, 0x100000000, 0x1000, 0x37d20455}, {0x4, 0x4, 0x7, 0x4}, 0x0, 0x6e6bb3, 0x0, 0x1, 0x2, 0x3}, {{@in=@multicast2, 0x4d3, 0x6c}, 0x2, @in6=@dev={0xfe, 0x80, '\x00', 0x41}, 0x3506, 0x0, 0x0, 0x40, 0x8, 0x8, 0x1c643f22}}, 0xe8) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0x0, 0x1d30}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0xe235, 0x3, 0x6, 0x40, r5, 0xffffd07c, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4, 0x5}, 0x48) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r6, 0x29, 0x45, &(0x7f00000002c0)={'HL\x00'}, &(0x7f0000000300)=0x1e) 04:41:09 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@dev, 0x0, 0x0, 0x2, 0x1, 0x0, 0x600}, 0x21) r1 = openat$incfs(0xffffffffffffffff, &(0x7f0000000000)='.pending_reads\x00', 0x40a01, 0x2) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0xff, 0x9}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x1}, 0x20) setsockopt$inet6_int(r3, 0x29, 0x18, &(0x7f0000000340)=0x6, 0x4) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000080)={{{@in6=@rand_addr=' \x01\x00', @in=@dev={0xac, 0x14, 0x14, 0x26}, 0x4e20, 0x6, 0x4e23, 0x400, 0x2, 0x100, 0x80, 0x2b, 0x0, r4}, {0x2, 0x4, 0x7f, 0x1, 0xfffffffffffffffa, 0x100000000, 0x1000, 0x37d20455}, {0x4, 0x4, 0x7, 0x4}, 0x0, 0x6e6bb3, 0x0, 0x1, 0x2, 0x3}, {{@in=@multicast2, 0x4d3, 0x6c}, 0x2, @in6=@dev={0xfe, 0x80, '\x00', 0x41}, 0x3506, 0x0, 0x0, 0x40, 0x8, 0x8, 0x1c643f22}}, 0xe8) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0x0, 0x1d30}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0xe235, 0x3, 0x6, 0x40, r5, 0xffffd07c, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4, 0x5}, 0x48) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r6, 0x29, 0x45, &(0x7f00000002c0)={'HL\x00'}, &(0x7f0000000300)=0x1e) 04:41:09 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@dev, 0x0, 0x0, 0x2, 0x1, 0x0, 0x600}, 0x21) r1 = openat$incfs(0xffffffffffffffff, &(0x7f0000000000)='.pending_reads\x00', 0x40a01, 0x2) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0xff, 0x9}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x1}, 0x20) setsockopt$inet6_int(r3, 0x29, 0x18, &(0x7f0000000340)=0x6, 0x4) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000080)={{{@in6=@rand_addr=' \x01\x00', @in=@dev={0xac, 0x14, 0x14, 0x26}, 0x4e20, 0x6, 0x4e23, 0x400, 0x2, 0x100, 0x80, 0x2b, 0x0, r4}, {0x2, 0x4, 0x7f, 0x1, 0xfffffffffffffffa, 0x100000000, 0x1000, 0x37d20455}, {0x4, 0x4, 0x7, 0x4}, 0x0, 0x6e6bb3, 0x0, 0x1, 0x2, 0x3}, {{@in=@multicast2, 0x4d3, 0x6c}, 0x2, @in6=@dev={0xfe, 0x80, '\x00', 0x41}, 0x3506, 0x0, 0x0, 0x40, 0x8, 0x8, 0x1c643f22}}, 0xe8) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0x0, 0x1d30}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0xe235, 0x3, 0x6, 0x40, r5, 0xffffd07c, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4, 0x5}, 0x48) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r6, 0x29, 0x45, &(0x7f00000002c0)={'HL\x00'}, &(0x7f0000000300)=0x1e) 04:41:09 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@dev, 0x0, 0x0, 0x2, 0x1, 0x0, 0x600}, 0x21) r1 = openat$incfs(0xffffffffffffffff, &(0x7f0000000000)='.pending_reads\x00', 0x40a01, 0x2) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0xff, 0x9}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x1}, 0x20) setsockopt$inet6_int(r3, 0x29, 0x18, &(0x7f0000000340)=0x6, 0x4) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000080)={{{@in6=@rand_addr=' \x01\x00', @in=@dev={0xac, 0x14, 0x14, 0x26}, 0x4e20, 0x6, 0x4e23, 0x400, 0x2, 0x100, 0x80, 0x2b, 0x0, r4}, {0x2, 0x4, 0x7f, 0x1, 0xfffffffffffffffa, 0x100000000, 0x1000, 0x37d20455}, {0x4, 0x4, 0x7, 0x4}, 0x0, 0x6e6bb3, 0x0, 0x1, 0x2, 0x3}, {{@in=@multicast2, 0x4d3, 0x6c}, 0x2, @in6=@dev={0xfe, 0x80, '\x00', 0x41}, 0x3506, 0x0, 0x0, 0x40, 0x8, 0x8, 0x1c643f22}}, 0xe8) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0x0, 0x1d30}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0xe235, 0x3, 0x6, 0x40, r5, 0xffffd07c, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4, 0x5}, 0x48) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r6, 0x29, 0x45, &(0x7f00000002c0)={'HL\x00'}, &(0x7f0000000300)=0x1e) 04:41:15 executing program 0: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x84040}, 0x18) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0xc0c0583b, 0xfffffffffffffffe) 04:41:15 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=@newsa={0x140, 0x10, 0x713, 0x0, 0x0, {{@in6=@ipv4={'\x00', '\xff\xff', @loopback}, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in=@private, 0x0, 0x32}, @in6=@local, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_aead={0x50, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x20, 0x80, "558c4dbb"}}]}, 0x140}}, 0x0) 04:41:15 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@dev, 0x0, 0x0, 0x2, 0x1, 0x0, 0x600}, 0x21) r1 = openat$incfs(0xffffffffffffffff, &(0x7f0000000000)='.pending_reads\x00', 0x40a01, 0x2) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0xff, 0x9}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x1}, 0x20) setsockopt$inet6_int(r3, 0x29, 0x18, &(0x7f0000000340)=0x6, 0x4) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000080)={{{@in6=@rand_addr=' \x01\x00', @in=@dev={0xac, 0x14, 0x14, 0x26}, 0x4e20, 0x6, 0x4e23, 0x400, 0x2, 0x100, 0x80, 0x2b, 0x0, r4}, {0x2, 0x4, 0x7f, 0x1, 0xfffffffffffffffa, 0x100000000, 0x1000, 0x37d20455}, {0x4, 0x4, 0x7, 0x4}, 0x0, 0x6e6bb3, 0x0, 0x1, 0x2, 0x3}, {{@in=@multicast2, 0x4d3, 0x6c}, 0x2, @in6=@dev={0xfe, 0x80, '\x00', 0x41}, 0x3506, 0x0, 0x0, 0x40, 0x8, 0x8, 0x1c643f22}}, 0xe8) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0x0, 0x1d30}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0xe235, 0x3, 0x6, 0x40, r5, 0xffffd07c, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4, 0x5}, 0x48) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r6, 0x29, 0x45, &(0x7f00000002c0)={'HL\x00'}, &(0x7f0000000300)=0x1e) 04:41:15 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CCA_ED_LEVEL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)={0x28, r1, 0x4199f09936169415, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) r2 = syz_genetlink_get_family_id$netlbl_unlabel(0x0, 0xffffffffffffffff) sendmsg$NLBL_UNLABEL_C_LIST(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x58, r2, 0x200, 0x70bd2b, 0x25dfdbfe, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @private1}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}]}, 0x58}, 0x1, 0x0, 0x0, 0x8004}, 0x840) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f00000005c0)=@updsa={0x104, 0x1a, 0x1, 0x0, 0x0, {{@in=@empty, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in6=@mcast1, 0x13, 0x3c}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@coaddr={0x14, 0xe, @in=@remote}]}, 0x104}}, 0x0) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f00000001c0)=ANY=[], 0x208e24b) sendfile(r3, r5, 0x0, 0x100000f2090700) setsockopt$sock_timeval(r3, 0x1, 0x20, &(0x7f0000000040)={0x77359400}, 0x10) 04:41:15 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@dev, 0x0, 0x0, 0x2, 0x1, 0x0, 0x600}, 0x21) r1 = openat$incfs(0xffffffffffffffff, &(0x7f0000000000)='.pending_reads\x00', 0x40a01, 0x2) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0xff, 0x9}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x1}, 0x20) setsockopt$inet6_int(r3, 0x29, 0x18, &(0x7f0000000340)=0x6, 0x4) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000080)={{{@in6=@rand_addr=' \x01\x00', @in=@dev={0xac, 0x14, 0x14, 0x26}, 0x4e20, 0x6, 0x4e23, 0x400, 0x2, 0x100, 0x80, 0x2b, 0x0, r4}, {0x2, 0x4, 0x7f, 0x1, 0xfffffffffffffffa, 0x100000000, 0x1000, 0x37d20455}, {0x4, 0x4, 0x7, 0x4}, 0x0, 0x6e6bb3, 0x0, 0x1, 0x2, 0x3}, {{@in=@multicast2, 0x4d3, 0x6c}, 0x2, @in6=@dev={0xfe, 0x80, '\x00', 0x41}, 0x3506, 0x0, 0x0, 0x40, 0x8, 0x8, 0x1c643f22}}, 0xe8) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0x0, 0x1d30}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0xe235, 0x3, 0x6, 0x40, r5, 0xffffd07c, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4, 0x5}, 0x48) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r6, 0x29, 0x45, &(0x7f00000002c0)={'HL\x00'}, &(0x7f0000000300)=0x1e) 04:41:15 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@dev, 0x0, 0x0, 0x2, 0x1, 0x0, 0x600}, 0x21) r1 = openat$incfs(0xffffffffffffffff, &(0x7f0000000000)='.pending_reads\x00', 0x40a01, 0x2) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0xff, 0x9}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x1}, 0x20) setsockopt$inet6_int(r3, 0x29, 0x18, &(0x7f0000000340)=0x6, 0x4) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000080)={{{@in6=@rand_addr=' \x01\x00', @in=@dev={0xac, 0x14, 0x14, 0x26}, 0x4e20, 0x6, 0x4e23, 0x400, 0x2, 0x100, 0x80, 0x2b, 0x0, r4}, {0x2, 0x4, 0x7f, 0x1, 0xfffffffffffffffa, 0x100000000, 0x1000, 0x37d20455}, {0x4, 0x4, 0x7, 0x4}, 0x0, 0x6e6bb3, 0x0, 0x1, 0x2, 0x3}, {{@in=@multicast2, 0x4d3, 0x6c}, 0x2, @in6=@dev={0xfe, 0x80, '\x00', 0x41}, 0x3506, 0x0, 0x0, 0x40, 0x8, 0x8, 0x1c643f22}}, 0xe8) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0x0, 0x1d30}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0xe235, 0x3, 0x6, 0x40, r5, 0xffffd07c, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4, 0x5}, 0x48) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r6, 0x29, 0x45, &(0x7f00000002c0)={'HL\x00'}, &(0x7f0000000300)=0x1e) 04:41:15 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@dev, 0x0, 0x0, 0x2, 0x1, 0x0, 0x600}, 0x21) r1 = openat$incfs(0xffffffffffffffff, &(0x7f0000000000)='.pending_reads\x00', 0x40a01, 0x2) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0xff, 0x9}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x1}, 0x20) setsockopt$inet6_int(r3, 0x29, 0x18, &(0x7f0000000340)=0x6, 0x4) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000080)={{{@in6=@rand_addr=' \x01\x00', @in=@dev={0xac, 0x14, 0x14, 0x26}, 0x4e20, 0x6, 0x4e23, 0x400, 0x2, 0x100, 0x80, 0x2b, 0x0, r4}, {0x2, 0x4, 0x7f, 0x1, 0xfffffffffffffffa, 0x100000000, 0x1000, 0x37d20455}, {0x4, 0x4, 0x7, 0x4}, 0x0, 0x6e6bb3, 0x0, 0x1, 0x2, 0x3}, {{@in=@multicast2, 0x4d3, 0x6c}, 0x2, @in6=@dev={0xfe, 0x80, '\x00', 0x41}, 0x3506, 0x0, 0x0, 0x40, 0x8, 0x8, 0x1c643f22}}, 0xe8) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0x0, 0x1d30}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0xe235, 0x3, 0x6, 0x40, r5, 0xffffd07c, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4, 0x5}, 0x48) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r6, 0x29, 0x45, &(0x7f00000002c0)={'HL\x00'}, &(0x7f0000000300)=0x1e) 04:41:15 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@dev, 0x0, 0x0, 0x2, 0x1, 0x0, 0x600}, 0x21) r1 = openat$incfs(0xffffffffffffffff, &(0x7f0000000000)='.pending_reads\x00', 0x40a01, 0x2) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0xff, 0x9}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x1}, 0x20) setsockopt$inet6_int(r3, 0x29, 0x18, &(0x7f0000000340)=0x6, 0x4) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000080)={{{@in6=@rand_addr=' \x01\x00', @in=@dev={0xac, 0x14, 0x14, 0x26}, 0x4e20, 0x6, 0x4e23, 0x400, 0x2, 0x100, 0x80, 0x2b, 0x0, r4}, {0x2, 0x4, 0x7f, 0x1, 0xfffffffffffffffa, 0x100000000, 0x1000, 0x37d20455}, {0x4, 0x4, 0x7, 0x4}, 0x0, 0x6e6bb3, 0x0, 0x1, 0x2, 0x3}, {{@in=@multicast2, 0x4d3, 0x6c}, 0x2, @in6=@dev={0xfe, 0x80, '\x00', 0x41}, 0x3506, 0x0, 0x0, 0x40, 0x8, 0x8, 0x1c643f22}}, 0xe8) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0x0, 0x1d30}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0xe235, 0x3, 0x6, 0x40, r5, 0xffffd07c, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4, 0x5}, 0x48) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r6, 0x29, 0x45, &(0x7f00000002c0)={'HL\x00'}, &(0x7f0000000300)=0x1e) 04:41:15 executing program 0: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x84040}, 0x18) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0xc0c0583b, 0xfffffffffffffffe) 04:41:15 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@dev, 0x0, 0x0, 0x2, 0x1, 0x0, 0x600}, 0x21) r1 = openat$incfs(0xffffffffffffffff, &(0x7f0000000000)='.pending_reads\x00', 0x40a01, 0x2) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0xff, 0x9}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x1}, 0x20) setsockopt$inet6_int(r3, 0x29, 0x18, &(0x7f0000000340)=0x6, 0x4) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000080)={{{@in6=@rand_addr=' \x01\x00', @in=@dev={0xac, 0x14, 0x14, 0x26}, 0x4e20, 0x6, 0x4e23, 0x400, 0x2, 0x100, 0x80, 0x2b, 0x0, r4}, {0x2, 0x4, 0x7f, 0x1, 0xfffffffffffffffa, 0x100000000, 0x1000, 0x37d20455}, {0x4, 0x4, 0x7, 0x4}, 0x0, 0x6e6bb3, 0x0, 0x1, 0x2, 0x3}, {{@in=@multicast2, 0x4d3, 0x6c}, 0x2, @in6=@dev={0xfe, 0x80, '\x00', 0x41}, 0x3506, 0x0, 0x0, 0x40, 0x8, 0x8, 0x1c643f22}}, 0xe8) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0x0, 0x1d30}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0xe235, 0x3, 0x6, 0x40, r5, 0xffffd07c, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4, 0x5}, 0x48) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r6, 0x29, 0x45, &(0x7f00000002c0)={'HL\x00'}, &(0x7f0000000300)=0x1e) 04:41:15 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@dev, 0x0, 0x0, 0x2, 0x1, 0x0, 0x600}, 0x21) r1 = openat$incfs(0xffffffffffffffff, &(0x7f0000000000)='.pending_reads\x00', 0x40a01, 0x2) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0xff, 0x9}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x1}, 0x20) setsockopt$inet6_int(r3, 0x29, 0x18, &(0x7f0000000340)=0x6, 0x4) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000080)={{{@in6=@rand_addr=' \x01\x00', @in=@dev={0xac, 0x14, 0x14, 0x26}, 0x4e20, 0x6, 0x4e23, 0x400, 0x2, 0x100, 0x80, 0x2b, 0x0, r4}, {0x2, 0x4, 0x7f, 0x1, 0xfffffffffffffffa, 0x100000000, 0x1000, 0x37d20455}, {0x4, 0x4, 0x7, 0x4}, 0x0, 0x6e6bb3, 0x0, 0x1, 0x2, 0x3}, {{@in=@multicast2, 0x4d3, 0x6c}, 0x2, @in6=@dev={0xfe, 0x80, '\x00', 0x41}, 0x3506, 0x0, 0x0, 0x40, 0x8, 0x8, 0x1c643f22}}, 0xe8) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0x0, 0x1d30}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0xe235, 0x3, 0x6, 0x40, r5, 0xffffd07c, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4, 0x5}, 0x48) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r6, 0x29, 0x45, &(0x7f00000002c0)={'HL\x00'}, &(0x7f0000000300)=0x1e) 04:41:15 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CCA_ED_LEVEL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)={0x28, r1, 0x4199f09936169415, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) r2 = syz_genetlink_get_family_id$netlbl_unlabel(0x0, 0xffffffffffffffff) sendmsg$NLBL_UNLABEL_C_LIST(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x58, r2, 0x200, 0x70bd2b, 0x25dfdbfe, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @private1}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}]}, 0x58}, 0x1, 0x0, 0x0, 0x8004}, 0x840) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f00000005c0)=@updsa={0x104, 0x1a, 0x1, 0x0, 0x0, {{@in=@empty, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in6=@mcast1, 0x13, 0x3c}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@coaddr={0x14, 0xe, @in=@remote}]}, 0x104}}, 0x0) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f00000001c0)=ANY=[], 0x208e24b) sendfile(r3, r5, 0x0, 0x100000f2090700) setsockopt$sock_timeval(r3, 0x1, 0x20, &(0x7f0000000040)={0x77359400}, 0x10) 04:41:15 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@dev, 0x0, 0x0, 0x2, 0x1, 0x0, 0x600}, 0x21) r1 = openat$incfs(0xffffffffffffffff, &(0x7f0000000000)='.pending_reads\x00', 0x40a01, 0x2) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0xff, 0x9}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x1}, 0x20) setsockopt$inet6_int(r3, 0x29, 0x18, &(0x7f0000000340)=0x6, 0x4) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000080)={{{@in6=@rand_addr=' \x01\x00', @in=@dev={0xac, 0x14, 0x14, 0x26}, 0x4e20, 0x6, 0x4e23, 0x400, 0x2, 0x100, 0x80, 0x2b, 0x0, r4}, {0x2, 0x4, 0x7f, 0x1, 0xfffffffffffffffa, 0x100000000, 0x1000, 0x37d20455}, {0x4, 0x4, 0x7, 0x4}, 0x0, 0x6e6bb3, 0x0, 0x1, 0x2, 0x3}, {{@in=@multicast2, 0x4d3, 0x6c}, 0x2, @in6=@dev={0xfe, 0x80, '\x00', 0x41}, 0x3506, 0x0, 0x0, 0x40, 0x8, 0x8, 0x1c643f22}}, 0xe8) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0x0, 0x1d30}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0xe235, 0x3, 0x6, 0x40, r5, 0xffffd07c, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4, 0x5}, 0x48) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r6, 0x29, 0x45, &(0x7f00000002c0)={'HL\x00'}, &(0x7f0000000300)=0x1e) 04:41:15 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@dev, 0x0, 0x0, 0x2, 0x1, 0x0, 0x600}, 0x21) r1 = openat$incfs(0xffffffffffffffff, &(0x7f0000000000)='.pending_reads\x00', 0x40a01, 0x2) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0xff, 0x9}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x1}, 0x20) setsockopt$inet6_int(r3, 0x29, 0x18, &(0x7f0000000340)=0x6, 0x4) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000080)={{{@in6=@rand_addr=' \x01\x00', @in=@dev={0xac, 0x14, 0x14, 0x26}, 0x4e20, 0x6, 0x4e23, 0x400, 0x2, 0x100, 0x80, 0x2b, 0x0, r4}, {0x2, 0x4, 0x7f, 0x1, 0xfffffffffffffffa, 0x100000000, 0x1000, 0x37d20455}, {0x4, 0x4, 0x7, 0x4}, 0x0, 0x6e6bb3, 0x0, 0x1, 0x2, 0x3}, {{@in=@multicast2, 0x4d3, 0x6c}, 0x2, @in6=@dev={0xfe, 0x80, '\x00', 0x41}, 0x3506, 0x0, 0x0, 0x40, 0x8, 0x8, 0x1c643f22}}, 0xe8) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0x0, 0x1d30}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0xe235, 0x3, 0x6, 0x40, r5, 0xffffd07c, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4, 0x5}, 0x48) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r6, 0x29, 0x45, &(0x7f00000002c0)={'HL\x00'}, &(0x7f0000000300)=0x1e) 04:41:15 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@dev, 0x0, 0x0, 0x2, 0x1, 0x0, 0x600}, 0x21) r1 = openat$incfs(0xffffffffffffffff, &(0x7f0000000000)='.pending_reads\x00', 0x40a01, 0x2) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0xff, 0x9}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x1}, 0x20) setsockopt$inet6_int(r3, 0x29, 0x18, &(0x7f0000000340)=0x6, 0x4) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000080)={{{@in6=@rand_addr=' \x01\x00', @in=@dev={0xac, 0x14, 0x14, 0x26}, 0x4e20, 0x6, 0x4e23, 0x400, 0x2, 0x100, 0x80, 0x2b, 0x0, r4}, {0x2, 0x4, 0x7f, 0x1, 0xfffffffffffffffa, 0x100000000, 0x1000, 0x37d20455}, {0x4, 0x4, 0x7, 0x4}, 0x0, 0x6e6bb3, 0x0, 0x1, 0x2, 0x3}, {{@in=@multicast2, 0x4d3, 0x6c}, 0x2, @in6=@dev={0xfe, 0x80, '\x00', 0x41}, 0x3506, 0x0, 0x0, 0x40, 0x8, 0x8, 0x1c643f22}}, 0xe8) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0x0, 0x1d30}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0xe235, 0x3, 0x6, 0x40, r5, 0xffffd07c, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4, 0x5}, 0x48) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r6, 0x29, 0x45, &(0x7f00000002c0)={'HL\x00'}, &(0x7f0000000300)=0x1e) 04:41:15 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CCA_ED_LEVEL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)={0x28, r1, 0x4199f09936169415, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) r2 = syz_genetlink_get_family_id$netlbl_unlabel(0x0, 0xffffffffffffffff) sendmsg$NLBL_UNLABEL_C_LIST(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x58, r2, 0x200, 0x70bd2b, 0x25dfdbfe, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @private1}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}]}, 0x58}, 0x1, 0x0, 0x0, 0x8004}, 0x840) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f00000005c0)=@updsa={0x104, 0x1a, 0x1, 0x0, 0x0, {{@in=@empty, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in6=@mcast1, 0x13, 0x3c}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@coaddr={0x14, 0xe, @in=@remote}]}, 0x104}}, 0x0) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f00000001c0)=ANY=[], 0x208e24b) sendfile(r3, r5, 0x0, 0x100000f2090700) setsockopt$sock_timeval(r3, 0x1, 0x20, &(0x7f0000000040)={0x77359400}, 0x10) 04:41:15 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@dev, 0x0, 0x0, 0x2, 0x1, 0x0, 0x600}, 0x21) r1 = openat$incfs(0xffffffffffffffff, &(0x7f0000000000)='.pending_reads\x00', 0x40a01, 0x2) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0xff, 0x9}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x1}, 0x20) setsockopt$inet6_int(r3, 0x29, 0x18, &(0x7f0000000340)=0x6, 0x4) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000080)={{{@in6=@rand_addr=' \x01\x00', @in=@dev={0xac, 0x14, 0x14, 0x26}, 0x4e20, 0x6, 0x4e23, 0x400, 0x2, 0x100, 0x80, 0x2b, 0x0, r4}, {0x2, 0x4, 0x7f, 0x1, 0xfffffffffffffffa, 0x100000000, 0x1000, 0x37d20455}, {0x4, 0x4, 0x7, 0x4}, 0x0, 0x6e6bb3, 0x0, 0x1, 0x2, 0x3}, {{@in=@multicast2, 0x4d3, 0x6c}, 0x2, @in6=@dev={0xfe, 0x80, '\x00', 0x41}, 0x3506, 0x0, 0x0, 0x40, 0x8, 0x8, 0x1c643f22}}, 0xe8) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0x0, 0x1d30}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0xe235, 0x3, 0x6, 0x40, r5, 0xffffd07c, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4, 0x5}, 0x48) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r6, 0x29, 0x45, &(0x7f00000002c0)={'HL\x00'}, &(0x7f0000000300)=0x1e) [ 196.711228][ T4232] ================================================================== [ 196.719331][ T4232] BUG: KCSAN: data-race in filemap_read / generic_write_end [ 196.726615][ T4232] [ 196.728932][ T4232] write to 0xffff888109dc16c0 of 8 bytes by task 4231 on cpu 0: [ 196.736559][ T4232] generic_write_end+0xb4/0x360 [ 196.741410][ T4232] ext4_da_write_end+0x4df/0x690 [ 196.746348][ T4232] generic_perform_write+0x253/0x3d0 [ 196.751626][ T4232] ext4_buffered_write_iter+0x234/0x3e0 [ 196.757166][ T4232] ext4_file_write_iter+0xd7/0x10e0 [ 196.762356][ T4232] vfs_write+0x47b/0x780 [ 196.766588][ T4232] ksys_write+0xeb/0x1a0 [ 196.771168][ T4232] __x64_sys_write+0x42/0x50 [ 196.775761][ T4232] do_syscall_64+0x41/0xc0 [ 196.780175][ T4232] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 196.786065][ T4232] [ 196.788381][ T4232] read to 0xffff888109dc16c0 of 8 bytes by task 4232 on cpu 1: [ 196.795915][ T4232] filemap_read+0x1ca/0x680 [ 196.800418][ T4232] generic_file_read_iter+0x76/0x320 [ 196.805702][ T4232] ext4_file_read_iter+0x1cc/0x290 [ 196.810909][ T4232] generic_file_splice_read+0xe3/0x290 [ 196.816367][ T4232] splice_direct_to_actor+0x25a/0x5f0 [ 196.821737][ T4232] do_splice_direct+0x104/0x180 [ 196.826575][ T4232] do_sendfile+0x3b8/0x950 [ 196.830996][ T4232] __x64_sys_sendfile64+0x110/0x150 [ 196.836203][ T4232] do_syscall_64+0x41/0xc0 [ 196.840629][ T4232] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 196.846584][ T4232] [ 196.848913][ T4232] value changed: 0x000000000071b000 -> 0x000000000071c000 [ 196.856009][ T4232] [ 196.858315][ T4232] Reported by Kernel Concurrency Sanitizer on: [ 196.864449][ T4232] CPU: 1 PID: 4232 Comm: syz-executor.3 Not tainted 6.4.0-rc5-syzkaller-00245-g64569520920a #0 [ 196.875627][ T4232] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/25/2023 [ 196.885667][ T4232] ================================================================== 04:41:19 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@dev, 0x0, 0x0, 0x2, 0x1, 0x0, 0x600}, 0x21) r1 = openat$incfs(0xffffffffffffffff, &(0x7f0000000000)='.pending_reads\x00', 0x40a01, 0x2) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0xff, 0x9}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x1}, 0x20) setsockopt$inet6_int(r3, 0x29, 0x18, &(0x7f0000000340)=0x6, 0x4) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000080)={{{@in6=@rand_addr=' \x01\x00', @in=@dev={0xac, 0x14, 0x14, 0x26}, 0x4e20, 0x6, 0x4e23, 0x400, 0x2, 0x100, 0x80, 0x2b, 0x0, r4}, {0x2, 0x4, 0x7f, 0x1, 0xfffffffffffffffa, 0x100000000, 0x1000, 0x37d20455}, {0x4, 0x4, 0x7, 0x4}, 0x0, 0x6e6bb3, 0x0, 0x1, 0x2, 0x3}, {{@in=@multicast2, 0x4d3, 0x6c}, 0x2, @in6=@dev={0xfe, 0x80, '\x00', 0x41}, 0x3506, 0x0, 0x0, 0x40, 0x8, 0x8, 0x1c643f22}}, 0xe8) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0x0, 0x1d30}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0xe235, 0x3, 0x6, 0x40, r5, 0xffffd07c, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4, 0x5}, 0x48) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r6, 0x29, 0x45, &(0x7f00000002c0)={'HL\x00'}, &(0x7f0000000300)=0x1e) 04:41:19 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@dev, 0x0, 0x0, 0x2, 0x1, 0x0, 0x600}, 0x21) r1 = openat$incfs(0xffffffffffffffff, &(0x7f0000000000)='.pending_reads\x00', 0x40a01, 0x2) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0xff, 0x9}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x1}, 0x20) setsockopt$inet6_int(r3, 0x29, 0x18, &(0x7f0000000340)=0x6, 0x4) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000080)={{{@in6=@rand_addr=' \x01\x00', @in=@dev={0xac, 0x14, 0x14, 0x26}, 0x4e20, 0x6, 0x4e23, 0x400, 0x2, 0x100, 0x80, 0x2b, 0x0, r4}, {0x2, 0x4, 0x7f, 0x1, 0xfffffffffffffffa, 0x100000000, 0x1000, 0x37d20455}, {0x4, 0x4, 0x7, 0x4}, 0x0, 0x6e6bb3, 0x0, 0x1, 0x2, 0x3}, {{@in=@multicast2, 0x4d3, 0x6c}, 0x2, @in6=@dev={0xfe, 0x80, '\x00', 0x41}, 0x3506, 0x0, 0x0, 0x40, 0x8, 0x8, 0x1c643f22}}, 0xe8) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0x0, 0x1d30}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0xe235, 0x3, 0x6, 0x40, r5, 0xffffd07c, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4, 0x5}, 0x48) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r6, 0x29, 0x45, &(0x7f00000002c0)={'HL\x00'}, &(0x7f0000000300)=0x1e) 04:41:19 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CCA_ED_LEVEL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)={0x28, r1, 0x4199f09936169415, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) r2 = syz_genetlink_get_family_id$netlbl_unlabel(0x0, 0xffffffffffffffff) sendmsg$NLBL_UNLABEL_C_LIST(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x58, r2, 0x200, 0x70bd2b, 0x25dfdbfe, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @private1}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}]}, 0x58}, 0x1, 0x0, 0x0, 0x8004}, 0x840) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f00000005c0)=@updsa={0x104, 0x1a, 0x1, 0x0, 0x0, {{@in=@empty, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in6=@mcast1, 0x13, 0x3c}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@coaddr={0x14, 0xe, @in=@remote}]}, 0x104}}, 0x0) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f00000001c0)=ANY=[], 0x208e24b) sendfile(r3, r5, 0x0, 0x100000f2090700) setsockopt$sock_timeval(r3, 0x1, 0x20, &(0x7f0000000040)={0x77359400}, 0x10) 04:41:19 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x61, 0x10, 0x4}, [@ldst={0x6, 0x3}], {0x95, 0x0, 0xc00}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) 04:41:19 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CCA_ED_LEVEL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)={0x28, r1, 0x4199f09936169415, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) r2 = syz_genetlink_get_family_id$netlbl_unlabel(0x0, 0xffffffffffffffff) sendmsg$NLBL_UNLABEL_C_LIST(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x58, r2, 0x200, 0x70bd2b, 0x25dfdbfe, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @private1}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}]}, 0x58}, 0x1, 0x0, 0x0, 0x8004}, 0x840) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f00000005c0)=@updsa={0x104, 0x1a, 0x1, 0x0, 0x0, {{@in=@empty, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in6=@mcast1, 0x13, 0x3c}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@coaddr={0x14, 0xe, @in=@remote}]}, 0x104}}, 0x0) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f00000001c0)=ANY=[], 0x208e24b) sendfile(r3, r5, 0x0, 0x100000f2090700) setsockopt$sock_timeval(r3, 0x1, 0x20, &(0x7f0000000040)={0x77359400}, 0x10) 04:41:19 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CCA_ED_LEVEL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)={0x28, r1, 0x4199f09936169415, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) r2 = syz_genetlink_get_family_id$netlbl_unlabel(0x0, 0xffffffffffffffff) sendmsg$NLBL_UNLABEL_C_LIST(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x58, r2, 0x200, 0x70bd2b, 0x25dfdbfe, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @private1}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}]}, 0x58}, 0x1, 0x0, 0x0, 0x8004}, 0x840) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f00000005c0)=@updsa={0x104, 0x1a, 0x1, 0x0, 0x0, {{@in=@empty, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in6=@mcast1, 0x13, 0x3c}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@coaddr={0x14, 0xe, @in=@remote}]}, 0x104}}, 0x0) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f00000001c0)=ANY=[], 0x208e24b) sendfile(r3, r5, 0x0, 0x100000f2090700) setsockopt$sock_timeval(r3, 0x1, 0x20, &(0x7f0000000040)={0x77359400}, 0x10) 04:41:19 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x61, 0x10, 0x4}, [@ldst={0x6, 0x3}], {0x95, 0x0, 0xc00}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) 04:41:19 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x802}, [@alu={0x7, 0x0, 0xa}, @jmp={0x5, 0x0, 0xb}]}, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='tlb_flush\x00', r0}, 0x10) 04:41:19 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x802}, [@alu={0x7, 0x0, 0xa}, @jmp={0x5, 0x0, 0xb}]}, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='tlb_flush\x00', r0}, 0x10) 04:41:19 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x61, 0x10, 0x4}, [@ldst={0x6, 0x3}], {0x95, 0x0, 0xc00}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) 04:41:19 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x802}, [@alu={0x7, 0x0, 0xa}, @jmp={0x5, 0x0, 0xb}]}, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='tlb_flush\x00', r0}, 0x10) 04:41:19 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x61, 0x10, 0x4}, [@ldst={0x6, 0x3}], {0x95, 0x0, 0xc00}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) 04:41:23 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@dev, 0x0, 0x0, 0x2, 0x1, 0x0, 0x600}, 0x21) r1 = openat$incfs(0xffffffffffffffff, &(0x7f0000000000)='.pending_reads\x00', 0x40a01, 0x2) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x0, 0x0, 0xff, 0x9}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x1}, 0x20) setsockopt$inet6_int(r3, 0x29, 0x18, &(0x7f0000000340)=0x6, 0x4) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000080)={{{@in6=@rand_addr=' \x01\x00', @in=@dev={0xac, 0x14, 0x14, 0x26}, 0x4e20, 0x6, 0x4e23, 0x400, 0x2, 0x100, 0x80, 0x2b, 0x0, r4}, {0x2, 0x4, 0x7f, 0x1, 0xfffffffffffffffa, 0x100000000, 0x1000, 0x37d20455}, {0x4, 0x4, 0x7, 0x4}, 0x0, 0x6e6bb3, 0x0, 0x1, 0x2, 0x3}, {{@in=@multicast2, 0x4d3, 0x6c}, 0x2, @in6=@dev={0xfe, 0x80, '\x00', 0x41}, 0x3506, 0x0, 0x0, 0x40, 0x8, 0x8, 0x1c643f22}}, 0xe8) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0x0, 0x1d30}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0xe235, 0x3, 0x6, 0x40, r5, 0xffffd07c, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4, 0x5}, 0x48) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r6, 0x29, 0x45, &(0x7f00000002c0)={'HL\x00'}, &(0x7f0000000300)=0x1e) 04:41:23 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x802}, [@alu={0x7, 0x0, 0xa}, @jmp={0x5, 0x0, 0xb}]}, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='tlb_flush\x00', r0}, 0x10) 04:41:23 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x802}, [@alu={0x7, 0x0, 0xa}, @jmp={0x5, 0x0, 0xb}]}, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='tlb_flush\x00', r0}, 0x10) 04:41:23 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CCA_ED_LEVEL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)={0x28, r1, 0x4199f09936169415, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) r2 = syz_genetlink_get_family_id$netlbl_unlabel(0x0, 0xffffffffffffffff) sendmsg$NLBL_UNLABEL_C_LIST(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x58, r2, 0x200, 0x70bd2b, 0x25dfdbfe, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @private1}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}]}, 0x58}, 0x1, 0x0, 0x0, 0x8004}, 0x840) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f00000005c0)=@updsa={0x104, 0x1a, 0x1, 0x0, 0x0, {{@in=@empty, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in6=@mcast1, 0x13, 0x3c}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@coaddr={0x14, 0xe, @in=@remote}]}, 0x104}}, 0x0) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f00000001c0)=ANY=[], 0x208e24b) sendfile(r3, r5, 0x0, 0x100000f2090700) setsockopt$sock_timeval(r3, 0x1, 0x20, &(0x7f0000000040)={0x77359400}, 0x10) 04:41:23 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CCA_ED_LEVEL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)={0x28, r1, 0x4199f09936169415, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) r2 = syz_genetlink_get_family_id$netlbl_unlabel(0x0, 0xffffffffffffffff) sendmsg$NLBL_UNLABEL_C_LIST(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x58, r2, 0x200, 0x70bd2b, 0x25dfdbfe, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @private1}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}]}, 0x58}, 0x1, 0x0, 0x0, 0x8004}, 0x840) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f00000005c0)=@updsa={0x104, 0x1a, 0x1, 0x0, 0x0, {{@in=@empty, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in6=@mcast1, 0x13, 0x3c}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@coaddr={0x14, 0xe, @in=@remote}]}, 0x104}}, 0x0) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f00000001c0)=ANY=[], 0x208e24b) sendfile(r3, r5, 0x0, 0x100000f2090700) setsockopt$sock_timeval(r3, 0x1, 0x20, &(0x7f0000000040)={0x77359400}, 0x10) 04:41:23 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CCA_ED_LEVEL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)={0x28, r1, 0x4199f09936169415, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}}, 0x0) r2 = syz_genetlink_get_family_id$netlbl_unlabel(0x0, 0xffffffffffffffff) sendmsg$NLBL_UNLABEL_C_LIST(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x58, r2, 0x200, 0x70bd2b, 0x25dfdbfe, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @private1}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}]}, 0x58}, 0x1, 0x0, 0x0, 0x8004}, 0x840) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f00000005c0)=@updsa={0x104, 0x1a, 0x1, 0x0, 0x0, {{@in=@empty, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in6=@mcast1, 0x13, 0x3c}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@coaddr={0x14, 0xe, @in=@remote}]}, 0x104}}, 0x0) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f00000001c0)=ANY=[], 0x208e24b) sendfile(r3, r5, 0x0, 0x100000f2090700) setsockopt$sock_timeval(r3, 0x1, 0x20, &(0x7f0000000040)={0x77359400}, 0x10) 04:41:23 executing program 2: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x4, 0x0, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000c45000/0x4000)=nil, 0x2) 04:41:23 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x802}, [@alu={0x7, 0x0, 0xa}, @jmp={0x5, 0x0, 0xb}]}, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='tlb_flush\x00', r0}, 0x10) 04:41:23 executing program 2: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x4, 0x0, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000c45000/0x4000)=nil, 0x2) 04:41:23 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x802}, [@alu={0x7, 0x0, 0xa}, @jmp={0x5, 0x0, 0xb}]}, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='tlb_flush\x00', r0}, 0x10) 04:41:23 executing program 2: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x4, 0x0, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000c45000/0x4000)=nil, 0x2) 04:41:23 executing program 2: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x4, 0x0, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000c45000/0x4000)=nil, 0x2)