Warning: Permanently added '10.128.1.103' (ECDSA) to the list of known hosts. 2023/03/30 18:36:53 fuzzer started 2023/03/30 18:36:53 dialing manager at 10.128.0.163:39617 [ 25.541479][ T23] audit: type=1400 audit(1680201414.779:74): avc: denied { mounton } for pid=3113 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1136 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 25.547740][ T3113] cgroup: Unknown subsys name 'net' [ 25.564178][ T23] audit: type=1400 audit(1680201414.789:75): avc: denied { mount } for pid=3113 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 25.591573][ T23] audit: type=1400 audit(1680201414.809:76): avc: denied { unmount } for pid=3113 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 25.708014][ T3113] cgroup: Unknown subsys name 'rlimit' 2023/03/30 18:36:55 syscalls: 2806 2023/03/30 18:36:55 code coverage: enabled 2023/03/30 18:36:55 comparison tracing: enabled 2023/03/30 18:36:55 extra coverage: enabled 2023/03/30 18:36:55 delay kcov mmap: enabled 2023/03/30 18:36:55 setuid sandbox: enabled 2023/03/30 18:36:55 namespace sandbox: enabled 2023/03/30 18:36:55 Android sandbox: enabled 2023/03/30 18:36:55 fault injection: enabled 2023/03/30 18:36:55 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2023/03/30 18:36:55 net packet injection: enabled 2023/03/30 18:36:55 net device setup: enabled 2023/03/30 18:36:55 concurrency sanitizer: enabled 2023/03/30 18:36:55 devlink PCI setup: PCI device 0000:00:10.0 is not available 2023/03/30 18:36:55 NIC VF setup: PCI device 0000:00:11.0 is not available 2023/03/30 18:36:55 USB emulation: /dev/raw-gadget does not exist 2023/03/30 18:36:55 hci packet injection: /dev/vhci does not exist 2023/03/30 18:36:55 wifi device emulation: /sys/class/mac80211_hwsim/ does not exist 2023/03/30 18:36:55 802.15.4 emulation: enabled 2023/03/30 18:36:55 suppressing KCSAN reports in functions: 'xas_clear_mark' 'generic_write_end' 'wg_packet_decrypt_worker' 'dont_mount' 'mark_buffer_dirty_inode' 2023/03/30 18:36:55 fetching corpus: 0, signal 0/2000 (executing program) [ 25.798020][ T23] audit: type=1400 audit(1680201415.039:77): avc: denied { mounton } for pid=3113 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 25.831472][ T23] audit: type=1400 audit(1680201415.049:78): avc: denied { mount } for pid=3113 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 25.854837][ T23] audit: type=1400 audit(1680201415.049:79): avc: denied { create } for pid=3113 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 25.875308][ T23] audit: type=1400 audit(1680201415.049:80): avc: denied { write } for pid=3113 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 25.896106][ T23] audit: type=1400 audit(1680201415.049:81): avc: denied { read } for pid=3113 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 2023/03/30 18:36:55 fetching corpus: 50, signal 24689/27857 (executing program) 2023/03/30 18:36:55 fetching corpus: 100, signal 33573/37863 (executing program) 2023/03/30 18:36:55 fetching corpus: 150, signal 41616/46764 (executing program) 2023/03/30 18:36:55 fetching corpus: 200, signal 45077/51205 (executing program) 2023/03/30 18:36:56 fetching corpus: 250, signal 50331/57157 (executing program) 2023/03/30 18:36:56 fetching corpus: 300, signal 55932/63233 (executing program) 2023/03/30 18:36:56 fetching corpus: 350, signal 58361/66383 (executing program) 2023/03/30 18:36:56 fetching corpus: 399, signal 62044/70461 (executing program) 2023/03/30 18:36:56 fetching corpus: 448, signal 65546/74242 (executing program) 2023/03/30 18:36:57 fetching corpus: 498, signal 67491/76632 (executing program) 2023/03/30 18:36:57 fetching corpus: 548, signal 70542/79884 (executing program) 2023/03/30 18:36:57 fetching corpus: 594, signal 73787/83205 (executing program) 2023/03/30 18:36:57 fetching corpus: 644, signal 75800/85461 (executing program) 2023/03/30 18:36:57 fetching corpus: 692, signal 77396/87341 (executing program) 2023/03/30 18:36:58 fetching corpus: 741, signal 81427/90885 (executing program) 2023/03/30 18:36:58 fetching corpus: 791, signal 84677/93738 (executing program) 2023/03/30 18:36:58 fetching corpus: 840, signal 87463/96177 (executing program) 2023/03/30 18:36:58 fetching corpus: 887, signal 88965/97658 (executing program) 2023/03/30 18:36:58 fetching corpus: 937, signal 90466/99088 (executing program) 2023/03/30 18:36:59 fetching corpus: 986, signal 92166/100558 (executing program) 2023/03/30 18:36:59 fetching corpus: 1033, signal 93766/101965 (executing program) 2023/03/30 18:36:59 fetching corpus: 1079, signal 95480/103370 (executing program) 2023/03/30 18:36:59 fetching corpus: 1125, signal 96638/104438 (executing program) 2023/03/30 18:36:59 fetching corpus: 1174, signal 98098/105566 (executing program) 2023/03/30 18:37:00 fetching corpus: 1223, signal 99456/106649 (executing program) 2023/03/30 18:37:00 fetching corpus: 1270, signal 100806/107654 (executing program) 2023/03/30 18:37:00 fetching corpus: 1319, signal 102655/108937 (executing program) 2023/03/30 18:37:00 fetching corpus: 1368, signal 104607/110102 (executing program) 2023/03/30 18:37:00 fetching corpus: 1418, signal 105754/110856 (executing program) 2023/03/30 18:37:01 fetching corpus: 1468, signal 107078/111634 (executing program) 2023/03/30 18:37:01 fetching corpus: 1518, signal 108676/112496 (executing program) 2023/03/30 18:37:01 fetching corpus: 1568, signal 110501/113544 (executing program) 2023/03/30 18:37:02 fetching corpus: 1613, signal 112056/114277 (executing program) 2023/03/30 18:37:02 fetching corpus: 1660, signal 113004/114778 (executing program) 2023/03/30 18:37:02 fetching corpus: 1669, signal 113330/114962 (executing program) 2023/03/30 18:37:02 fetching corpus: 1669, signal 113330/114997 (executing program) 2023/03/30 18:37:02 fetching corpus: 1669, signal 113330/115050 (executing program) 2023/03/30 18:37:02 fetching corpus: 1669, signal 113330/115103 (executing program) 2023/03/30 18:37:02 fetching corpus: 1669, signal 113330/115158 (executing program) 2023/03/30 18:37:02 fetching corpus: 1669, signal 113330/115217 (executing program) 2023/03/30 18:37:02 fetching corpus: 1669, signal 113330/115258 (executing program) 2023/03/30 18:37:02 fetching corpus: 1669, signal 113330/115311 (executing program) 2023/03/30 18:37:02 fetching corpus: 1669, signal 113330/115361 (executing program) 2023/03/30 18:37:02 fetching corpus: 1669, signal 113330/115410 (executing program) 2023/03/30 18:37:02 fetching corpus: 1669, signal 113330/115460 (executing program) 2023/03/30 18:37:02 fetching corpus: 1669, signal 113330/115510 (executing program) 2023/03/30 18:37:02 fetching corpus: 1669, signal 113330/115558 (executing program) 2023/03/30 18:37:02 fetching corpus: 1669, signal 113330/115610 (executing program) 2023/03/30 18:37:02 fetching corpus: 1669, signal 113330/115658 (executing program) 2023/03/30 18:37:02 fetching corpus: 1669, signal 113330/115710 (executing program) 2023/03/30 18:37:02 fetching corpus: 1669, signal 113330/115760 (executing program) 2023/03/30 18:37:02 fetching corpus: 1669, signal 113330/115805 (executing program) 2023/03/30 18:37:02 fetching corpus: 1669, signal 113330/115842 (executing program) 2023/03/30 18:37:02 fetching corpus: 1669, signal 113330/115887 (executing program) 2023/03/30 18:37:02 fetching corpus: 1669, signal 113330/115932 (executing program) 2023/03/30 18:37:02 fetching corpus: 1669, signal 113330/115977 (executing program) 2023/03/30 18:37:02 fetching corpus: 1669, signal 113330/116012 (executing program) 2023/03/30 18:37:02 fetching corpus: 1669, signal 113330/116014 (executing program) 2023/03/30 18:37:02 fetching corpus: 1669, signal 113330/116014 (executing program) 2023/03/30 18:37:05 starting 6 fuzzer processes 18:37:05 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000f00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='kfree\x00', r0}, 0x10) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x200000005c831, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x7}, &(0x7f0000000300)) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x200000005c831, 0xffffffffffffffff, 0x0) 18:37:05 executing program 5: mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4082830, 0xffffffffffffffff, 0x8000000) 18:37:05 executing program 2: syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x40, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRES16], 0x40, 0x19d, &(0x7f0000000340)="$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") rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000300)='./file1\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000180)='./bus\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f00000001c0)='./file0\x00', r1, &(0x7f0000000200)='./bus/file0\x00', 0x0) mkdirat(r1, &(0x7f0000000100)='./file0\x00', 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r2, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000200)='./bus/file0\x00', 0x0) 18:37:05 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f00000002c0)=0x7, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000040)=0x7ff, 0x4) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x14e22, 0x0, @ipv4}, 0x1c) listen(r1, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000080)=[{&(0x7f0000000200)="a10100001500add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x1a1}], 0x1) [ 35.849742][ T3111] memfd_create() without MFD_EXEC nor MFD_NOEXEC_SEAL, pid=3111 'syz-fuzzer' 18:37:05 executing program 4: unshare(0x40400) r0 = syz_open_dev$evdev(&(0x7f00000025c0), 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ppoll(&(0x7f0000000000)=[{r1, 0x4200}, {r0}], 0x2, 0x0, 0x0, 0x0) 18:37:05 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000002100), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f0000000040)={{0x1, 0x1, 0xffffffffffffffd4}, './file0\x00'}) [ 35.960478][ T23] audit: type=1400 audit(1680201425.199:82): avc: denied { execmem } for pid=3119 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 36.067063][ T23] audit: type=1400 audit(1680201425.309:83): avc: denied { read } for pid=3128 comm="syz-executor.5" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 36.145937][ T23] audit: type=1400 audit(1680201425.309:84): avc: denied { open } for pid=3128 comm="syz-executor.5" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 36.169413][ T23] audit: type=1400 audit(1680201425.309:85): avc: denied { mounton } for pid=3128 comm="syz-executor.5" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 36.190917][ T23] audit: type=1400 audit(1680201425.309:86): avc: denied { module_request } for pid=3128 comm="syz-executor.5" kmod="netdev-nr5" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 36.212754][ T23] audit: type=1400 audit(1680201425.339:87): avc: denied { sys_module } for pid=3128 comm="syz-executor.5" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 36.467370][ T3128] chnl_net:caif_netlink_parms(): no params data found [ 36.536794][ T3130] chnl_net:caif_netlink_parms(): no params data found [ 36.599181][ T3129] chnl_net:caif_netlink_parms(): no params data found [ 36.611463][ T3128] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.618863][ T3128] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.626010][ T3128] bridge_slave_0: entered allmulticast mode [ 36.632572][ T3128] bridge_slave_0: entered promiscuous mode [ 36.643480][ T3128] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.650775][ T3128] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.657986][ T3128] bridge_slave_1: entered allmulticast mode [ 36.664439][ T3128] bridge_slave_1: entered promiscuous mode [ 36.685846][ T3128] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 36.722210][ T3128] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 36.741311][ T3130] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.748504][ T3130] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.755602][ T3130] bridge_slave_0: entered allmulticast mode [ 36.761954][ T3130] bridge_slave_0: entered promiscuous mode [ 36.784910][ T3130] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.791994][ T3130] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.799185][ T3130] bridge_slave_1: entered allmulticast mode [ 36.805583][ T3130] bridge_slave_1: entered promiscuous mode [ 36.825894][ T3128] team0: Port device team_slave_0 added [ 36.856747][ T3131] chnl_net:caif_netlink_parms(): no params data found [ 36.865707][ T3128] team0: Port device team_slave_1 added [ 36.875047][ T3130] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 36.886022][ T3129] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.893285][ T3129] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.900580][ T3129] bridge_slave_0: entered allmulticast mode [ 36.906954][ T3129] bridge_slave_0: entered promiscuous mode [ 36.915857][ T3129] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.923015][ T3129] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.930247][ T3129] bridge_slave_1: entered allmulticast mode [ 36.936616][ T3129] bridge_slave_1: entered promiscuous mode [ 36.950752][ T3139] chnl_net:caif_netlink_parms(): no params data found [ 36.960042][ T3130] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 36.988528][ T3128] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 36.995528][ T3128] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 37.021509][ T3128] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 37.035391][ T3128] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 37.042450][ T3128] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 37.068362][ T3128] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 37.110966][ T3130] team0: Port device team_slave_0 added [ 37.117960][ T3129] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 37.141943][ T3130] team0: Port device team_slave_1 added [ 37.148881][ T3129] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 37.178496][ T3143] chnl_net:caif_netlink_parms(): no params data found [ 37.205044][ T3131] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.212189][ T3131] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.219507][ T3131] bridge_slave_0: entered allmulticast mode [ 37.225947][ T3131] bridge_slave_0: entered promiscuous mode [ 37.241123][ T3130] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 37.248142][ T3130] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 37.274192][ T3130] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 37.294454][ T3139] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.301711][ T3139] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.308841][ T3139] bridge_slave_0: entered allmulticast mode [ 37.315134][ T3139] bridge_slave_0: entered promiscuous mode [ 37.321720][ T3131] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.328881][ T3131] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.336434][ T3131] bridge_slave_1: entered allmulticast mode [ 37.342875][ T3131] bridge_slave_1: entered promiscuous mode [ 37.356503][ T3130] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 37.363510][ T3130] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 37.389466][ T3130] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 37.400853][ T3129] team0: Port device team_slave_0 added [ 37.407346][ T3129] team0: Port device team_slave_1 added [ 37.415101][ T3128] hsr_slave_0: entered promiscuous mode [ 37.421328][ T3128] hsr_slave_1: entered promiscuous mode [ 37.427296][ T3139] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.434395][ T3139] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.441614][ T3139] bridge_slave_1: entered allmulticast mode [ 37.447908][ T3139] bridge_slave_1: entered promiscuous mode [ 37.502535][ T3131] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 37.521528][ T3129] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 37.528502][ T3129] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 37.554713][ T3129] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 37.566548][ T3139] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 37.584875][ T3131] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 37.597113][ T3130] hsr_slave_0: entered promiscuous mode [ 37.603108][ T3130] hsr_slave_1: entered promiscuous mode [ 37.608999][ T3130] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 37.616588][ T3130] Cannot create hsr debugfs directory [ 37.622300][ T3129] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 37.629299][ T3129] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 37.655218][ T3129] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 37.667167][ T3139] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 37.676292][ T3143] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.683394][ T3143] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.690603][ T3143] bridge_slave_0: entered allmulticast mode [ 37.697063][ T3143] bridge_slave_0: entered promiscuous mode [ 37.725509][ T3143] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.732729][ T3143] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.740030][ T3143] bridge_slave_1: entered allmulticast mode [ 37.746403][ T3143] bridge_slave_1: entered promiscuous mode [ 37.762488][ T3131] team0: Port device team_slave_0 added [ 37.771222][ T3131] team0: Port device team_slave_1 added [ 37.788445][ T3143] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 37.805236][ T3139] team0: Port device team_slave_0 added [ 37.822059][ T3143] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 37.841820][ T3139] team0: Port device team_slave_1 added [ 37.849388][ T3129] hsr_slave_0: entered promiscuous mode [ 37.855350][ T3129] hsr_slave_1: entered promiscuous mode [ 37.861765][ T3129] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 37.869446][ T3129] Cannot create hsr debugfs directory [ 37.884119][ T3131] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 37.891117][ T3131] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 37.917118][ T3131] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 37.946093][ T3131] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 37.953160][ T3131] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 37.979147][ T3131] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 37.990339][ T3139] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 37.997412][ T3139] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 38.023463][ T3139] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 38.034967][ T3143] team0: Port device team_slave_0 added [ 38.052812][ T3139] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 38.059870][ T3139] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 38.085818][ T3139] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 38.097138][ T3143] team0: Port device team_slave_1 added [ 38.157595][ T3143] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 38.164624][ T3143] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 38.190654][ T3143] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 38.203513][ T3131] hsr_slave_0: entered promiscuous mode [ 38.210536][ T3131] hsr_slave_1: entered promiscuous mode [ 38.216370][ T3131] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 38.224010][ T3131] Cannot create hsr debugfs directory [ 38.240134][ T3139] hsr_slave_0: entered promiscuous mode [ 38.246090][ T3139] hsr_slave_1: entered promiscuous mode [ 38.252206][ T3139] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 38.259843][ T3139] Cannot create hsr debugfs directory [ 38.268316][ T3143] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 38.275293][ T3143] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 38.301336][ T3143] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 38.360228][ T3130] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 38.376194][ T3143] hsr_slave_0: entered promiscuous mode [ 38.382385][ T3143] hsr_slave_1: entered promiscuous mode [ 38.388393][ T3143] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 38.395953][ T3143] Cannot create hsr debugfs directory [ 38.408167][ T3130] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 38.419599][ T3130] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 38.428406][ T3130] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 38.451794][ T3128] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 38.460813][ T3128] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 38.487168][ T3128] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 38.514667][ T3128] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 38.567037][ T3129] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 38.578507][ T3129] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 38.587336][ T3129] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 38.596813][ T3129] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 38.621962][ T3131] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 38.645747][ T3131] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 38.657943][ T3139] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 38.668795][ T3139] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 38.677747][ T3139] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 38.686391][ T3139] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 38.695012][ T3131] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 38.706621][ T3131] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 38.716820][ T3130] 8021q: adding VLAN 0 to HW filter on device bond0 [ 38.726468][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 38.734262][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 38.785666][ T3130] 8021q: adding VLAN 0 to HW filter on device team0 [ 38.798331][ T3143] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 38.807548][ T3143] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 38.821336][ T3128] 8021q: adding VLAN 0 to HW filter on device bond0 [ 38.829104][ T3143] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 38.838397][ T3143] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 38.856830][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 38.865430][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 38.875733][ T35] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.882918][ T35] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.890991][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 38.899571][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 38.908006][ T35] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.908206][ T23] audit: type=1400 audit(1680201428.149:88): avc: denied { remove_name } for pid=2726 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 38.915080][ T35] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.937528][ T23] audit: type=1400 audit(1680201428.149:89): avc: denied { rename } for pid=2726 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 38.945417][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 38.975720][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 38.984814][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 39.017619][ T3128] 8021q: adding VLAN 0 to HW filter on device team0 [ 39.024956][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 39.033719][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 39.042614][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 39.051324][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 39.060099][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 39.068462][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 39.077059][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 39.084549][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 39.095363][ T3129] 8021q: adding VLAN 0 to HW filter on device bond0 [ 39.115474][ T3130] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 39.127280][ T3130] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 39.135033][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 39.143932][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 39.152294][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 39.170103][ T3139] 8021q: adding VLAN 0 to HW filter on device bond0 [ 39.186726][ T3225] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 39.195169][ T3225] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 39.203837][ T3225] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.210899][ T3225] bridge0: port 1(bridge_slave_0) entered forwarding state [ 39.219090][ T3225] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 39.227759][ T3225] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 39.235985][ T3225] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.243041][ T3225] bridge0: port 2(bridge_slave_1) entered forwarding state [ 39.250912][ T3225] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 39.259862][ T3225] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 39.269406][ T3225] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 39.280594][ T3131] 8021q: adding VLAN 0 to HW filter on device bond0 [ 39.292239][ T3129] 8021q: adding VLAN 0 to HW filter on device team0 [ 39.304614][ T3139] 8021q: adding VLAN 0 to HW filter on device team0 [ 39.315866][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 39.324175][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 39.333959][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 39.342674][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 39.351813][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 39.359669][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 39.367391][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 39.375900][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 39.384557][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 39.392308][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 39.404792][ T3128] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 39.415175][ T3128] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 39.432360][ T3131] 8021q: adding VLAN 0 to HW filter on device team0 [ 39.440287][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 39.450477][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 39.466920][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 39.475407][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 39.484144][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 39.492652][ T35] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.499777][ T35] bridge0: port 1(bridge_slave_0) entered forwarding state [ 39.507590][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 39.515831][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 39.524146][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 39.532709][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 39.541145][ T35] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.548217][ T35] bridge0: port 2(bridge_slave_1) entered forwarding state [ 39.556175][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 39.564732][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 39.573160][ T35] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.580341][ T35] bridge0: port 1(bridge_slave_0) entered forwarding state [ 39.588836][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 39.596383][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 39.604391][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 39.618395][ T3226] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 39.636103][ T3130] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 39.654053][ T3129] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 39.664530][ T3129] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 39.686474][ T3228] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 39.695075][ T3228] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 39.704044][ T3228] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.711130][ T3228] bridge0: port 1(bridge_slave_0) entered forwarding state [ 39.719284][ T3228] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 39.727841][ T3228] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 39.736169][ T3228] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.743288][ T3228] bridge0: port 2(bridge_slave_1) entered forwarding state [ 39.751069][ T3228] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 39.758609][ T3228] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 39.766015][ T3228] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 39.774991][ T3228] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 39.783755][ T3228] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 39.792119][ T3228] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 39.800700][ T3228] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 39.809272][ T3228] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 39.817619][ T3228] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.824726][ T3228] bridge0: port 2(bridge_slave_1) entered forwarding state [ 39.832570][ T3228] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 39.841457][ T3228] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 39.850348][ T3228] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 39.858802][ T3228] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 39.867808][ T3228] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 39.876235][ T3228] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 39.884992][ T3228] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 39.893195][ T3228] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 39.901644][ T3228] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 39.909943][ T3228] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 39.918086][ T3228] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 39.926647][ T3228] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 39.935250][ T3228] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 39.943662][ T3228] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 39.962863][ T3128] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 39.978670][ T3143] 8021q: adding VLAN 0 to HW filter on device bond0 [ 39.988920][ T3131] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 40.011176][ T3131] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 40.025036][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 40.033117][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 40.041217][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 40.049505][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 40.057124][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 40.065805][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 40.074295][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 40.083105][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 40.090692][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 40.098097][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 40.106543][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 40.114679][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 40.123479][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 40.144593][ T3129] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 40.164210][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 40.173011][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 40.181635][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 40.190329][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 40.198705][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 40.207588][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 40.215871][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 40.224087][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 40.231560][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 40.239028][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 40.246741][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 40.255264][ T3143] 8021q: adding VLAN 0 to HW filter on device team0 [ 40.265938][ T3139] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 40.286568][ T3230] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 40.295173][ T3230] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 40.304279][ T3230] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.311424][ T3230] bridge0: port 1(bridge_slave_0) entered forwarding state [ 40.329927][ T3230] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 40.339304][ T3230] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 40.348075][ T3230] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.355131][ T3230] bridge0: port 2(bridge_slave_1) entered forwarding state [ 40.362989][ T3230] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 40.371830][ T3230] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 40.382990][ T3230] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 40.390941][ T3230] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 40.399831][ T3230] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 40.415882][ T3143] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 40.426289][ T3143] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 40.446543][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 40.455075][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 40.473845][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 40.492789][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 40.501479][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 40.509899][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 40.518411][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 40.526883][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 40.535251][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 40.544122][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 40.552952][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 40.561028][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 40.575123][ T3130] veth0_vlan: entered promiscuous mode [ 40.585295][ T3130] veth1_vlan: entered promiscuous mode [ 40.597854][ T3226] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 40.615300][ T3226] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 40.624919][ T3226] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 40.636425][ T3226] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 40.644068][ T3226] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 40.651702][ T3226] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 40.659245][ T3226] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 40.668093][ T3131] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 40.680510][ T3139] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 40.698241][ T3226] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 40.706085][ T3226] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 40.728885][ T3130] veth0_macvtap: entered promiscuous mode [ 40.745835][ T3130] veth1_macvtap: entered promiscuous mode [ 40.752547][ T3129] veth0_vlan: entered promiscuous mode [ 40.758657][ T3226] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 40.767053][ T3226] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 40.775407][ T3226] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 40.784123][ T3226] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 40.792682][ T3226] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 40.805706][ T3143] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 40.820714][ T3128] veth0_vlan: entered promiscuous mode [ 40.841029][ T3129] veth1_vlan: entered promiscuous mode [ 40.847730][ T3226] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 40.855607][ T3226] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 40.863611][ T3226] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 40.871547][ T3226] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 40.879700][ T3226] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 40.887252][ T3226] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 40.894618][ T3226] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 40.902964][ T3226] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 40.911548][ T3226] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 40.920347][ T3226] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 40.928987][ T3226] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 40.936837][ T3226] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 40.951685][ T3130] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 40.959998][ T3226] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 40.968842][ T3226] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 40.977749][ T3226] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 40.986306][ T3226] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 41.002377][ T3129] veth0_macvtap: entered promiscuous mode [ 41.012319][ T3128] veth1_vlan: entered promiscuous mode [ 41.025754][ T3130] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 41.034697][ T3228] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 41.043062][ T3228] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 41.052859][ T3228] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 41.061303][ T3228] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 41.070835][ T3228] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 41.079278][ T3228] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 41.088984][ T3228] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 41.097822][ T3228] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 41.107559][ T3228] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 41.116289][ T3228] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 41.125607][ T3129] veth1_macvtap: entered promiscuous mode [ 41.141767][ T3225] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 41.157132][ T3225] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 41.165847][ T3225] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 41.177345][ T3130] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.186063][ T3130] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.194893][ T3130] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.203668][ T3130] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.215495][ T3128] veth0_macvtap: entered promiscuous mode [ 41.224084][ T3128] veth1_macvtap: entered promiscuous mode [ 41.251718][ T3129] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 41.262400][ T3129] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 41.273721][ T3129] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 41.295170][ T3226] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 41.304570][ T3226] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 41.312645][ T3226] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 41.321587][ T3226] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 41.330204][ T3226] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 41.338572][ T3226] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 41.347100][ T3226] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 41.355341][ T3226] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 41.364356][ T3131] veth0_vlan: entered promiscuous mode [ 41.371052][ T3226] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 41.378889][ T3226] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 41.386787][ T3226] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 41.394438][ T3226] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 41.404746][ T3128] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 41.415220][ T3128] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 41.425118][ T3128] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 41.435553][ T3128] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 41.446690][ T3128] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 41.456266][ T3128] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 41.466828][ T3128] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 41.478560][ T3128] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 41.491264][ T3128] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.500061][ T3128] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.508806][ T3128] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.517602][ T3128] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.528102][ T3143] veth0_vlan: entered promiscuous mode [ 41.536197][ T3143] veth1_vlan: entered promiscuous mode [ 41.542917][ T3129] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 41.553377][ T3129] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 41.563259][ T3129] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 41.573775][ T3129] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 41.584841][ T3129] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 41.594895][ T3131] veth1_vlan: entered promiscuous mode [ 41.601112][ T3226] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 41.610312][ T3226] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 41.618561][ T3226] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 41.627217][ T3226] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 41.635779][ T3226] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 41.644362][ T3226] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 41.653082][ T3226] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 41.661554][ T3226] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 41.671900][ T23] audit: type=1400 audit(1680201430.909:90): avc: denied { mounton } for pid=3130 comm="syz-executor.1" path="/dev/binderfs" dev="devtmpfs" ino=450 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 41.674678][ T3139] veth0_vlan: entered promiscuous mode [ 41.720405][ T3129] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.729287][ T3129] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.738025][ T3129] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.746856][ T3129] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 18:37:11 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000002100), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f0000000040)={{0x1, 0x1, 0xffffffffffffffd4}, './file0\x00'}) 18:37:11 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000002100), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f0000000040)={{0x1, 0x1, 0xffffffffffffffd4}, './file0\x00'}) [ 41.755205][ T23] audit: type=1400 audit(1680201430.979:91): avc: denied { read write } for pid=3130 comm="syz-executor.1" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 41.779951][ T23] audit: type=1400 audit(1680201430.979:92): avc: denied { open } for pid=3130 comm="syz-executor.1" path="/dev/loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 18:37:11 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000002100), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f0000000040)={{0x1, 0x1, 0xffffffffffffffd4}, './file0\x00'}) [ 41.804228][ T23] audit: type=1400 audit(1680201430.979:93): avc: denied { ioctl } for pid=3130 comm="syz-executor.1" path="/dev/loop1" dev="devtmpfs" ino=101 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 41.829886][ T23] audit: type=1400 audit(1680201430.989:94): avc: denied { read } for pid=3305 comm="syz-executor.1" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 18:37:11 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000002100), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f0000000040)={{0x1, 0x1, 0xffffffffffffffd4}, './file0\x00'}) [ 41.853267][ T23] audit: type=1400 audit(1680201430.989:95): avc: denied { open } for pid=3305 comm="syz-executor.1" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 41.877038][ T23] audit: type=1400 audit(1680201430.989:96): avc: denied { ioctl } for pid=3305 comm="syz-executor.1" path="/dev/autofs" dev="devtmpfs" ino=91 ioctlcmd=0x9375 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 41.909449][ T3228] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready 18:37:11 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000002100), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f0000000040)={{0x1, 0x1, 0xffffffffffffffd4}, './file0\x00'}) [ 41.917851][ T3228] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready 18:37:11 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000002100), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f0000000040)={{0x1, 0x1, 0xffffffffffffffd4}, './file0\x00'}) [ 41.947015][ T3139] veth1_vlan: entered promiscuous mode [ 41.966913][ T3227] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 41.974685][ T3227] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 41.994067][ T3227] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 42.002512][ T3227] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 42.019129][ T3143] veth0_macvtap: entered promiscuous mode [ 42.032494][ T3131] veth0_macvtap: entered promiscuous mode [ 42.041768][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 42.051880][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 42.060363][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 42.068893][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 42.078736][ T3143] veth1_macvtap: entered promiscuous mode [ 42.093239][ T3317] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 42.103836][ T3317] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 42.111971][ T3317] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 42.120241][ T3317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 42.129070][ T3317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 42.149368][ T3139] veth0_macvtap: entered promiscuous mode [ 42.156796][ T3131] veth1_macvtap: entered promiscuous mode [ 42.166640][ T3143] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 42.177244][ T3143] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 42.181384][ T23] audit: type=1400 audit(1680201431.419:97): avc: denied { bpf } for pid=3326 comm="syz-executor.0" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 42.187079][ T3143] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 42.187097][ T3143] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 42.187108][ T3143] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 42.187189][ T3143] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 18:37:11 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000f00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='kfree\x00', r0}, 0x10) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x200000005c831, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x7}, &(0x7f0000000300)) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x200000005c831, 0xffffffffffffffff, 0x0) 18:37:11 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x24}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x27) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000000c0)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_clsact={0xb}]}, 0x30}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000240)=@newqdisc={0x24, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {0x0, 0xffff}, {0x0, 0xffff}}}, 0x24}}, 0x0) [ 42.189222][ T3143] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 42.208015][ T23] audit: type=1400 audit(1680201431.419:98): avc: denied { prog_load } for pid=3326 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 42.275054][ T23] audit: type=1400 audit(1680201431.419:99): avc: denied { perfmon } for pid=3326 comm="syz-executor.0" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 42.320250][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 42.328415][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 42.338956][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 42.348378][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 42.358519][ T3143] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 42.369031][ T3143] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 42.378898][ T3143] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 42.389347][ T3143] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 42.399196][ T3143] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 42.409630][ T3143] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 42.421139][ T3143] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 42.432210][ T3131] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 42.442792][ T3131] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 42.452634][ T3131] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 42.463108][ T3131] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 42.472950][ T3131] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 42.483400][ T3131] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 42.493231][ T3131] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 42.503808][ T3131] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 42.515187][ T3131] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 42.523497][ T3139] veth1_macvtap: entered promiscuous mode [ 42.531046][ T3331] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. [ 42.544248][ T3317] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 42.552378][ T3317] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 42.561051][ T3317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 42.570082][ T3317] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 42.579083][ T3317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 42.589950][ T3143] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 42.598779][ T3143] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 42.607514][ T3143] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 42.616602][ T3143] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 42.633760][ T3139] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 42.644311][ T3139] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 42.654135][ T3139] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 42.664627][ T3139] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 42.674516][ T3139] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 42.684992][ T3139] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 42.694903][ T3139] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 42.705365][ T3139] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 42.715203][ T3139] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 42.725720][ T3139] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 42.739130][ T3139] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 42.747325][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 42.755956][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 42.766273][ T3131] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 42.777001][ T3131] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 42.786881][ T3131] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 42.797338][ T3131] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 42.807159][ T3131] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 42.817687][ T3131] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 42.827527][ T3131] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 42.837973][ T3131] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 42.849234][ T3131] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 42.866435][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 42.875221][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 42.887805][ T3131] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 42.896662][ T3131] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 42.905394][ T3131] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 42.914237][ T3131] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 42.930933][ T3139] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 42.941488][ T3139] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 42.951330][ T3139] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 42.961789][ T3139] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 42.971620][ T3139] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 42.982241][ T3139] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 42.992058][ T3139] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 43.002500][ T3139] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 43.012341][ T3139] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 43.022840][ T3139] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 43.036631][ T3139] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 43.053214][ T3227] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 43.068118][ T3227] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 43.084699][ T3139] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 43.093693][ T3139] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 43.102485][ T3139] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 43.111301][ T3139] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 43.193678][ T3343] loop2: detected capacity change from 0 to 256 [ 43.212413][ T3343] ======================================================= [ 43.212413][ T3343] WARNING: The mand mount option has been deprecated and [ 43.212413][ T3343] and is ignored by this kernel. Remove the mand [ 43.212413][ T3343] option from the mount to silence this warning. 18:37:12 executing program 2: syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x40, &(0x7f0000000500)=ANY=[@ANYBLOB="00b9af0f57b23d8daad6176ea776bb74187b47646079b48e9dd9fde88d4197c740bf2007020000000000000000000000000000000000003beda0a51101db2a51cc785c853aa58087a7a031f06a20e4679840671e340000002000ca03cfdee821cbadf9497b0200000000000078ca00000000feffffff0000a2f09af834dc4f45e15b6ad69309b61c2da36e82ab00459db246b796f483dc9b93439749dd09211c4bf48278d9f8e20323f159ad076f75a8434627d4e9f99f08a607165b21768b1c4d5d54adc260fb2b016d243569eb76b5ddd746fac511b4cd90b867f7b74a97b057bad5809ec9a639b406912feb977e4adaddaf8aee843ac74ab261efcac136e18811a11a4c829e9fe530d7aee9a9d5af6281f517ea8008cdbff6e2f966f4537589bb5112daa0a27818b1fe41635a5c27a43bcff20ab5bc2a36c05a14c0a665b756cd4eeced16c4904d3f8c27", @ANYRES16], 0x40, 0x19d, &(0x7f0000000340)="$eJzs3U+LEnEYB/BHszJP3oLoMNClk1SvwAiDaCAoPNSpwLpoBXmZOvkeuvTKuge9gEVYEPbgsju7uisuLKzO+OfzufiFr8rzQ3BO88zHh1/7ve/DL//v/4l6vRLVdrRjUolmVOPcKACAXTKZTuNgmit7FgCgGK7/ALB/3r3/8Pp5mnbeJkk9YjzKulk3f837l6/SzpPkVHP+qXGWdW/N+qd5n1zub0fjrH+2tL8Tjx/l/Un34k260N+N3vqPDwAAAAAAAAAAAAAAAAAAAAAApWglM0v3+7RaV/V5urAfaGF/Ty0e1Ao7BgAAAAAAAAAAAAAAAAAAAGy14c9f/U+DwecfKw6/8/UBsfpvvmn4dxSxAWNsV7i3kT9lgeFvI2IDxigwlP3PBAAAAAAAAAAAAAAAAAAA+2d+0+/13n/4bd0TAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEDx5s//X18o+4wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADsvuMAAAD//6DnM7E=") rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000300)='./file1\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000180)='./bus\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f00000001c0)='./file0\x00', r1, &(0x7f0000000200)='./bus/file0\x00', 0x0) mkdirat(r1, &(0x7f0000000100)='./file0\x00', 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r2, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000200)='./bus/file0\x00', 0x0) 18:37:12 executing program 5: mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4082830, 0xffffffffffffffff, 0x8000000) 18:37:12 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000f00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='kfree\x00', r0}, 0x10) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x200000005c831, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x7}, &(0x7f0000000300)) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x200000005c831, 0xffffffffffffffff, 0x0) 18:37:12 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x24}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x27) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000000c0)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_clsact={0xb}]}, 0x30}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000240)=@newqdisc={0x24, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {0x0, 0xffff}, {0x0, 0xffff}}}, 0x24}}, 0x0) 18:37:12 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f00000002c0)=0x7, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000040)=0x7ff, 0x4) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x14e22, 0x0, @ipv4}, 0x1c) listen(r1, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000080)=[{&(0x7f0000000200)="a10100001500add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x1a1}], 0x1) 18:37:12 executing program 4: unshare(0x40400) r0 = syz_open_dev$evdev(&(0x7f00000025c0), 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ppoll(&(0x7f0000000000)=[{r1, 0x4200}, {r0}], 0x2, 0x0, 0x0, 0x0) [ 43.212413][ T3343] ======================================================= 18:37:12 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f00000002c0)=0x7, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000040)=0x7ff, 0x4) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x14e22, 0x0, @ipv4}, 0x1c) listen(r1, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000080)=[{&(0x7f0000000200)="a10100001500add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x1a1}], 0x1) 18:37:12 executing program 4: unshare(0x40400) r0 = syz_open_dev$evdev(&(0x7f00000025c0), 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ppoll(&(0x7f0000000000)=[{r1, 0x4200}, {r0}], 0x2, 0x0, 0x0, 0x0) 18:37:12 executing program 5: mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4082830, 0xffffffffffffffff, 0x8000000) 18:37:12 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000f00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='kfree\x00', r0}, 0x10) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x200000005c831, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x7}, &(0x7f0000000300)) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x200000005c831, 0xffffffffffffffff, 0x0) [ 43.278276][ T3349] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. 18:37:12 executing program 5: mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x4082830, 0xffffffffffffffff, 0x8000000) 18:37:12 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x24}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x27) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000000c0)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_clsact={0xb}]}, 0x30}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000240)=@newqdisc={0x24, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {0x0, 0xffff}, {0x0, 0xffff}}}, 0x24}}, 0x0) [ 43.360313][ T3360] loop2: detected capacity change from 0 to 256 18:37:12 executing program 2: syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x40, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRES16], 0x40, 0x19d, &(0x7f0000000340)="$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") rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000300)='./file1\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000180)='./bus\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f00000001c0)='./file0\x00', r1, &(0x7f0000000200)='./bus/file0\x00', 0x0) mkdirat(r1, &(0x7f0000000100)='./file0\x00', 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r2, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000200)='./bus/file0\x00', 0x0) 18:37:12 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f00000002c0)=0x7, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000040)=0x7ff, 0x4) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x14e22, 0x0, @ipv4}, 0x1c) listen(r1, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000080)=[{&(0x7f0000000200)="a10100001500add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x1a1}], 0x1) 18:37:12 executing program 4: unshare(0x40400) r0 = syz_open_dev$evdev(&(0x7f00000025c0), 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ppoll(&(0x7f0000000000)=[{r1, 0x4200}, {r0}], 0x2, 0x0, 0x0, 0x0) 18:37:12 executing program 5: syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x40, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRES16], 0x40, 0x19d, &(0x7f0000000340)="$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") rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000300)='./file1\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000180)='./bus\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f00000001c0)='./file0\x00', r1, &(0x7f0000000200)='./bus/file0\x00', 0x0) mkdirat(r1, &(0x7f0000000100)='./file0\x00', 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r2, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000200)='./bus/file0\x00', 0x0) 18:37:12 executing program 0: syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x40, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRES16], 0x40, 0x19d, &(0x7f0000000340)="$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") rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000300)='./file1\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000180)='./bus\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f00000001c0)='./file0\x00', r1, &(0x7f0000000200)='./bus/file0\x00', 0x0) mkdirat(r1, &(0x7f0000000100)='./file0\x00', 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r2, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000200)='./bus/file0\x00', 0x0) 18:37:12 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x24}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x27) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000000c0)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_clsact={0xb}]}, 0x30}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000240)=@newqdisc={0x24, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {0x0, 0xffff}, {0x0, 0xffff}}}, 0x24}}, 0x0) [ 43.401107][ T3366] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. [ 43.440165][ T3375] loop5: detected capacity change from 0 to 256 18:37:12 executing program 4: syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x40, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRES16], 0x40, 0x19d, &(0x7f0000000340)="$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") rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000300)='./file1\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000180)='./bus\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f00000001c0)='./file0\x00', r1, &(0x7f0000000200)='./bus/file0\x00', 0x0) mkdirat(r1, &(0x7f0000000100)='./file0\x00', 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r2, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000200)='./bus/file0\x00', 0x0) 18:37:12 executing program 3: syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x40, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRES16], 0x40, 0x19d, &(0x7f0000000340)="$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") rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000300)='./file1\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000180)='./bus\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f00000001c0)='./file0\x00', r1, &(0x7f0000000200)='./bus/file0\x00', 0x0) mkdirat(r1, &(0x7f0000000100)='./file0\x00', 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r2, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000200)='./bus/file0\x00', 0x0) [ 43.455342][ T3372] loop0: detected capacity change from 0 to 256 [ 43.464389][ T3378] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. [ 43.495014][ T3380] loop2: detected capacity change from 0 to 256 18:37:12 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f00000002c0)=0x7, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000040)=0x7ff, 0x4) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x14e22, 0x0, @ipv4}, 0x1c) listen(r1, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000080)=[{&(0x7f0000000200)="a10100001500add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x1a1}], 0x1) 18:37:12 executing program 0: syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x40, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRES16], 0x40, 0x19d, &(0x7f0000000340)="$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") rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000300)='./file1\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000180)='./bus\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f00000001c0)='./file0\x00', r1, &(0x7f0000000200)='./bus/file0\x00', 0x0) mkdirat(r1, &(0x7f0000000100)='./file0\x00', 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r2, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000200)='./bus/file0\x00', 0x0) 18:37:12 executing program 5: syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x40, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRES16], 0x40, 0x19d, &(0x7f0000000340)="$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") rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000300)='./file1\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000180)='./bus\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f00000001c0)='./file0\x00', r1, &(0x7f0000000200)='./bus/file0\x00', 0x0) mkdirat(r1, &(0x7f0000000100)='./file0\x00', 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r2, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000200)='./bus/file0\x00', 0x0) [ 43.503597][ T3384] loop3: detected capacity change from 0 to 256 [ 43.504458][ T3383] loop4: detected capacity change from 0 to 256 18:37:12 executing program 3: syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x40, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRES16], 0x40, 0x19d, &(0x7f0000000340)="$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") rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000300)='./file1\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000180)='./bus\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f00000001c0)='./file0\x00', r1, &(0x7f0000000200)='./bus/file0\x00', 0x0) mkdirat(r1, &(0x7f0000000100)='./file0\x00', 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r2, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000200)='./bus/file0\x00', 0x0) 18:37:12 executing program 2: syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x40, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRES16], 0x40, 0x19d, &(0x7f0000000340)="$eJzs3U+LEnEYB/BHszJP3oLoMNClk1SvwAiDaCAoPNSpwLpoBXmZOvkeuvTKuge9gEVYEPbgsju7uisuLKzO+OfzufiFr8rzQ3BO88zHh1/7ve/DL//v/4l6vRLVdrRjUolmVOPcKACAXTKZTuNgmit7FgCgGK7/ALB/3r3/8Pp5mnbeJkk9YjzKulk3f837l6/SzpPkVHP+qXGWdW/N+qd5n1zub0fjrH+2tL8Tjx/l/Un34k260N+N3vqPDwAAAAAAAAAAAAAAAAAAAAAApWglM0v3+7RaV/V5urAfaGF/Ty0e1Ao7BgAAAAAAAAAAAAAAAAAAAGy14c9f/U+DwecfKw6/8/UBsfpvvmn4dxSxAWNsV7i3kT9lgeFvI2IDxigwlP3PBAAAAAAAAAAAAAAAAAAA+2d+0+/13n/4bd0TAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEDx5s//X18o+4wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADsvuMAAAD//6DnM7E=") rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000300)='./file1\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000180)='./bus\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f00000001c0)='./file0\x00', r1, &(0x7f0000000200)='./bus/file0\x00', 0x0) mkdirat(r1, &(0x7f0000000100)='./file0\x00', 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r2, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000200)='./bus/file0\x00', 0x0) 18:37:12 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f00000002c0)=0x7, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000040)=0x7ff, 0x4) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x14e22, 0x0, @ipv4}, 0x1c) listen(r1, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000080)=[{&(0x7f0000000200)="a10100001500add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x1a1}], 0x1) 18:37:12 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f00000002c0)=0x7, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000040)=0x7ff, 0x4) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x14e22, 0x0, @ipv4}, 0x1c) listen(r1, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000080)=[{&(0x7f0000000200)="a10100001500add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x1a1}], 0x1) [ 43.609221][ T3390] loop5: detected capacity change from 0 to 256 [ 43.618805][ T3393] loop3: detected capacity change from 0 to 256 [ 43.624246][ T3222] I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 18:37:12 executing program 4: syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x40, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRES16], 0x40, 0x19d, &(0x7f0000000340)="$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") rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000300)='./file1\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000180)='./bus\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f00000001c0)='./file0\x00', r1, &(0x7f0000000200)='./bus/file0\x00', 0x0) mkdirat(r1, &(0x7f0000000100)='./file0\x00', 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r2, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000200)='./bus/file0\x00', 0x0) 18:37:12 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f00000002c0)=0x7, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000040)=0x7ff, 0x4) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x14e22, 0x0, @ipv4}, 0x1c) listen(r1, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000080)=[{&(0x7f0000000200)="a10100001500add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x1a1}], 0x1) 18:37:12 executing program 5: syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x40, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRES16], 0x40, 0x19d, &(0x7f0000000340)="$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") rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000300)='./file1\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000180)='./bus\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f00000001c0)='./file0\x00', r1, &(0x7f0000000200)='./bus/file0\x00', 0x0) mkdirat(r1, &(0x7f0000000100)='./file0\x00', 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r2, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000200)='./bus/file0\x00', 0x0) [ 43.649928][ T3394] loop0: detected capacity change from 0 to 256 [ 43.654819][ T3396] loop2: detected capacity change from 0 to 256 18:37:12 executing program 3: syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x40, &(0x7f0000000500)=ANY=[@ANYBLOB="00b9af0f57b23d8daad6176ea776bb74187b47646079b48e9dd9fde88d4197c740bf2007020000000000000000000000000000000000003beda0a51101db2a51cc785c853aa58087a7a031f06a20e4679840671e340000002000ca03cfdee821cbadf9497b0200000000000078ca00000000feffffff0000a2f09af834dc4f45e15b6ad69309b61c2da36e82ab00459db246b796f483dc9b93439749dd09211c4bf48278d9f8e20323f159ad076f75a8434627d4e9f99f08a607165b21768b1c4d5d54adc260fb2b016d243569eb76b5ddd746fac511b4cd90b867f7b74a97b057bad5809ec9a639b406912feb977e4adaddaf8aee843ac74ab261efcac136e18811a11a4c829e9fe530d7aee9a9d5af6281f517ea8008cdbff6e2f966f4537589bb5112daa0a27818b1fe41635a5c27a43bcff20ab5bc2a36c05a14c0a665b756cd4eeced16c4904d3f8c27", @ANYRES16], 0x40, 0x19d, &(0x7f0000000340)="$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") rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000300)='./file1\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000180)='./bus\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f00000001c0)='./file0\x00', r1, &(0x7f0000000200)='./bus/file0\x00', 0x0) mkdirat(r1, &(0x7f0000000100)='./file0\x00', 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r2, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000200)='./bus/file0\x00', 0x0) 18:37:12 executing program 0: syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x40, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRES16], 0x40, 0x19d, &(0x7f0000000340)="$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") rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000300)='./file1\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000180)='./bus\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f00000001c0)='./file0\x00', r1, &(0x7f0000000200)='./bus/file0\x00', 0x0) mkdirat(r1, &(0x7f0000000100)='./file0\x00', 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r2, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000200)='./bus/file0\x00', 0x0) 18:37:13 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x24}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x27) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000000c0)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_clsact={0xb}]}, 0x30}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000240)=@newqdisc={0x24, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {0x0, 0xffff}, {0x0, 0xffff}}}, 0x24}}, 0x0) 18:37:13 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f00000002c0)=0x7, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000040)=0x7ff, 0x4) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x14e22, 0x0, @ipv4}, 0x1c) listen(r1, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000080)=[{&(0x7f0000000200)="a10100001500add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x1a1}], 0x1) [ 43.735717][ T3402] loop4: detected capacity change from 0 to 256 18:37:13 executing program 4: syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x40, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRES16], 0x40, 0x19d, &(0x7f0000000340)="$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") rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000300)='./file1\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000180)='./bus\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f00000001c0)='./file0\x00', r1, &(0x7f0000000200)='./bus/file0\x00', 0x0) mkdirat(r1, &(0x7f0000000100)='./file0\x00', 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r2, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000200)='./bus/file0\x00', 0x0) [ 43.796071][ T3411] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 43.801549][ T3409] loop3: detected capacity change from 0 to 256 [ 43.813705][ T3408] loop5: detected capacity change from 0 to 256 [ 43.821549][ T3412] loop0: detected capacity change from 0 to 256 18:37:13 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f00000002c0)=0x7, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000040)=0x7ff, 0x4) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x14e22, 0x0, @ipv4}, 0x1c) listen(r1, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000080)=[{&(0x7f0000000200)="a10100001500add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x1a1}], 0x1) 18:37:13 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000f00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='kfree\x00', r0}, 0x10) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x200000005c831, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x7}, &(0x7f0000000300)) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x200000005c831, 0xffffffffffffffff, 0x0) 18:37:13 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000f00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='kfree\x00', r0}, 0x10) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x200000005c831, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x7}, &(0x7f0000000300)) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x200000005c831, 0xffffffffffffffff, 0x0) 18:37:13 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x24}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x27) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000000c0)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_clsact={0xb}]}, 0x30}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000240)=@newqdisc={0x24, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {0x0, 0xffff}, {0x0, 0xffff}}}, 0x24}}, 0x0) 18:37:13 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000f00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='kfree\x00', r0}, 0x10) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x200000005c831, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x7}, &(0x7f0000000300)) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x200000005c831, 0xffffffffffffffff, 0x0) [ 43.870494][ T3417] loop4: detected capacity change from 0 to 256 18:37:13 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x1, 0xff) syz_io_uring_setup(0x499b, &(0x7f0000000300)={0x0, 0x0, 0x2}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000380), &(0x7f00000003c0)) 18:37:13 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000f00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='kfree\x00', r0}, 0x10) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x200000005c831, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x7}, &(0x7f0000000300)) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x200000005c831, 0xffffffffffffffff, 0x0) 18:37:13 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000f00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='kfree\x00', r0}, 0x10) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x200000005c831, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x7}, &(0x7f0000000300)) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x200000005c831, 0xffffffffffffffff, 0x0) 18:37:13 executing program 4: r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x1) move_mount(r1, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x126) 18:37:13 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000f00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='kfree\x00', r0}, 0x10) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x200000005c831, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x7}, &(0x7f0000000300)) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x200000005c831, 0xffffffffffffffff, 0x0) 18:37:13 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x24}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x27) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000000c0)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_clsact={0xb}]}, 0x30}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000240)=@newqdisc={0x24, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {0x0, 0xffff}, {0x0, 0xffff}}}, 0x24}}, 0x0) 18:37:13 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000f00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='kfree\x00', r0}, 0x10) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x200000005c831, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x7}, &(0x7f0000000300)) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x200000005c831, 0xffffffffffffffff, 0x0) [ 43.963068][ T3425] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 18:37:13 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x1, 0xff) syz_io_uring_setup(0x499b, &(0x7f0000000300)={0x0, 0x0, 0x2}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000380), &(0x7f00000003c0)) 18:37:13 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000f00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='kfree\x00', r0}, 0x10) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x200000005c831, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x7}, &(0x7f0000000300)) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x200000005c831, 0xffffffffffffffff, 0x0) 18:37:13 executing program 4: r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x1) move_mount(r1, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x126) 18:37:13 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x1, 0xff) syz_io_uring_setup(0x499b, &(0x7f0000000300)={0x0, 0x0, 0x2}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000380), &(0x7f00000003c0)) [ 44.042026][ T3440] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 18:37:13 executing program 2: r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x1) move_mount(r1, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x126) 18:37:13 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000f00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='kfree\x00', r0}, 0x10) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x200000005c831, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x7}, &(0x7f0000000300)) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x200000005c831, 0xffffffffffffffff, 0x0) 18:37:13 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) flistxattr(r0, 0x0, 0x0) 18:37:13 executing program 4: r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x1) move_mount(r1, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x126) 18:37:13 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r2 = gettid() perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x80000001, 0x0, @perf_config_ext={0x4, 0xa1b}, 0x10092, 0x6, 0x9, 0x0, 0x0, 0x7fff, 0xac, 0x0, 0x0, 0x0, 0x1}, r2, 0xb, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1, 0x1, 0x20, 0x2, 0x0, 0x2, 0x60852, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x40, 0x2, 0x7, 0x7, 0x40, 0x8, 0x1f, 0x0, 0x5, 0x0, 0x8}, r2, 0x5, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0x43408) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xc}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) socketpair(0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000100)=ANY=[@ANYBLOB="a2edcb68b5111175f37538e486dd63176ba8b6b52c78fe80000000000003e3ffffffffffc201fe8000000000001fa8aaaafffeaaaaaa1a36"], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, 0x0, 0xfdef) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x1}, [@alu={0x7, 0x1, 0x3, 0x3, 0x1, 0xfffffffffffffff8, 0x10}]}, &(0x7f0000000300)='GPL\x00', 0x1, 0x9, &(0x7f0000000340)=""/9, 0x41100, 0x14, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000480)={0x4, 0x8, 0x3, 0x101}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[r5, r0]}, 0x80) bpf$ITER_CREATE(0x21, &(0x7f0000000380), 0x8) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="141f000000000000000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB='\x00\x00\x00\x00'], 0x18}, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000580)={r8}, 0x8) syz_open_procfs$namespace(0xffffffffffffffff, 0xffffffffffffffff) 18:37:13 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x1, 0xff) syz_io_uring_setup(0x499b, &(0x7f0000000300)={0x0, 0x0, 0x2}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000380), &(0x7f00000003c0)) 18:37:13 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) flistxattr(r0, 0x0, 0x0) 18:37:13 executing program 2: r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x1) move_mount(r1, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x126) 18:37:13 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmmsg(r0, &(0x7f0000006940)=[{{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000000)='I', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000004c0)='N', 0x1}], 0x1, &(0x7f0000000880)=[{0x10, 0x1, 0x1}], 0x10}}], 0x2, 0x0) 18:37:13 executing program 4: r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x1) move_mount(r1, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x126) 18:37:13 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) flistxattr(r0, 0x0, 0x0) 18:37:13 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000010c0)='map_files\x00') getdents64(r0, &(0x7f0000000080)=""/4096, 0x1000) fcntl$notify(r0, 0x402, 0x42) getdents64(r0, 0x0, 0xffb8) 18:37:13 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmmsg(r0, &(0x7f0000006940)=[{{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000000)='I', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000004c0)='N', 0x1}], 0x1, &(0x7f0000000880)=[{0x10, 0x1, 0x1}], 0x10}}], 0x2, 0x0) 18:37:13 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) sysfs$3(0x3) 18:37:13 executing program 2: r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x1) move_mount(r1, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x126) 18:37:13 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) flistxattr(r0, 0x0, 0x0) 18:37:14 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmmsg(r0, &(0x7f0000006940)=[{{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000000)='I', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000004c0)='N', 0x1}], 0x1, &(0x7f0000000880)=[{0x10, 0x1, 0x1}], 0x10}}], 0x2, 0x0) 18:37:14 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000010c0)='map_files\x00') getdents64(r0, &(0x7f0000000080)=""/4096, 0x1000) fcntl$notify(r0, 0x402, 0x42) getdents64(r0, 0x0, 0xffb8) 18:37:14 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) sysfs$3(0x3) 18:37:14 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000010c0)='map_files\x00') getdents64(r0, &(0x7f0000000080)=""/4096, 0x1000) fcntl$notify(r0, 0x402, 0x42) getdents64(r0, 0x0, 0xffb8) 18:37:14 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r2 = gettid() perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x80000001, 0x0, @perf_config_ext={0x4, 0xa1b}, 0x10092, 0x6, 0x9, 0x0, 0x0, 0x7fff, 0xac, 0x0, 0x0, 0x0, 0x1}, r2, 0xb, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1, 0x1, 0x20, 0x2, 0x0, 0x2, 0x60852, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x40, 0x2, 0x7, 0x7, 0x40, 0x8, 0x1f, 0x0, 0x5, 0x0, 0x8}, r2, 0x5, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0x43408) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xc}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) socketpair(0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000100)=ANY=[@ANYBLOB="a2edcb68b5111175f37538e486dd63176ba8b6b52c78fe80000000000003e3ffffffffffc201fe8000000000001fa8aaaafffeaaaaaa1a36"], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, 0x0, 0xfdef) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x1}, [@alu={0x7, 0x1, 0x3, 0x3, 0x1, 0xfffffffffffffff8, 0x10}]}, &(0x7f0000000300)='GPL\x00', 0x1, 0x9, &(0x7f0000000340)=""/9, 0x41100, 0x14, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000480)={0x4, 0x8, 0x3, 0x101}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[r5, r0]}, 0x80) bpf$ITER_CREATE(0x21, &(0x7f0000000380), 0x8) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="141f000000000000000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB='\x00\x00\x00\x00'], 0x18}, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000580)={r8}, 0x8) syz_open_procfs$namespace(0xffffffffffffffff, 0xffffffffffffffff) 18:37:14 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000010c0)='map_files\x00') getdents64(r0, &(0x7f0000000080)=""/4096, 0x1000) fcntl$notify(r0, 0x402, 0x42) getdents64(r0, 0x0, 0xffb8) 18:37:14 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) sysfs$3(0x3) 18:37:14 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000010c0)='map_files\x00') getdents64(r0, &(0x7f0000000080)=""/4096, 0x1000) fcntl$notify(r0, 0x402, 0x42) getdents64(r0, 0x0, 0xffb8) 18:37:14 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmmsg(r0, &(0x7f0000006940)=[{{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000000)='I', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000004c0)='N', 0x1}], 0x1, &(0x7f0000000880)=[{0x10, 0x1, 0x1}], 0x10}}], 0x2, 0x0) 18:37:14 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000010c0)='map_files\x00') getdents64(r0, &(0x7f0000000080)=""/4096, 0x1000) fcntl$notify(r0, 0x402, 0x42) getdents64(r0, 0x0, 0xffb8) 18:37:14 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000010c0)='map_files\x00') getdents64(r0, &(0x7f0000000080)=""/4096, 0x1000) fcntl$notify(r0, 0x402, 0x42) getdents64(r0, 0x0, 0xffb8) 18:37:14 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000010c0)='map_files\x00') getdents64(r0, &(0x7f0000000080)=""/4096, 0x1000) fcntl$notify(r0, 0x402, 0x42) getdents64(r0, 0x0, 0xffb8) 18:37:14 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) sysfs$3(0x3) 18:37:14 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000010c0)='map_files\x00') getdents64(r0, &(0x7f0000000080)=""/4096, 0x1000) fcntl$notify(r0, 0x402, 0x42) getdents64(r0, 0x0, 0xffb8) 18:37:14 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000010c0)='map_files\x00') getdents64(r0, &(0x7f0000000080)=""/4096, 0x1000) fcntl$notify(r0, 0x402, 0x42) getdents64(r0, 0x0, 0xffb8) 18:37:14 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r2 = gettid() perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x80000001, 0x0, @perf_config_ext={0x4, 0xa1b}, 0x10092, 0x6, 0x9, 0x0, 0x0, 0x7fff, 0xac, 0x0, 0x0, 0x0, 0x1}, r2, 0xb, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1, 0x1, 0x20, 0x2, 0x0, 0x2, 0x60852, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x40, 0x2, 0x7, 0x7, 0x40, 0x8, 0x1f, 0x0, 0x5, 0x0, 0x8}, r2, 0x5, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0x43408) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xc}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) socketpair(0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000100)=ANY=[@ANYBLOB="a2edcb68b5111175f37538e486dd63176ba8b6b52c78fe80000000000003e3ffffffffffc201fe8000000000001fa8aaaafffeaaaaaa1a36"], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, 0x0, 0xfdef) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x1}, [@alu={0x7, 0x1, 0x3, 0x3, 0x1, 0xfffffffffffffff8, 0x10}]}, &(0x7f0000000300)='GPL\x00', 0x1, 0x9, &(0x7f0000000340)=""/9, 0x41100, 0x14, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000480)={0x4, 0x8, 0x3, 0x101}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[r5, r0]}, 0x80) bpf$ITER_CREATE(0x21, &(0x7f0000000380), 0x8) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="141f000000000000000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB='\x00\x00\x00\x00'], 0x18}, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000580)={r8}, 0x8) syz_open_procfs$namespace(0xffffffffffffffff, 0xffffffffffffffff) [ 45.227413][ C1] hrtimer: interrupt took 36860 ns 18:37:15 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r2 = gettid() perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x80000001, 0x0, @perf_config_ext={0x4, 0xa1b}, 0x10092, 0x6, 0x9, 0x0, 0x0, 0x7fff, 0xac, 0x0, 0x0, 0x0, 0x1}, r2, 0xb, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1, 0x1, 0x20, 0x2, 0x0, 0x2, 0x60852, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x40, 0x2, 0x7, 0x7, 0x40, 0x8, 0x1f, 0x0, 0x5, 0x0, 0x8}, r2, 0x5, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0x43408) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xc}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) socketpair(0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000100)=ANY=[@ANYBLOB="a2edcb68b5111175f37538e486dd63176ba8b6b52c78fe80000000000003e3ffffffffffc201fe8000000000001fa8aaaafffeaaaaaa1a36"], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, 0x0, 0xfdef) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x1}, [@alu={0x7, 0x1, 0x3, 0x3, 0x1, 0xfffffffffffffff8, 0x10}]}, &(0x7f0000000300)='GPL\x00', 0x1, 0x9, &(0x7f0000000340)=""/9, 0x41100, 0x14, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000480)={0x4, 0x8, 0x3, 0x101}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[r5, r0]}, 0x80) bpf$ITER_CREATE(0x21, &(0x7f0000000380), 0x8) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="141f000000000000000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB='\x00\x00\x00\x00'], 0x18}, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000580)={r8}, 0x8) syz_open_procfs$namespace(0xffffffffffffffff, 0xffffffffffffffff) 18:37:15 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r2 = gettid() perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x80000001, 0x0, @perf_config_ext={0x4, 0xa1b}, 0x10092, 0x6, 0x9, 0x0, 0x0, 0x7fff, 0xac, 0x0, 0x0, 0x0, 0x1}, r2, 0xb, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1, 0x1, 0x20, 0x2, 0x0, 0x2, 0x60852, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x40, 0x2, 0x7, 0x7, 0x40, 0x8, 0x1f, 0x0, 0x5, 0x0, 0x8}, r2, 0x5, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0x43408) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xc}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) socketpair(0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000100)=ANY=[@ANYBLOB="a2edcb68b5111175f37538e486dd63176ba8b6b52c78fe80000000000003e3ffffffffffc201fe8000000000001fa8aaaafffeaaaaaa1a36"], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, 0x0, 0xfdef) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x1}, [@alu={0x7, 0x1, 0x3, 0x3, 0x1, 0xfffffffffffffff8, 0x10}]}, &(0x7f0000000300)='GPL\x00', 0x1, 0x9, &(0x7f0000000340)=""/9, 0x41100, 0x14, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000480)={0x4, 0x8, 0x3, 0x101}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[r5, r0]}, 0x80) bpf$ITER_CREATE(0x21, &(0x7f0000000380), 0x8) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="141f000000000000000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB='\x00\x00\x00\x00'], 0x18}, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000580)={r8}, 0x8) syz_open_procfs$namespace(0xffffffffffffffff, 0xffffffffffffffff) 18:37:15 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r2 = gettid() perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x80000001, 0x0, @perf_config_ext={0x4, 0xa1b}, 0x10092, 0x6, 0x9, 0x0, 0x0, 0x7fff, 0xac, 0x0, 0x0, 0x0, 0x1}, r2, 0xb, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1, 0x1, 0x20, 0x2, 0x0, 0x2, 0x60852, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x40, 0x2, 0x7, 0x7, 0x40, 0x8, 0x1f, 0x0, 0x5, 0x0, 0x8}, r2, 0x5, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0x43408) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xc}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) socketpair(0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000100)=ANY=[@ANYBLOB="a2edcb68b5111175f37538e486dd63176ba8b6b52c78fe80000000000003e3ffffffffffc201fe8000000000001fa8aaaafffeaaaaaa1a36"], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, 0x0, 0xfdef) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x1}, [@alu={0x7, 0x1, 0x3, 0x3, 0x1, 0xfffffffffffffff8, 0x10}]}, &(0x7f0000000300)='GPL\x00', 0x1, 0x9, &(0x7f0000000340)=""/9, 0x41100, 0x14, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000480)={0x4, 0x8, 0x3, 0x101}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[r5, r0]}, 0x80) bpf$ITER_CREATE(0x21, &(0x7f0000000380), 0x8) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="141f000000000000000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB='\x00\x00\x00\x00'], 0x18}, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000580)={r8}, 0x8) syz_open_procfs$namespace(0xffffffffffffffff, 0xffffffffffffffff) 18:37:15 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r2 = gettid() perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x80000001, 0x0, @perf_config_ext={0x4, 0xa1b}, 0x10092, 0x6, 0x9, 0x0, 0x0, 0x7fff, 0xac, 0x0, 0x0, 0x0, 0x1}, r2, 0xb, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1, 0x1, 0x20, 0x2, 0x0, 0x2, 0x60852, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x40, 0x2, 0x7, 0x7, 0x40, 0x8, 0x1f, 0x0, 0x5, 0x0, 0x8}, r2, 0x5, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0x43408) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xc}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) socketpair(0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000100)=ANY=[@ANYBLOB="a2edcb68b5111175f37538e486dd63176ba8b6b52c78fe80000000000003e3ffffffffffc201fe8000000000001fa8aaaafffeaaaaaa1a36"], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, 0x0, 0xfdef) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x1}, [@alu={0x7, 0x1, 0x3, 0x3, 0x1, 0xfffffffffffffff8, 0x10}]}, &(0x7f0000000300)='GPL\x00', 0x1, 0x9, &(0x7f0000000340)=""/9, 0x41100, 0x14, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000480)={0x4, 0x8, 0x3, 0x101}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[r5, r0]}, 0x80) bpf$ITER_CREATE(0x21, &(0x7f0000000380), 0x8) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="141f000000000000000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB='\x00\x00\x00\x00'], 0x18}, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000580)={r8}, 0x8) syz_open_procfs$namespace(0xffffffffffffffff, 0xffffffffffffffff) 18:37:15 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r2 = gettid() perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x80000001, 0x0, @perf_config_ext={0x4, 0xa1b}, 0x10092, 0x6, 0x9, 0x0, 0x0, 0x7fff, 0xac, 0x0, 0x0, 0x0, 0x1}, r2, 0xb, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1, 0x1, 0x20, 0x2, 0x0, 0x2, 0x60852, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x40, 0x2, 0x7, 0x7, 0x40, 0x8, 0x1f, 0x0, 0x5, 0x0, 0x8}, r2, 0x5, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0x43408) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xc}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) socketpair(0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000100)=ANY=[@ANYBLOB="a2edcb68b5111175f37538e486dd63176ba8b6b52c78fe80000000000003e3ffffffffffc201fe8000000000001fa8aaaafffeaaaaaa1a36"], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, 0x0, 0xfdef) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x1}, [@alu={0x7, 0x1, 0x3, 0x3, 0x1, 0xfffffffffffffff8, 0x10}]}, &(0x7f0000000300)='GPL\x00', 0x1, 0x9, &(0x7f0000000340)=""/9, 0x41100, 0x14, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000480)={0x4, 0x8, 0x3, 0x101}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[r5, r0]}, 0x80) bpf$ITER_CREATE(0x21, &(0x7f0000000380), 0x8) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="141f000000000000000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB='\x00\x00\x00\x00'], 0x18}, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000580)={r8}, 0x8) syz_open_procfs$namespace(0xffffffffffffffff, 0xffffffffffffffff) 18:37:15 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r2 = gettid() perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x80000001, 0x0, @perf_config_ext={0x4, 0xa1b}, 0x10092, 0x6, 0x9, 0x0, 0x0, 0x7fff, 0xac, 0x0, 0x0, 0x0, 0x1}, r2, 0xb, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1, 0x1, 0x20, 0x2, 0x0, 0x2, 0x60852, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x40, 0x2, 0x7, 0x7, 0x40, 0x8, 0x1f, 0x0, 0x5, 0x0, 0x8}, r2, 0x5, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0x43408) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xc}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) socketpair(0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000100)=ANY=[@ANYBLOB="a2edcb68b5111175f37538e486dd63176ba8b6b52c78fe80000000000003e3ffffffffffc201fe8000000000001fa8aaaafffeaaaaaa1a36"], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, 0x0, 0xfdef) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x1}, [@alu={0x7, 0x1, 0x3, 0x3, 0x1, 0xfffffffffffffff8, 0x10}]}, &(0x7f0000000300)='GPL\x00', 0x1, 0x9, &(0x7f0000000340)=""/9, 0x41100, 0x14, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000480)={0x4, 0x8, 0x3, 0x101}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[r5, r0]}, 0x80) bpf$ITER_CREATE(0x21, &(0x7f0000000380), 0x8) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="141f000000000000000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB='\x00\x00\x00\x00'], 0x18}, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000580)={r8}, 0x8) syz_open_procfs$namespace(0xffffffffffffffff, 0xffffffffffffffff) 18:37:16 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r2 = gettid() perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x80000001, 0x0, @perf_config_ext={0x4, 0xa1b}, 0x10092, 0x6, 0x9, 0x0, 0x0, 0x7fff, 0xac, 0x0, 0x0, 0x0, 0x1}, r2, 0xb, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1, 0x1, 0x20, 0x2, 0x0, 0x2, 0x60852, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x40, 0x2, 0x7, 0x7, 0x40, 0x8, 0x1f, 0x0, 0x5, 0x0, 0x8}, r2, 0x5, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0x43408) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xc}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) socketpair(0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000100)=ANY=[@ANYBLOB="a2edcb68b5111175f37538e486dd63176ba8b6b52c78fe80000000000003e3ffffffffffc201fe8000000000001fa8aaaafffeaaaaaa1a36"], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, 0x0, 0xfdef) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x1}, [@alu={0x7, 0x1, 0x3, 0x3, 0x1, 0xfffffffffffffff8, 0x10}]}, &(0x7f0000000300)='GPL\x00', 0x1, 0x9, &(0x7f0000000340)=""/9, 0x41100, 0x14, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000480)={0x4, 0x8, 0x3, 0x101}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[r5, r0]}, 0x80) bpf$ITER_CREATE(0x21, &(0x7f0000000380), 0x8) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="141f000000000000000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB='\x00\x00\x00\x00'], 0x18}, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000580)={r8}, 0x8) syz_open_procfs$namespace(0xffffffffffffffff, 0xffffffffffffffff) 18:37:16 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r2 = gettid() perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x80000001, 0x0, @perf_config_ext={0x4, 0xa1b}, 0x10092, 0x6, 0x9, 0x0, 0x0, 0x7fff, 0xac, 0x0, 0x0, 0x0, 0x1}, r2, 0xb, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1, 0x1, 0x20, 0x2, 0x0, 0x2, 0x60852, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x40, 0x2, 0x7, 0x7, 0x40, 0x8, 0x1f, 0x0, 0x5, 0x0, 0x8}, r2, 0x5, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0x43408) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xc}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) socketpair(0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000100)=ANY=[@ANYBLOB="a2edcb68b5111175f37538e486dd63176ba8b6b52c78fe80000000000003e3ffffffffffc201fe8000000000001fa8aaaafffeaaaaaa1a36"], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, 0x0, 0xfdef) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x1}, [@alu={0x7, 0x1, 0x3, 0x3, 0x1, 0xfffffffffffffff8, 0x10}]}, &(0x7f0000000300)='GPL\x00', 0x1, 0x9, &(0x7f0000000340)=""/9, 0x41100, 0x14, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000480)={0x4, 0x8, 0x3, 0x101}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[r5, r0]}, 0x80) bpf$ITER_CREATE(0x21, &(0x7f0000000380), 0x8) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="141f000000000000000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB='\x00\x00\x00\x00'], 0x18}, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000580)={r8}, 0x8) syz_open_procfs$namespace(0xffffffffffffffff, 0xffffffffffffffff) 18:37:16 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r2 = gettid() perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x80000001, 0x0, @perf_config_ext={0x4, 0xa1b}, 0x10092, 0x6, 0x9, 0x0, 0x0, 0x7fff, 0xac, 0x0, 0x0, 0x0, 0x1}, r2, 0xb, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1, 0x1, 0x20, 0x2, 0x0, 0x2, 0x60852, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x40, 0x2, 0x7, 0x7, 0x40, 0x8, 0x1f, 0x0, 0x5, 0x0, 0x8}, r2, 0x5, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0x43408) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xc}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) socketpair(0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000100)=ANY=[@ANYBLOB="a2edcb68b5111175f37538e486dd63176ba8b6b52c78fe80000000000003e3ffffffffffc201fe8000000000001fa8aaaafffeaaaaaa1a36"], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, 0x0, 0xfdef) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x1}, [@alu={0x7, 0x1, 0x3, 0x3, 0x1, 0xfffffffffffffff8, 0x10}]}, &(0x7f0000000300)='GPL\x00', 0x1, 0x9, &(0x7f0000000340)=""/9, 0x41100, 0x14, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000480)={0x4, 0x8, 0x3, 0x101}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[r5, r0]}, 0x80) bpf$ITER_CREATE(0x21, &(0x7f0000000380), 0x8) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="141f000000000000000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB='\x00\x00\x00\x00'], 0x18}, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000580)={r8}, 0x8) syz_open_procfs$namespace(0xffffffffffffffff, 0xffffffffffffffff) 18:37:16 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r2 = gettid() perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x80000001, 0x0, @perf_config_ext={0x4, 0xa1b}, 0x10092, 0x6, 0x9, 0x0, 0x0, 0x7fff, 0xac, 0x0, 0x0, 0x0, 0x1}, r2, 0xb, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1, 0x1, 0x20, 0x2, 0x0, 0x2, 0x60852, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x40, 0x2, 0x7, 0x7, 0x40, 0x8, 0x1f, 0x0, 0x5, 0x0, 0x8}, r2, 0x5, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0x43408) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xc}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) socketpair(0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000100)=ANY=[@ANYBLOB="a2edcb68b5111175f37538e486dd63176ba8b6b52c78fe80000000000003e3ffffffffffc201fe8000000000001fa8aaaafffeaaaaaa1a36"], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, 0x0, 0xfdef) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x1}, [@alu={0x7, 0x1, 0x3, 0x3, 0x1, 0xfffffffffffffff8, 0x10}]}, &(0x7f0000000300)='GPL\x00', 0x1, 0x9, &(0x7f0000000340)=""/9, 0x41100, 0x14, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000480)={0x4, 0x8, 0x3, 0x101}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[r5, r0]}, 0x80) bpf$ITER_CREATE(0x21, &(0x7f0000000380), 0x8) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="141f000000000000000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB='\x00\x00\x00\x00'], 0x18}, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000580)={r8}, 0x8) syz_open_procfs$namespace(0xffffffffffffffff, 0xffffffffffffffff) 18:37:16 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r2 = gettid() perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x80000001, 0x0, @perf_config_ext={0x4, 0xa1b}, 0x10092, 0x6, 0x9, 0x0, 0x0, 0x7fff, 0xac, 0x0, 0x0, 0x0, 0x1}, r2, 0xb, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1, 0x1, 0x20, 0x2, 0x0, 0x2, 0x60852, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x40, 0x2, 0x7, 0x7, 0x40, 0x8, 0x1f, 0x0, 0x5, 0x0, 0x8}, r2, 0x5, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0x43408) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xc}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) socketpair(0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000100)=ANY=[@ANYBLOB="a2edcb68b5111175f37538e486dd63176ba8b6b52c78fe80000000000003e3ffffffffffc201fe8000000000001fa8aaaafffeaaaaaa1a36"], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, 0x0, 0xfdef) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x1}, [@alu={0x7, 0x1, 0x3, 0x3, 0x1, 0xfffffffffffffff8, 0x10}]}, &(0x7f0000000300)='GPL\x00', 0x1, 0x9, &(0x7f0000000340)=""/9, 0x41100, 0x14, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000480)={0x4, 0x8, 0x3, 0x101}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[r5, r0]}, 0x80) bpf$ITER_CREATE(0x21, &(0x7f0000000380), 0x8) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="141f000000000000000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB='\x00\x00\x00\x00'], 0x18}, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000580)={r8}, 0x8) syz_open_procfs$namespace(0xffffffffffffffff, 0xffffffffffffffff) [ 46.749470][ T3530] syz-executor.2 (3530) used greatest stack depth: 11168 bytes left 18:37:16 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r2 = gettid() perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x80000001, 0x0, @perf_config_ext={0x4, 0xa1b}, 0x10092, 0x6, 0x9, 0x0, 0x0, 0x7fff, 0xac, 0x0, 0x0, 0x0, 0x1}, r2, 0xb, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1, 0x1, 0x20, 0x2, 0x0, 0x2, 0x60852, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x40, 0x2, 0x7, 0x7, 0x40, 0x8, 0x1f, 0x0, 0x5, 0x0, 0x8}, r2, 0x5, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0x43408) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xc}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) socketpair(0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000100)=ANY=[@ANYBLOB="a2edcb68b5111175f37538e486dd63176ba8b6b52c78fe80000000000003e3ffffffffffc201fe8000000000001fa8aaaafffeaaaaaa1a36"], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, 0x0, 0xfdef) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x1}, [@alu={0x7, 0x1, 0x3, 0x3, 0x1, 0xfffffffffffffff8, 0x10}]}, &(0x7f0000000300)='GPL\x00', 0x1, 0x9, &(0x7f0000000340)=""/9, 0x41100, 0x14, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000480)={0x4, 0x8, 0x3, 0x101}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[r5, r0]}, 0x80) bpf$ITER_CREATE(0x21, &(0x7f0000000380), 0x8) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="141f000000000000000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB='\x00\x00\x00\x00'], 0x18}, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000580)={r8}, 0x8) syz_open_procfs$namespace(0xffffffffffffffff, 0xffffffffffffffff) 18:37:16 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r2 = gettid() perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x80000001, 0x0, @perf_config_ext={0x4, 0xa1b}, 0x10092, 0x6, 0x9, 0x0, 0x0, 0x7fff, 0xac, 0x0, 0x0, 0x0, 0x1}, r2, 0xb, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1, 0x1, 0x20, 0x2, 0x0, 0x2, 0x60852, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x40, 0x2, 0x7, 0x7, 0x40, 0x8, 0x1f, 0x0, 0x5, 0x0, 0x8}, r2, 0x5, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0x43408) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xc}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) socketpair(0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000100)=ANY=[@ANYBLOB="a2edcb68b5111175f37538e486dd63176ba8b6b52c78fe80000000000003e3ffffffffffc201fe8000000000001fa8aaaafffeaaaaaa1a36"], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, 0x0, 0xfdef) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x1}, [@alu={0x7, 0x1, 0x3, 0x3, 0x1, 0xfffffffffffffff8, 0x10}]}, &(0x7f0000000300)='GPL\x00', 0x1, 0x9, &(0x7f0000000340)=""/9, 0x41100, 0x14, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000480)={0x4, 0x8, 0x3, 0x101}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[r5, r0]}, 0x80) bpf$ITER_CREATE(0x21, &(0x7f0000000380), 0x8) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="141f000000000000000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB='\x00\x00\x00\x00'], 0x18}, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000580)={r8}, 0x8) syz_open_procfs$namespace(0xffffffffffffffff, 0xffffffffffffffff) 18:37:16 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r2 = gettid() perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x80000001, 0x0, @perf_config_ext={0x4, 0xa1b}, 0x10092, 0x6, 0x9, 0x0, 0x0, 0x7fff, 0xac, 0x0, 0x0, 0x0, 0x1}, r2, 0xb, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1, 0x1, 0x20, 0x2, 0x0, 0x2, 0x60852, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x40, 0x2, 0x7, 0x7, 0x40, 0x8, 0x1f, 0x0, 0x5, 0x0, 0x8}, r2, 0x5, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0x43408) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xc}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) socketpair(0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000100)=ANY=[@ANYBLOB="a2edcb68b5111175f37538e486dd63176ba8b6b52c78fe80000000000003e3ffffffffffc201fe8000000000001fa8aaaafffeaaaaaa1a36"], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, 0x0, 0xfdef) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x1}, [@alu={0x7, 0x1, 0x3, 0x3, 0x1, 0xfffffffffffffff8, 0x10}]}, &(0x7f0000000300)='GPL\x00', 0x1, 0x9, &(0x7f0000000340)=""/9, 0x41100, 0x14, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000480)={0x4, 0x8, 0x3, 0x101}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[r5, r0]}, 0x80) bpf$ITER_CREATE(0x21, &(0x7f0000000380), 0x8) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="141f000000000000000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB='\x00\x00\x00\x00'], 0x18}, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000580)={r8}, 0x8) syz_open_procfs$namespace(0xffffffffffffffff, 0xffffffffffffffff) 18:37:16 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r2 = gettid() perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x80000001, 0x0, @perf_config_ext={0x4, 0xa1b}, 0x10092, 0x6, 0x9, 0x0, 0x0, 0x7fff, 0xac, 0x0, 0x0, 0x0, 0x1}, r2, 0xb, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1, 0x1, 0x20, 0x2, 0x0, 0x2, 0x60852, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x40, 0x2, 0x7, 0x7, 0x40, 0x8, 0x1f, 0x0, 0x5, 0x0, 0x8}, r2, 0x5, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0x43408) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xc}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) socketpair(0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000100)=ANY=[@ANYBLOB="a2edcb68b5111175f37538e486dd63176ba8b6b52c78fe80000000000003e3ffffffffffc201fe8000000000001fa8aaaafffeaaaaaa1a36"], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, 0x0, 0xfdef) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x1}, [@alu={0x7, 0x1, 0x3, 0x3, 0x1, 0xfffffffffffffff8, 0x10}]}, &(0x7f0000000300)='GPL\x00', 0x1, 0x9, &(0x7f0000000340)=""/9, 0x41100, 0x14, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000480)={0x4, 0x8, 0x3, 0x101}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[r5, r0]}, 0x80) bpf$ITER_CREATE(0x21, &(0x7f0000000380), 0x8) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="141f000000000000000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB='\x00\x00\x00\x00'], 0x18}, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000580)={r8}, 0x8) syz_open_procfs$namespace(0xffffffffffffffff, 0xffffffffffffffff) 18:37:16 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r2 = gettid() perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x80000001, 0x0, @perf_config_ext={0x4, 0xa1b}, 0x10092, 0x6, 0x9, 0x0, 0x0, 0x7fff, 0xac, 0x0, 0x0, 0x0, 0x1}, r2, 0xb, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1, 0x1, 0x20, 0x2, 0x0, 0x2, 0x60852, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x40, 0x2, 0x7, 0x7, 0x40, 0x8, 0x1f, 0x0, 0x5, 0x0, 0x8}, r2, 0x5, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0x43408) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xc}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) socketpair(0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000100)=ANY=[@ANYBLOB="a2edcb68b5111175f37538e486dd63176ba8b6b52c78fe80000000000003e3ffffffffffc201fe8000000000001fa8aaaafffeaaaaaa1a36"], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, 0x0, 0xfdef) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x1}, [@alu={0x7, 0x1, 0x3, 0x3, 0x1, 0xfffffffffffffff8, 0x10}]}, &(0x7f0000000300)='GPL\x00', 0x1, 0x9, &(0x7f0000000340)=""/9, 0x41100, 0x14, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000480)={0x4, 0x8, 0x3, 0x101}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[r5, r0]}, 0x80) bpf$ITER_CREATE(0x21, &(0x7f0000000380), 0x8) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="141f000000000000000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB='\x00\x00\x00\x00'], 0x18}, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000580)={r8}, 0x8) syz_open_procfs$namespace(0xffffffffffffffff, 0xffffffffffffffff) 18:37:16 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r2 = gettid() perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x80000001, 0x0, @perf_config_ext={0x4, 0xa1b}, 0x10092, 0x6, 0x9, 0x0, 0x0, 0x7fff, 0xac, 0x0, 0x0, 0x0, 0x1}, r2, 0xb, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1, 0x1, 0x20, 0x2, 0x0, 0x2, 0x60852, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x40, 0x2, 0x7, 0x7, 0x40, 0x8, 0x1f, 0x0, 0x5, 0x0, 0x8}, r2, 0x5, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0x43408) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xc}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) socketpair(0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000100)=ANY=[@ANYBLOB="a2edcb68b5111175f37538e486dd63176ba8b6b52c78fe80000000000003e3ffffffffffc201fe8000000000001fa8aaaafffeaaaaaa1a36"], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, 0x0, 0xfdef) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x1}, [@alu={0x7, 0x1, 0x3, 0x3, 0x1, 0xfffffffffffffff8, 0x10}]}, &(0x7f0000000300)='GPL\x00', 0x1, 0x9, &(0x7f0000000340)=""/9, 0x41100, 0x14, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000480)={0x4, 0x8, 0x3, 0x101}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[r5, r0]}, 0x80) bpf$ITER_CREATE(0x21, &(0x7f0000000380), 0x8) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="141f000000000000000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB='\x00\x00\x00\x00'], 0x18}, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000580)={r8}, 0x8) syz_open_procfs$namespace(0xffffffffffffffff, 0xffffffffffffffff) [ 47.639609][ T3552] syz-executor.5 (3552) used greatest stack depth: 11040 bytes left 18:37:17 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r2 = gettid() perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x80000001, 0x0, @perf_config_ext={0x4, 0xa1b}, 0x10092, 0x6, 0x9, 0x0, 0x0, 0x7fff, 0xac, 0x0, 0x0, 0x0, 0x1}, r2, 0xb, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1, 0x1, 0x20, 0x2, 0x0, 0x2, 0x60852, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x40, 0x2, 0x7, 0x7, 0x40, 0x8, 0x1f, 0x0, 0x5, 0x0, 0x8}, r2, 0x5, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0x43408) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xc}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) socketpair(0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000100)=ANY=[@ANYBLOB="a2edcb68b5111175f37538e486dd63176ba8b6b52c78fe80000000000003e3ffffffffffc201fe8000000000001fa8aaaafffeaaaaaa1a36"], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, 0x0, 0xfdef) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x1}, [@alu={0x7, 0x1, 0x3, 0x3, 0x1, 0xfffffffffffffff8, 0x10}]}, &(0x7f0000000300)='GPL\x00', 0x1, 0x9, &(0x7f0000000340)=""/9, 0x41100, 0x14, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000480)={0x4, 0x8, 0x3, 0x101}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[r5, r0]}, 0x80) bpf$ITER_CREATE(0x21, &(0x7f0000000380), 0x8) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="141f000000000000000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB='\x00\x00\x00\x00'], 0x18}, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000580)={r8}, 0x8) syz_open_procfs$namespace(0xffffffffffffffff, 0xffffffffffffffff) 18:37:17 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413ec50000000f00000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001e000100000000000000000002e6"], 0x30}}, 0x0) 18:37:17 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413ec50000000f00000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001e000100000000000000000002e6"], 0x30}}, 0x0) 18:37:17 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r2 = gettid() perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x80000001, 0x0, @perf_config_ext={0x4, 0xa1b}, 0x10092, 0x6, 0x9, 0x0, 0x0, 0x7fff, 0xac, 0x0, 0x0, 0x0, 0x1}, r2, 0xb, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1, 0x1, 0x20, 0x2, 0x0, 0x2, 0x60852, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x40, 0x2, 0x7, 0x7, 0x40, 0x8, 0x1f, 0x0, 0x5, 0x0, 0x8}, r2, 0x5, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0x43408) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xc}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) socketpair(0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000100)=ANY=[@ANYBLOB="a2edcb68b5111175f37538e486dd63176ba8b6b52c78fe80000000000003e3ffffffffffc201fe8000000000001fa8aaaafffeaaaaaa1a36"], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, 0x0, 0xfdef) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x1}, [@alu={0x7, 0x1, 0x3, 0x3, 0x1, 0xfffffffffffffff8, 0x10}]}, &(0x7f0000000300)='GPL\x00', 0x1, 0x9, &(0x7f0000000340)=""/9, 0x41100, 0x14, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000480)={0x4, 0x8, 0x3, 0x101}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[r5, r0]}, 0x80) bpf$ITER_CREATE(0x21, &(0x7f0000000380), 0x8) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="141f000000000000000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB='\x00\x00\x00\x00'], 0x18}, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000580)={r8}, 0x8) syz_open_procfs$namespace(0xffffffffffffffff, 0xffffffffffffffff) 18:37:17 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) connect$l2tp6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}, 0x20) 18:37:17 executing program 4: socket$inet(0xa, 0x3, 0x87) syz_emit_ethernet(0x6a, &(0x7f0000000000)={@local, @remote, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x34, 0x87, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01']}], @mlv2_query={0x82, 0x0, 0x0, 0x0, 0x0, @local}}}}}}, 0x0) 18:37:17 executing program 4: socket$inet(0xa, 0x3, 0x87) syz_emit_ethernet(0x6a, &(0x7f0000000000)={@local, @remote, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x34, 0x87, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01']}], @mlv2_query={0x82, 0x0, 0x0, 0x0, 0x0, @local}}}}}}, 0x0) 18:37:17 executing program 2: socket$inet(0xa, 0x3, 0x87) syz_emit_ethernet(0x6a, &(0x7f0000000000)={@local, @remote, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x34, 0x87, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01']}], @mlv2_query={0x82, 0x0, 0x0, 0x0, 0x0, @local}}}}}}, 0x0) 18:37:17 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413ec50000000f00000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001e000100000000000000000002e6"], 0x30}}, 0x0) 18:37:17 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) connect$l2tp6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}, 0x20) 18:37:17 executing program 4: socket$inet(0xa, 0x3, 0x87) syz_emit_ethernet(0x6a, &(0x7f0000000000)={@local, @remote, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x34, 0x87, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01']}], @mlv2_query={0x82, 0x0, 0x0, 0x0, 0x0, @local}}}}}}, 0x0) 18:37:17 executing program 2: socket$inet(0xa, 0x3, 0x87) syz_emit_ethernet(0x6a, &(0x7f0000000000)={@local, @remote, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x34, 0x87, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01']}], @mlv2_query={0x82, 0x0, 0x0, 0x0, 0x0, @local}}}}}}, 0x0) 18:37:17 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r2 = gettid() perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x80000001, 0x0, @perf_config_ext={0x4, 0xa1b}, 0x10092, 0x6, 0x9, 0x0, 0x0, 0x7fff, 0xac, 0x0, 0x0, 0x0, 0x1}, r2, 0xb, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1, 0x1, 0x20, 0x2, 0x0, 0x2, 0x60852, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x40, 0x2, 0x7, 0x7, 0x40, 0x8, 0x1f, 0x0, 0x5, 0x0, 0x8}, r2, 0x5, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0x43408) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xc}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) socketpair(0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000100)=ANY=[@ANYBLOB="a2edcb68b5111175f37538e486dd63176ba8b6b52c78fe80000000000003e3ffffffffffc201fe8000000000001fa8aaaafffeaaaaaa1a36"], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, 0x0, 0xfdef) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x1}, [@alu={0x7, 0x1, 0x3, 0x3, 0x1, 0xfffffffffffffff8, 0x10}]}, &(0x7f0000000300)='GPL\x00', 0x1, 0x9, &(0x7f0000000340)=""/9, 0x41100, 0x14, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000480)={0x4, 0x8, 0x3, 0x101}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[r5, r0]}, 0x80) bpf$ITER_CREATE(0x21, &(0x7f0000000380), 0x8) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="141f000000000000000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB='\x00\x00\x00\x00'], 0x18}, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000580)={r8}, 0x8) syz_open_procfs$namespace(0xffffffffffffffff, 0xffffffffffffffff) 18:37:17 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) connect$l2tp6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}, 0x20) 18:37:17 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413ec50000000f00000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001e000100000000000000000002e6"], 0x30}}, 0x0) 18:37:18 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r2 = gettid() perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x80000001, 0x0, @perf_config_ext={0x4, 0xa1b}, 0x10092, 0x6, 0x9, 0x0, 0x0, 0x7fff, 0xac, 0x0, 0x0, 0x0, 0x1}, r2, 0xb, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1, 0x1, 0x20, 0x2, 0x0, 0x2, 0x60852, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x40, 0x2, 0x7, 0x7, 0x40, 0x8, 0x1f, 0x0, 0x5, 0x0, 0x8}, r2, 0x5, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0x43408) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xc}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) socketpair(0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000100)=ANY=[@ANYBLOB="a2edcb68b5111175f37538e486dd63176ba8b6b52c78fe80000000000003e3ffffffffffc201fe8000000000001fa8aaaafffeaaaaaa1a36"], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, 0x0, 0xfdef) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x1}, [@alu={0x7, 0x1, 0x3, 0x3, 0x1, 0xfffffffffffffff8, 0x10}]}, &(0x7f0000000300)='GPL\x00', 0x1, 0x9, &(0x7f0000000340)=""/9, 0x41100, 0x14, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000480)={0x4, 0x8, 0x3, 0x101}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[r5, r0]}, 0x80) bpf$ITER_CREATE(0x21, &(0x7f0000000380), 0x8) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="141f000000000000000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB='\x00\x00\x00\x00'], 0x18}, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000580)={r8}, 0x8) syz_open_procfs$namespace(0xffffffffffffffff, 0xffffffffffffffff) 18:37:18 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000140), 0xffffffffffffffff) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_wireguard(r4, 0x8933, &(0x7f0000000080)={'wg0\x00', 0x0}) sendmsg$WG_CMD_SET_DEVICE(r2, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000d00)={&(0x7f00000003c0)={0xd8, r3, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_PEERS={0xb4, 0x8, 0x0, 0x1, [{0x44, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @remote}}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0xc3}]}, {0x6c, 0x0, 0x0, 0x1, [@WGPEER_A_PRESHARED_KEY={0x24, 0x2, "73961633df6dc9cb418b15afd0bae7b90f1e6cfed8bb423cf9285c4741631549"}, @WGPEER_A_PUBLIC_KEY={0x24}, @WGPEER_A_ALLOWEDIPS={0x20, 0x9, 0x0, 0x1, [{0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @private}, {0x5, 0x3, 0x1}}]}]}]}]}, @WGDEVICE_A_FLAGS={0x8, 0x5, 0x1}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r5}]}, 0xd8}}, 0x0) 18:37:18 executing program 2: socket$inet(0xa, 0x3, 0x87) syz_emit_ethernet(0x6a, &(0x7f0000000000)={@local, @remote, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x34, 0x87, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01']}], @mlv2_query={0x82, 0x0, 0x0, 0x0, 0x0, @local}}}}}}, 0x0) 18:37:18 executing program 4: socket$inet(0xa, 0x3, 0x87) syz_emit_ethernet(0x6a, &(0x7f0000000000)={@local, @remote, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x34, 0x87, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01']}], @mlv2_query={0x82, 0x0, 0x0, 0x0, 0x0, @local}}}}}}, 0x0) 18:37:18 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) connect$l2tp6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}, 0x20) 18:37:18 executing program 4: r0 = epoll_create1(0x0) epoll_pwait(r0, &(0x7f0000000000)=[{}], 0x1, 0x90, &(0x7f0000000100)={[0xab]}, 0x8) close(r0) 18:37:18 executing program 0: r0 = gettid() r1 = signalfd4(0xffffffffffffffff, &(0x7f00000000c0)={[0xfffffffffffffffd]}, 0x8, 0x0) r2 = syz_io_uring_setup(0x47c5, &(0x7f0000000a80), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000002240)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd=r1}, 0x0) io_uring_enter(r2, 0x450c, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0xb) 18:37:18 executing program 2: openat$uhid(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x9}, 0x0, 0x0, 0x0) 18:37:18 executing program 0: r0 = gettid() r1 = signalfd4(0xffffffffffffffff, &(0x7f00000000c0)={[0xfffffffffffffffd]}, 0x8, 0x0) r2 = syz_io_uring_setup(0x47c5, &(0x7f0000000a80), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000002240)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd=r1}, 0x0) io_uring_enter(r2, 0x450c, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0xb) [ 49.453938][ T23] kauditd_printk_skb: 23 callbacks suppressed [ 49.453954][ T23] audit: type=1400 audit(1680201438.689:123): avc: denied { create } for pid=3631 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 49.490398][ T23] audit: type=1400 audit(1680201438.719:124): avc: denied { ioctl } for pid=3631 comm="syz-executor.1" path="socket:[19555]" dev="sockfs" ino=19555 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 49.515694][ T23] audit: type=1400 audit(1680201438.729:125): avc: denied { read } for pid=3644 comm="syz-executor.2" name="uhid" dev="devtmpfs" ino=227 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 18:37:18 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r2 = gettid() perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x80000001, 0x0, @perf_config_ext={0x4, 0xa1b}, 0x10092, 0x6, 0x9, 0x0, 0x0, 0x7fff, 0xac, 0x0, 0x0, 0x0, 0x1}, r2, 0xb, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1, 0x1, 0x20, 0x2, 0x0, 0x2, 0x60852, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x40, 0x2, 0x7, 0x7, 0x40, 0x8, 0x1f, 0x0, 0x5, 0x0, 0x8}, r2, 0x5, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0x43408) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xc}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) socketpair(0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000100)=ANY=[@ANYBLOB="a2edcb68b5111175f37538e486dd63176ba8b6b52c78fe80000000000003e3ffffffffffc201fe8000000000001fa8aaaafffeaaaaaa1a36"], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, 0x0, 0xfdef) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x1}, [@alu={0x7, 0x1, 0x3, 0x3, 0x1, 0xfffffffffffffff8, 0x10}]}, &(0x7f0000000300)='GPL\x00', 0x1, 0x9, &(0x7f0000000340)=""/9, 0x41100, 0x14, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000480)={0x4, 0x8, 0x3, 0x101}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[r5, r0]}, 0x80) bpf$ITER_CREATE(0x21, &(0x7f0000000380), 0x8) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="141f000000000000000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB='\x00\x00\x00\x00'], 0x18}, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000580)={r8}, 0x8) syz_open_procfs$namespace(0xffffffffffffffff, 0xffffffffffffffff) 18:37:18 executing program 0: r0 = gettid() r1 = signalfd4(0xffffffffffffffff, &(0x7f00000000c0)={[0xfffffffffffffffd]}, 0x8, 0x0) r2 = syz_io_uring_setup(0x47c5, &(0x7f0000000a80), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000002240)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd=r1}, 0x0) io_uring_enter(r2, 0x450c, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0xb) 18:37:18 executing program 2: openat$uhid(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x9}, 0x0, 0x0, 0x0) [ 49.538836][ T23] audit: type=1400 audit(1680201438.729:126): avc: denied { open } for pid=3644 comm="syz-executor.2" path="/dev/uhid" dev="devtmpfs" ino=227 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 18:37:19 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000140), 0xffffffffffffffff) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_wireguard(r4, 0x8933, &(0x7f0000000080)={'wg0\x00', 0x0}) sendmsg$WG_CMD_SET_DEVICE(r2, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000d00)={&(0x7f00000003c0)={0xd8, r3, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_PEERS={0xb4, 0x8, 0x0, 0x1, [{0x44, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @remote}}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0xc3}]}, {0x6c, 0x0, 0x0, 0x1, [@WGPEER_A_PRESHARED_KEY={0x24, 0x2, "73961633df6dc9cb418b15afd0bae7b90f1e6cfed8bb423cf9285c4741631549"}, @WGPEER_A_PUBLIC_KEY={0x24}, @WGPEER_A_ALLOWEDIPS={0x20, 0x9, 0x0, 0x1, [{0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @private}, {0x5, 0x3, 0x1}}]}]}]}]}, @WGDEVICE_A_FLAGS={0x8, 0x5, 0x1}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r5}]}, 0xd8}}, 0x0) 18:37:19 executing program 0: r0 = gettid() r1 = signalfd4(0xffffffffffffffff, &(0x7f00000000c0)={[0xfffffffffffffffd]}, 0x8, 0x0) r2 = syz_io_uring_setup(0x47c5, &(0x7f0000000a80), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000002240)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd=r1}, 0x0) io_uring_enter(r2, 0x450c, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0xb) 18:37:19 executing program 2: openat$uhid(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x9}, 0x0, 0x0, 0x0) 18:37:19 executing program 4: r0 = epoll_create1(0x0) epoll_pwait(r0, &(0x7f0000000000)=[{}], 0x1, 0x90, &(0x7f0000000100)={[0xab]}, 0x8) close(r0) 18:37:19 executing program 5: r0 = gettid() r1 = signalfd4(0xffffffffffffffff, &(0x7f00000000c0)={[0xfffffffffffffffd]}, 0x8, 0x0) r2 = syz_io_uring_setup(0x47c5, &(0x7f0000000a80), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000002240)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd=r1}, 0x0) io_uring_enter(r2, 0x450c, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0xb) 18:37:19 executing program 2: openat$uhid(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x9}, 0x0, 0x0, 0x0) 18:37:19 executing program 5: r0 = gettid() r1 = signalfd4(0xffffffffffffffff, &(0x7f00000000c0)={[0xfffffffffffffffd]}, 0x8, 0x0) r2 = syz_io_uring_setup(0x47c5, &(0x7f0000000a80), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000002240)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd=r1}, 0x0) io_uring_enter(r2, 0x450c, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0xb) 18:37:19 executing program 0: open(&(0x7f00000003c0)='./file0\x00', 0x123040, 0x0) r0 = syz_io_uring_setup(0x785a, &(0x7f00000000c0), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000140), &(0x7f0000000180)) io_uring_register$IORING_REGISTER_FILES2(r0, 0x2, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x20) r1 = open(&(0x7f0000000600)='./file0\x00', 0x3ab080, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0x6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[0xffffffffffffffff, r1]}, 0x2) 18:37:19 executing program 5: r0 = gettid() r1 = signalfd4(0xffffffffffffffff, &(0x7f00000000c0)={[0xfffffffffffffffd]}, 0x8, 0x0) r2 = syz_io_uring_setup(0x47c5, &(0x7f0000000a80), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000002240)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd=r1}, 0x0) io_uring_enter(r2, 0x450c, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0xb) 18:37:19 executing program 0: open(&(0x7f00000003c0)='./file0\x00', 0x123040, 0x0) r0 = syz_io_uring_setup(0x785a, &(0x7f00000000c0), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000140), &(0x7f0000000180)) io_uring_register$IORING_REGISTER_FILES2(r0, 0x2, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x20) r1 = open(&(0x7f0000000600)='./file0\x00', 0x3ab080, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0x6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[0xffffffffffffffff, r1]}, 0x2) 18:37:19 executing program 4: r0 = epoll_create1(0x0) epoll_pwait(r0, &(0x7f0000000000)=[{}], 0x1, 0x90, &(0x7f0000000100)={[0xab]}, 0x8) close(r0) 18:37:19 executing program 5: open(&(0x7f00000003c0)='./file0\x00', 0x123040, 0x0) r0 = syz_io_uring_setup(0x785a, &(0x7f00000000c0), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000140), &(0x7f0000000180)) io_uring_register$IORING_REGISTER_FILES2(r0, 0x2, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x20) r1 = open(&(0x7f0000000600)='./file0\x00', 0x3ab080, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0x6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[0xffffffffffffffff, r1]}, 0x2) 18:37:20 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000140), 0xffffffffffffffff) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_wireguard(r4, 0x8933, &(0x7f0000000080)={'wg0\x00', 0x0}) sendmsg$WG_CMD_SET_DEVICE(r2, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000d00)={&(0x7f00000003c0)={0xd8, r3, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_PEERS={0xb4, 0x8, 0x0, 0x1, [{0x44, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @remote}}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0xc3}]}, {0x6c, 0x0, 0x0, 0x1, [@WGPEER_A_PRESHARED_KEY={0x24, 0x2, "73961633df6dc9cb418b15afd0bae7b90f1e6cfed8bb423cf9285c4741631549"}, @WGPEER_A_PUBLIC_KEY={0x24}, @WGPEER_A_ALLOWEDIPS={0x20, 0x9, 0x0, 0x1, [{0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @private}, {0x5, 0x3, 0x1}}]}]}]}]}, @WGDEVICE_A_FLAGS={0x8, 0x5, 0x1}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r5}]}, 0xd8}}, 0x0) 18:37:20 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x8010000400000084) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000040)={0xffffffff, 0x3}, 0x8) sendto$inet6(r0, &(0x7f0000000100)="1c", 0x1, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote, 0x8}, 0x1c) close(r0) 18:37:20 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x54, 0x3, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_HOOK={0x28, 0x4, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}, @NFTA_HOOK_HOOKNUM={0x8, 0x1, 0x1, 0x0, 0x5}, @NFTA_HOOK_DEV={0x10, 0x3, 'veth1_to_batadv\x00'}]}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0x9c}}, 0x0) 18:37:20 executing program 0: open(&(0x7f00000003c0)='./file0\x00', 0x123040, 0x0) r0 = syz_io_uring_setup(0x785a, &(0x7f00000000c0), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000140), &(0x7f0000000180)) io_uring_register$IORING_REGISTER_FILES2(r0, 0x2, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x20) r1 = open(&(0x7f0000000600)='./file0\x00', 0x3ab080, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0x6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[0xffffffffffffffff, r1]}, 0x2) 18:37:20 executing program 5: open(&(0x7f00000003c0)='./file0\x00', 0x123040, 0x0) r0 = syz_io_uring_setup(0x785a, &(0x7f00000000c0), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000140), &(0x7f0000000180)) io_uring_register$IORING_REGISTER_FILES2(r0, 0x2, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x20) r1 = open(&(0x7f0000000600)='./file0\x00', 0x3ab080, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0x6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[0xffffffffffffffff, r1]}, 0x2) 18:37:20 executing program 4: r0 = epoll_create1(0x0) epoll_pwait(r0, &(0x7f0000000000)=[{}], 0x1, 0x90, &(0x7f0000000100)={[0xab]}, 0x8) close(r0) 18:37:20 executing program 5: open(&(0x7f00000003c0)='./file0\x00', 0x123040, 0x0) r0 = syz_io_uring_setup(0x785a, &(0x7f00000000c0), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000140), &(0x7f0000000180)) io_uring_register$IORING_REGISTER_FILES2(r0, 0x2, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x20) r1 = open(&(0x7f0000000600)='./file0\x00', 0x3ab080, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0x6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[0xffffffffffffffff, r1]}, 0x2) 18:37:20 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x54, 0x3, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_HOOK={0x28, 0x4, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}, @NFTA_HOOK_HOOKNUM={0x8, 0x1, 0x1, 0x0, 0x5}, @NFTA_HOOK_DEV={0x10, 0x3, 'veth1_to_batadv\x00'}]}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0x9c}}, 0x0) 18:37:20 executing program 0: open(&(0x7f00000003c0)='./file0\x00', 0x123040, 0x0) r0 = syz_io_uring_setup(0x785a, &(0x7f00000000c0), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000140), &(0x7f0000000180)) io_uring_register$IORING_REGISTER_FILES2(r0, 0x2, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x20) r1 = open(&(0x7f0000000600)='./file0\x00', 0x3ab080, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0x6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[0xffffffffffffffff, r1]}, 0x2) [ 51.118995][ T3691] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 51.125836][ T23] audit: type=1400 audit(1680201440.359:127): avc: denied { create } for pid=3687 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 51.179878][ T23] audit: type=1400 audit(1680201440.399:128): avc: denied { setopt } for pid=3687 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 51.199683][ T23] audit: type=1400 audit(1680201440.399:129): avc: denied { write } for pid=3687 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 51.205042][ T3702] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 18:37:20 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x8010000400000084) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000040)={0xffffffff, 0x3}, 0x8) sendto$inet6(r0, &(0x7f0000000100)="1c", 0x1, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote, 0x8}, 0x1c) close(r0) 18:37:20 executing program 0: r0 = socket$inet6(0xa, 0x801, 0x8010000400000084) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000040)={0xffffffff, 0x3}, 0x8) sendto$inet6(r0, &(0x7f0000000100)="1c", 0x1, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote, 0x8}, 0x1c) close(r0) 18:37:20 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x6b, 0x11, 0x6d}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 51.219370][ T23] audit: type=1400 audit(1680201440.399:130): avc: denied { connect } for pid=3687 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 51.219398][ T23] audit: type=1400 audit(1680201440.399:131): avc: denied { name_connect } for pid=3687 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 18:37:21 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000140), 0xffffffffffffffff) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_wireguard(r4, 0x8933, &(0x7f0000000080)={'wg0\x00', 0x0}) sendmsg$WG_CMD_SET_DEVICE(r2, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000d00)={&(0x7f00000003c0)={0xd8, r3, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_PEERS={0xb4, 0x8, 0x0, 0x1, [{0x44, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @remote}}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0xc3}]}, {0x6c, 0x0, 0x0, 0x1, [@WGPEER_A_PRESHARED_KEY={0x24, 0x2, "73961633df6dc9cb418b15afd0bae7b90f1e6cfed8bb423cf9285c4741631549"}, @WGPEER_A_PUBLIC_KEY={0x24}, @WGPEER_A_ALLOWEDIPS={0x20, 0x9, 0x0, 0x1, [{0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @private}, {0x5, 0x3, 0x1}}]}]}]}]}, @WGDEVICE_A_FLAGS={0x8, 0x5, 0x1}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r5}]}, 0xd8}}, 0x0) 18:37:21 executing program 4: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8983, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = syz_genetlink_get_family_id$mptcp(&(0x7f00000008c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000980)={&(0x7f00000000c0)={0x44, r0, 0x1, 0x0, 0x0, {}, [@MPTCP_PM_ATTR_ADDR={0x30, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e24}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast2}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1}]}]}, 0x44}}, 0x0) 18:37:21 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x6b, 0x11, 0x6d}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) 18:37:21 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x8010000400000084) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000040)={0xffffffff, 0x3}, 0x8) sendto$inet6(r0, &(0x7f0000000100)="1c", 0x1, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote, 0x8}, 0x1c) close(r0) 18:37:21 executing program 0: r0 = socket$inet6(0xa, 0x801, 0x8010000400000084) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000040)={0xffffffff, 0x3}, 0x8) sendto$inet6(r0, &(0x7f0000000100)="1c", 0x1, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote, 0x8}, 0x1c) close(r0) 18:37:21 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x54, 0x3, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_HOOK={0x28, 0x4, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}, @NFTA_HOOK_HOOKNUM={0x8, 0x1, 0x1, 0x0, 0x5}, @NFTA_HOOK_DEV={0x10, 0x3, 'veth1_to_batadv\x00'}]}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0x9c}}, 0x0) 18:37:21 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x6b, 0x11, 0x6d}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) 18:37:21 executing program 4: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8983, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = syz_genetlink_get_family_id$mptcp(&(0x7f00000008c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000980)={&(0x7f00000000c0)={0x44, r0, 0x1, 0x0, 0x0, {}, [@MPTCP_PM_ATTR_ADDR={0x30, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e24}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast2}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1}]}]}, 0x44}}, 0x0) 18:37:21 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x8010000400000084) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000040)={0xffffffff, 0x3}, 0x8) sendto$inet6(r0, &(0x7f0000000100)="1c", 0x1, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote, 0x8}, 0x1c) close(r0) 18:37:21 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x6b, 0x11, 0x6d}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) 18:37:21 executing program 0: r0 = socket$inet6(0xa, 0x801, 0x8010000400000084) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000040)={0xffffffff, 0x3}, 0x8) sendto$inet6(r0, &(0x7f0000000100)="1c", 0x1, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote, 0x8}, 0x1c) close(r0) [ 52.024241][ T3723] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 18:37:21 executing program 4: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8983, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = syz_genetlink_get_family_id$mptcp(&(0x7f00000008c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000980)={&(0x7f00000000c0)={0x44, r0, 0x1, 0x0, 0x0, {}, [@MPTCP_PM_ATTR_ADDR={0x30, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e24}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast2}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1}]}]}, 0x44}}, 0x0) 18:37:22 executing program 5: r0 = memfd_secret(0x0) close_range(r0, 0xffffffffffffffff, 0x2) fsconfig$FSCONFIG_SET_FLAG(r0, 0x0, &(0x7f0000000040)='sync\x00', 0x0, 0x0) 18:37:22 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x54, 0x3, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_HOOK={0x28, 0x4, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}, @NFTA_HOOK_HOOKNUM={0x8, 0x1, 0x1, 0x0, 0x5}, @NFTA_HOOK_DEV={0x10, 0x3, 'veth1_to_batadv\x00'}]}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0x9c}}, 0x0) 18:37:22 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) r0 = syz_io_uring_setup(0x5ad, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f00000000c0)) io_uring_enter(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[0x13]}, 0x8) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f0000000340)=0x80) sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getpid() connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) getpid() socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r6 = syz_io_uring_setup(0x5af, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f0000000280)) io_uring_enter(r6, 0x40b3, 0x0, 0x0, &(0x7f0000000000)={[0x21]}, 0x8) 18:37:22 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0x208e24b) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x4000004, 0x11, r0, 0x0) getsockopt$bt_hci(r1, 0x11c, 0x2, 0x0, &(0x7f0000000080)) 18:37:22 executing program 4: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8983, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = syz_genetlink_get_family_id$mptcp(&(0x7f00000008c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000980)={&(0x7f00000000c0)={0x44, r0, 0x1, 0x0, 0x0, {}, [@MPTCP_PM_ATTR_ADDR={0x30, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e24}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast2}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1}]}]}, 0x44}}, 0x0) 18:37:22 executing program 1: r0 = syz_io_uring_setup(0x5ad, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0xc00000)=nil, &(0x7f0000000040), &(0x7f00000000c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) socket(0x10, 0x803, 0x0) socket(0x10, 0x803, 0x0) socket$inet6(0xa, 0x2, 0x0) socket(0x10, 0x3, 0x0) pipe2(&(0x7f0000000900), 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) socket(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000400)="d5", 0x1}], 0x1, 0x0, 0x40}}], 0x1, 0x0) pipe2(&(0x7f0000000900), 0x0) pipe2(&(0x7f0000000900), 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) io_uring_enter(r0, 0x3414, 0x0, 0x0, 0x0, 0x0) 18:37:22 executing program 5: r0 = memfd_secret(0x0) close_range(r0, 0xffffffffffffffff, 0x2) fsconfig$FSCONFIG_SET_FLAG(r0, 0x0, &(0x7f0000000040)='sync\x00', 0x0, 0x0) 18:37:22 executing program 4: r0 = socket$l2tp6(0xa, 0x2, 0x73) io_setup(0x6, &(0x7f0000000900)=0x0) io_submit(r1, 0x3, &(0x7f00000003c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) io_pgetevents(r1, 0x2, 0x2, &(0x7f0000000080)=[{}, {}], &(0x7f0000000140)={0x0, 0x989680}, 0x0) 18:37:22 executing program 3: set_mempolicy(0x3, &(0x7f0000000040)=0xffff, 0x9) r0 = socket(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x28}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000060000000000", @ANYRES32=r3, @ANYBLOB="0600000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000000024000b0f00000000ae00000000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000c000100696e6772657373"], 0x30}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001d80)=@newtfilter={0x3c, 0x2c, 0xd27, 0x0, 0x0, {0x9, 0x0, 0x0, r3, {0x0, 0x6}, {}, {0xc}}, [@filter_kind_options=@f_route={{0xa}, {0xc, 0x2, [@TCA_ROUTE4_FROM={0x8}]}}]}, 0x3c}}, 0x0) [ 52.906083][ T3747] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 18:37:22 executing program 5: r0 = memfd_secret(0x0) close_range(r0, 0xffffffffffffffff, 0x2) fsconfig$FSCONFIG_SET_FLAG(r0, 0x0, &(0x7f0000000040)='sync\x00', 0x0, 0x0) 18:37:22 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0x208e24b) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x4000004, 0x11, r0, 0x0) getsockopt$bt_hci(r1, 0x11c, 0x2, 0x0, &(0x7f0000000080)) 18:37:22 executing program 3: set_mempolicy(0x3, &(0x7f0000000040)=0xffff, 0x9) r0 = socket(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x28}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000060000000000", @ANYRES32=r3, @ANYBLOB="0600000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000000024000b0f00000000ae00000000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000c000100696e6772657373"], 0x30}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001d80)=@newtfilter={0x3c, 0x2c, 0xd27, 0x0, 0x0, {0x9, 0x0, 0x0, r3, {0x0, 0x6}, {}, {0xc}}, [@filter_kind_options=@f_route={{0xa}, {0xc, 0x2, [@TCA_ROUTE4_FROM={0x8}]}}]}, 0x3c}}, 0x0) [ 52.950489][ T23] audit: type=1400 audit(1680201442.189:132): avc: denied { mount } for pid=3744 comm="syz-executor.2" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 52.961113][ T3756] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 18:37:22 executing program 5: r0 = memfd_secret(0x0) close_range(r0, 0xffffffffffffffff, 0x2) fsconfig$FSCONFIG_SET_FLAG(r0, 0x0, &(0x7f0000000040)='sync\x00', 0x0, 0x0) 18:37:22 executing program 4: r0 = socket$l2tp6(0xa, 0x2, 0x73) io_setup(0x6, &(0x7f0000000900)=0x0) io_submit(r1, 0x3, &(0x7f00000003c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) io_pgetevents(r1, 0x2, 0x2, &(0x7f0000000080)=[{}, {}], &(0x7f0000000140)={0x0, 0x989680}, 0x0) [ 53.043774][ T3763] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 18:37:22 executing program 3: set_mempolicy(0x3, &(0x7f0000000040)=0xffff, 0x9) r0 = socket(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x28}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000060000000000", @ANYRES32=r3, @ANYBLOB="0600000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000000024000b0f00000000ae00000000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000c000100696e6772657373"], 0x30}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001d80)=@newtfilter={0x3c, 0x2c, 0xd27, 0x0, 0x0, {0x9, 0x0, 0x0, r3, {0x0, 0x6}, {}, {0xc}}, [@filter_kind_options=@f_route={{0xa}, {0xc, 0x2, [@TCA_ROUTE4_FROM={0x8}]}}]}, 0x3c}}, 0x0) 18:37:22 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0xffff, 0x9) r0 = socket(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x28}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000060000000000", @ANYRES32=r3, @ANYBLOB="0600000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000000024000b0f00000000ae00000000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000c000100696e6772657373"], 0x30}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001d80)=@newtfilter={0x3c, 0x2c, 0xd27, 0x0, 0x0, {0x9, 0x0, 0x0, r3, {0x0, 0x6}, {}, {0xc}}, [@filter_kind_options=@f_route={{0xa}, {0xc, 0x2, [@TCA_ROUTE4_FROM={0x8}]}}]}, 0x3c}}, 0x0) 18:37:22 executing program 1: r0 = syz_io_uring_setup(0x5ad, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0xc00000)=nil, &(0x7f0000000040), &(0x7f00000000c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) socket(0x10, 0x803, 0x0) socket(0x10, 0x803, 0x0) socket$inet6(0xa, 0x2, 0x0) socket(0x10, 0x3, 0x0) pipe2(&(0x7f0000000900), 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) socket(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000400)="d5", 0x1}], 0x1, 0x0, 0x40}}], 0x1, 0x0) pipe2(&(0x7f0000000900), 0x0) pipe2(&(0x7f0000000900), 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) io_uring_enter(r0, 0x3414, 0x0, 0x0, 0x0, 0x0) 18:37:22 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0x208e24b) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x4000004, 0x11, r0, 0x0) getsockopt$bt_hci(r1, 0x11c, 0x2, 0x0, &(0x7f0000000080)) 18:37:22 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) r0 = syz_io_uring_setup(0x5ad, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f00000000c0)) io_uring_enter(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[0x13]}, 0x8) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f0000000340)=0x80) sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getpid() connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) getpid() socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r6 = syz_io_uring_setup(0x5af, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f0000000280)) io_uring_enter(r6, 0x40b3, 0x0, 0x0, &(0x7f0000000000)={[0x21]}, 0x8) 18:37:22 executing program 4: r0 = socket$l2tp6(0xa, 0x2, 0x73) io_setup(0x6, &(0x7f0000000900)=0x0) io_submit(r1, 0x3, &(0x7f00000003c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) io_pgetevents(r1, 0x2, 0x2, &(0x7f0000000080)=[{}, {}], &(0x7f0000000140)={0x0, 0x989680}, 0x0) 18:37:23 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0xffff, 0x9) r0 = socket(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x28}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000060000000000", @ANYRES32=r3, @ANYBLOB="0600000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000000024000b0f00000000ae00000000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000c000100696e6772657373"], 0x30}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001d80)=@newtfilter={0x3c, 0x2c, 0xd27, 0x0, 0x0, {0x9, 0x0, 0x0, r3, {0x0, 0x6}, {}, {0xc}}, [@filter_kind_options=@f_route={{0xa}, {0xc, 0x2, [@TCA_ROUTE4_FROM={0x8}]}}]}, 0x3c}}, 0x0) 18:37:23 executing program 3: set_mempolicy(0x3, &(0x7f0000000040)=0xffff, 0x9) r0 = socket(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x28}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000060000000000", @ANYRES32=r3, @ANYBLOB="0600000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000000024000b0f00000000ae00000000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000c000100696e6772657373"], 0x30}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001d80)=@newtfilter={0x3c, 0x2c, 0xd27, 0x0, 0x0, {0x9, 0x0, 0x0, r3, {0x0, 0x6}, {}, {0xc}}, [@filter_kind_options=@f_route={{0xa}, {0xc, 0x2, [@TCA_ROUTE4_FROM={0x8}]}}]}, 0x3c}}, 0x0) 18:37:23 executing program 4: r0 = socket$l2tp6(0xa, 0x2, 0x73) io_setup(0x6, &(0x7f0000000900)=0x0) io_submit(r1, 0x3, &(0x7f00000003c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) io_pgetevents(r1, 0x2, 0x2, &(0x7f0000000080)=[{}, {}], &(0x7f0000000140)={0x0, 0x989680}, 0x0) [ 53.774398][ T3875] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 53.810003][ T3874] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 18:37:23 executing program 1: r0 = syz_io_uring_setup(0x5ad, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0xc00000)=nil, &(0x7f0000000040), &(0x7f00000000c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) socket(0x10, 0x803, 0x0) socket(0x10, 0x803, 0x0) socket$inet6(0xa, 0x2, 0x0) socket(0x10, 0x3, 0x0) pipe2(&(0x7f0000000900), 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) socket(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000400)="d5", 0x1}], 0x1, 0x0, 0x40}}], 0x1, 0x0) pipe2(&(0x7f0000000900), 0x0) pipe2(&(0x7f0000000900), 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) io_uring_enter(r0, 0x3414, 0x0, 0x0, 0x0, 0x0) 18:37:23 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0x208e24b) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x4000004, 0x11, r0, 0x0) getsockopt$bt_hci(r1, 0x11c, 0x2, 0x0, &(0x7f0000000080)) [ 53.888504][ T3886] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. 18:37:23 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) r0 = syz_io_uring_setup(0x5ad, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f00000000c0)) io_uring_enter(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[0x13]}, 0x8) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f0000000340)=0x80) sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getpid() connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) getpid() socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r6 = syz_io_uring_setup(0x5af, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f0000000280)) io_uring_enter(r6, 0x40b3, 0x0, 0x0, &(0x7f0000000000)={[0x21]}, 0x8) [ 53.943518][ T3884] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 18:37:23 executing program 5: set_mempolicy(0x3, &(0x7f0000000040)=0xffff, 0x9) r0 = socket(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x28}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000060000000000", @ANYRES32=r3, @ANYBLOB="0600000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000000024000b0f00000000ae00000000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000c000100696e6772657373"], 0x30}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001d80)=@newtfilter={0x3c, 0x2c, 0xd27, 0x0, 0x0, {0x9, 0x0, 0x0, r3, {0x0, 0x6}, {}, {0xc}}, [@filter_kind_options=@f_route={{0xa}, {0xc, 0x2, [@TCA_ROUTE4_FROM={0x8}]}}]}, 0x3c}}, 0x0) 18:37:23 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) r0 = syz_io_uring_setup(0x5ad, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f00000000c0)) io_uring_enter(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[0x13]}, 0x8) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f0000000340)=0x80) sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getpid() connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) getpid() socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r6 = syz_io_uring_setup(0x5af, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f0000000280)) io_uring_enter(r6, 0x40b3, 0x0, 0x0, &(0x7f0000000000)={[0x21]}, 0x8) 18:37:23 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) r0 = syz_io_uring_setup(0x5ad, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f00000000c0)) io_uring_enter(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[0x13]}, 0x8) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f0000000340)=0x80) sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getpid() connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) getpid() socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r6 = syz_io_uring_setup(0x5af, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f0000000280)) io_uring_enter(r6, 0x40b3, 0x0, 0x0, &(0x7f0000000000)={[0x21]}, 0x8) [ 54.062545][ T4024] syz-executor.5 (4024) used greatest stack depth: 10896 bytes left 18:37:23 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) r0 = syz_io_uring_setup(0x5ad, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f00000000c0)) io_uring_enter(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[0x13]}, 0x8) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f0000000340)=0x80) sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getpid() connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) getpid() socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r6 = syz_io_uring_setup(0x5af, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f0000000280)) io_uring_enter(r6, 0x40b3, 0x0, 0x0, &(0x7f0000000000)={[0x21]}, 0x8) 18:37:24 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) r0 = syz_io_uring_setup(0x5ad, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f00000000c0)) io_uring_enter(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[0x13]}, 0x8) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f0000000340)=0x80) sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getpid() connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) getpid() socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r6 = syz_io_uring_setup(0x5af, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f0000000280)) io_uring_enter(r6, 0x40b3, 0x0, 0x0, &(0x7f0000000000)={[0x21]}, 0x8) 18:37:24 executing program 1: r0 = syz_io_uring_setup(0x5ad, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0xc00000)=nil, &(0x7f0000000040), &(0x7f00000000c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) socket(0x10, 0x803, 0x0) socket(0x10, 0x803, 0x0) socket$inet6(0xa, 0x2, 0x0) socket(0x10, 0x3, 0x0) pipe2(&(0x7f0000000900), 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) socket(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000400)="d5", 0x1}], 0x1, 0x0, 0x40}}], 0x1, 0x0) pipe2(&(0x7f0000000900), 0x0) pipe2(&(0x7f0000000900), 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) io_uring_enter(r0, 0x3414, 0x0, 0x0, 0x0, 0x0) 18:37:24 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) r0 = syz_io_uring_setup(0x5ad, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f00000000c0)) io_uring_enter(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[0x13]}, 0x8) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f0000000340)=0x80) sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getpid() connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) getpid() socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r6 = syz_io_uring_setup(0x5af, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f0000000280)) io_uring_enter(r6, 0x40b3, 0x0, 0x0, &(0x7f0000000000)={[0x21]}, 0x8) 18:37:24 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) r0 = syz_io_uring_setup(0x5ad, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f00000000c0)) io_uring_enter(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[0x13]}, 0x8) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f0000000340)=0x80) sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getpid() connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) getpid() socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r6 = syz_io_uring_setup(0x5af, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f0000000280)) io_uring_enter(r6, 0x40b3, 0x0, 0x0, &(0x7f0000000000)={[0x21]}, 0x8) 18:37:24 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) r0 = syz_io_uring_setup(0x5ad, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f00000000c0)) io_uring_enter(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[0x13]}, 0x8) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f0000000340)=0x80) sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getpid() connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) getpid() socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r6 = syz_io_uring_setup(0x5af, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f0000000280)) io_uring_enter(r6, 0x40b3, 0x0, 0x0, &(0x7f0000000000)={[0x21]}, 0x8) 18:37:24 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x69, 0x11, 0x78}, [@ldst={0x4}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3e0, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x76}, 0x48) 18:37:25 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) r0 = syz_io_uring_setup(0x5ad, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f00000000c0)) io_uring_enter(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[0x13]}, 0x8) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f0000000340)=0x80) sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getpid() connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) getpid() socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r6 = syz_io_uring_setup(0x5af, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f0000000280)) io_uring_enter(r6, 0x40b3, 0x0, 0x0, &(0x7f0000000000)={[0x21]}, 0x8) 18:37:25 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x69, 0x11, 0x78}, [@ldst={0x4}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3e0, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x76}, 0x48) 18:37:25 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x69, 0x11, 0x78}, [@ldst={0x4}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3e0, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x76}, 0x48) 18:37:25 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x69, 0x11, 0x78}, [@ldst={0x4}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3e0, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x76}, 0x48) 18:37:26 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg$inet6(r0, &(0x7f0000000640)={&(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c, &(0x7f0000000500)=[{&(0x7f00000001c0)='7', 0x1}, {0x0}, {0x0}, {&(0x7f00000003c0)="1b", 0x1}], 0x4, &(0x7f0000000580)=[@hopopts_2292={{0x18}}, @hoplimit_2292={{0x14}}], 0x30}, 0x4804) 18:37:26 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg$inet6(r0, &(0x7f0000000640)={&(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c, &(0x7f0000000500)=[{&(0x7f00000001c0)='7', 0x1}, {0x0}, {0x0}, {&(0x7f00000003c0)="1b", 0x1}], 0x4, &(0x7f0000000580)=[@hopopts_2292={{0x18}}, @hoplimit_2292={{0x14}}], 0x30}, 0x4804) [ 56.914239][ T23] kauditd_printk_skb: 2 callbacks suppressed [ 56.914288][ T23] audit: type=1400 audit(1680201446.149:135): avc: denied { write } for pid=4881 comm="syz-executor.1" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 18:37:26 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) r0 = syz_io_uring_setup(0x5ad, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f00000000c0)) io_uring_enter(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[0x13]}, 0x8) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f0000000340)=0x80) sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getpid() connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) getpid() socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r6 = syz_io_uring_setup(0x5af, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f0000000280)) io_uring_enter(r6, 0x40b3, 0x0, 0x0, &(0x7f0000000000)={[0x21]}, 0x8) 18:37:26 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg$inet6(r0, &(0x7f0000000640)={&(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c, &(0x7f0000000500)=[{&(0x7f00000001c0)='7', 0x1}, {0x0}, {0x0}, {&(0x7f00000003c0)="1b", 0x1}], 0x4, &(0x7f0000000580)=[@hopopts_2292={{0x18}}, @hoplimit_2292={{0x14}}], 0x30}, 0x4804) 18:37:26 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) r0 = syz_io_uring_setup(0x5ad, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f00000000c0)) io_uring_enter(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[0x13]}, 0x8) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f0000000340)=0x80) sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getpid() connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) getpid() socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r6 = syz_io_uring_setup(0x5af, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f0000000280)) io_uring_enter(r6, 0x40b3, 0x0, 0x0, &(0x7f0000000000)={[0x21]}, 0x8) 18:37:26 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) r0 = syz_io_uring_setup(0x5ad, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f00000000c0)) io_uring_enter(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[0x13]}, 0x8) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f0000000340)=0x80) sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getpid() connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) getpid() socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r6 = syz_io_uring_setup(0x5af, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f0000000280)) io_uring_enter(r6, 0x40b3, 0x0, 0x0, &(0x7f0000000000)={[0x21]}, 0x8) 18:37:26 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) r0 = syz_io_uring_setup(0x5ad, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f00000000c0)) io_uring_enter(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[0x13]}, 0x8) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f0000000340)=0x80) sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getpid() connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) getpid() socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r6 = syz_io_uring_setup(0x5af, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f0000000280)) io_uring_enter(r6, 0x40b3, 0x0, 0x0, &(0x7f0000000000)={[0x21]}, 0x8) 18:37:26 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg$inet6(r0, &(0x7f0000000640)={&(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c, &(0x7f0000000500)=[{&(0x7f00000001c0)='7', 0x1}, {0x0}, {0x0}, {&(0x7f00000003c0)="1b", 0x1}], 0x4, &(0x7f0000000580)=[@hopopts_2292={{0x18}}, @hoplimit_2292={{0x14}}], 0x30}, 0x4804) 18:37:26 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000130000000000000000850000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000100)='io_uring_register\x00', r0}, 0x10) r1 = io_uring_setup(0x1503, &(0x7f0000000080)) io_uring_register$IORING_REGISTER_BUFFERS(r1, 0x0, &(0x7f0000000840)=[{0x0}], 0x1) io_uring_register$IORING_REGISTER_BUFFERS_UPDATE(r1, 0x10, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000b80)=[{0x0}], &(0x7f0000000440)=[0x81], 0x1}, 0x20) 18:37:26 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) r0 = syz_io_uring_setup(0x5ad, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f00000000c0)) io_uring_enter(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[0x13]}, 0x8) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x3) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x61) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f0000000340)=0x80) sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getpid() connect$unix(r4, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) getpid() socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r6 = syz_io_uring_setup(0x5af, &(0x7f0000000100), &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000040), &(0x7f0000000280)) io_uring_enter(r6, 0x40b3, 0x0, 0x0, &(0x7f0000000000)={[0x21]}, 0x8) 18:37:26 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000130000000000000000850000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000100)='io_uring_register\x00', r0}, 0x10) r1 = io_uring_setup(0x1503, &(0x7f0000000080)) io_uring_register$IORING_REGISTER_BUFFERS(r1, 0x0, &(0x7f0000000840)=[{0x0}], 0x1) io_uring_register$IORING_REGISTER_BUFFERS_UPDATE(r1, 0x10, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000b80)=[{0x0}], &(0x7f0000000440)=[0x81], 0x1}, 0x20) 18:37:26 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000130000000000000000850000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000100)='io_uring_register\x00', r0}, 0x10) r1 = io_uring_setup(0x1503, &(0x7f0000000080)) io_uring_register$IORING_REGISTER_BUFFERS(r1, 0x0, &(0x7f0000000840)=[{0x0}], 0x1) io_uring_register$IORING_REGISTER_BUFFERS_UPDATE(r1, 0x10, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000b80)=[{0x0}], &(0x7f0000000440)=[0x81], 0x1}, 0x20) 18:37:26 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000130000000000000000850000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000100)='io_uring_register\x00', r0}, 0x10) r1 = io_uring_setup(0x1503, &(0x7f0000000080)) io_uring_register$IORING_REGISTER_BUFFERS(r1, 0x0, &(0x7f0000000840)=[{0x0}], 0x1) io_uring_register$IORING_REGISTER_BUFFERS_UPDATE(r1, 0x10, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000b80)=[{0x0}], &(0x7f0000000440)=[0x81], 0x1}, 0x20) 18:37:26 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000130000000000000000850000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000100)='io_uring_register\x00', r0}, 0x10) r1 = io_uring_setup(0x1503, &(0x7f0000000080)) io_uring_register$IORING_REGISTER_BUFFERS(r1, 0x0, &(0x7f0000000840)=[{0x0}], 0x1) io_uring_register$IORING_REGISTER_BUFFERS_UPDATE(r1, 0x10, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000b80)=[{0x0}], &(0x7f0000000440)=[0x81], 0x1}, 0x20) 18:37:28 executing program 3: syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, &(0x7f0000000bc0)=ANY=[], 0x1, 0x563, &(0x7f0000000640)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) r1 = open(&(0x7f0000000180)='./bus\x00', 0x143042, 0x0) pwritev2(r1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="ee", 0x1}], 0x1, 0x8000, 0x0, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000000)='THAWED\x00', 0x7) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[], 0x208e24b) ioctl$FS_IOC_RESVSP(r0, 0x40305829, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xcfff}) 18:37:28 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000130000000000000000850000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000100)='io_uring_register\x00', r0}, 0x10) r1 = io_uring_setup(0x1503, &(0x7f0000000080)) io_uring_register$IORING_REGISTER_BUFFERS(r1, 0x0, &(0x7f0000000840)=[{0x0}], 0x1) io_uring_register$IORING_REGISTER_BUFFERS_UPDATE(r1, 0x10, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000b80)=[{0x0}], &(0x7f0000000440)=[0x81], 0x1}, 0x20) 18:37:28 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x4) capset(&(0x7f00000000c0)={0x20080522}, &(0x7f0000000100)) writev(r0, &(0x7f0000001200)=[{&(0x7f0000000080)="580000001200add427323b472545b4560a117fffffff81004e220e227f000001925aa80020007b00090080007f000001e809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 18:37:28 executing program 4: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x10, &(0x7f00000004c0)={[{@journal_dev={'journal_dev', 0x3d, 0x865}}, {@noblock_validity}, {@nobh}, {@quota}, {@quota}, {@grpquota}]}, 0x1, 0x773, &(0x7f0000000fc0)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) r1 = openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat(r1, &(0x7f0000004400)='./bus\x00', 0x5a042, 0x0) renameat2(r1, &(0x7f0000000240)='./bus\x00', r1, &(0x7f00000001c0)='./file0\x00', 0x0) 18:37:28 executing program 2: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = memfd_create(&(0x7f0000000000)='e\xf4E\x88-\x00', 0x0) pwritev(r1, &(0x7f0000000040)=[{&(0x7f0000000480)="db", 0x1}], 0x1, 0x4000001, 0x0) sendfile(r0, r1, 0x0, 0x80000001) fcntl$setstatus(r0, 0x4, 0x42800) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=ANY=[], 0x178}, 0x0) sendfile(r0, r1, 0x0, 0x7ff) 18:37:28 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x4) capset(&(0x7f00000000c0)={0x20080522}, &(0x7f0000000100)) writev(r0, &(0x7f0000001200)=[{&(0x7f0000000080)="580000001200add427323b472545b4560a117fffffff81004e220e227f000001925aa80020007b00090080007f000001e809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) [ 58.947572][ T23] audit: type=1400 audit(1680201448.189:136): avc: denied { nlmsg_read } for pid=5292 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 58.953084][ T5293] loop3: detected capacity change from 0 to 1024 [ 59.010324][ T5299] loop4: detected capacity change from 0 to 2048 [ 59.032619][ T5299] EXT4-fs: Ignoring removed nobh option [ 59.040157][ T23] audit: type=1400 audit(1680201448.239:137): avc: denied { create } for pid=5297 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 59.042174][ T5293] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. [ 59.060005][ T23] audit: type=1400 audit(1680201448.239:138): avc: denied { write } for pid=5297 comm="syz-executor.2" path="socket:[20085]" dev="sockfs" ino=20085 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 18:37:28 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x4) capset(&(0x7f00000000c0)={0x20080522}, &(0x7f0000000100)) writev(r0, &(0x7f0000001200)=[{&(0x7f0000000080)="580000001200add427323b472545b4560a117fffffff81004e220e227f000001925aa80020007b00090080007f000001e809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 18:37:28 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000130000000000000000850000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000100)='io_uring_register\x00', r0}, 0x10) r1 = io_uring_setup(0x1503, &(0x7f0000000080)) io_uring_register$IORING_REGISTER_BUFFERS(r1, 0x0, &(0x7f0000000840)=[{0x0}], 0x1) io_uring_register$IORING_REGISTER_BUFFERS_UPDATE(r1, 0x10, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000b80)=[{0x0}], &(0x7f0000000440)=[0x81], 0x1}, 0x20) 18:37:28 executing program 0: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)={0x24, 0x1402, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz1\x00'}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}]}, 0x24}}, 0x0) [ 59.110510][ T5299] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. [ 59.114635][ T23] audit: type=1400 audit(1680201448.339:139): avc: denied { mount } for pid=5291 comm="syz-executor.3" name="/" dev="loop3" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 18:37:28 executing program 3: syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, &(0x7f0000000bc0)=ANY=[], 0x1, 0x563, &(0x7f0000000640)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) r1 = open(&(0x7f0000000180)='./bus\x00', 0x143042, 0x0) pwritev2(r1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="ee", 0x1}], 0x1, 0x8000, 0x0, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000000)='THAWED\x00', 0x7) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[], 0x208e24b) ioctl$FS_IOC_RESVSP(r0, 0x40305829, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xcfff}) 18:37:28 executing program 4: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x10, &(0x7f00000004c0)={[{@journal_dev={'journal_dev', 0x3d, 0x865}}, {@noblock_validity}, {@nobh}, {@quota}, {@quota}, {@grpquota}]}, 0x1, 0x773, &(0x7f0000000fc0)="$eJzs3ctrXFUYAPDvTl5tWk0EQesqIGigdGJqbBVcVFyIYKGga9thMg01k0zJTEoTAlpEcCOouBB007WPunPrY6v/hQtpqZoWKy4kcid30mkzk0ebZKzz+8FNzrmP+e53n2fmHmYC6Foj6Z9cxKGI+DCJGMrGJxHRVy/1RpxYne/W8lIxHZJYWXn996Q+z83lpWI0LZM6kFUej4gf3os4nFsft7qwOF0ol0tzWX2sNnN+rLqweOTcTGGqNFWaPTY+MXH0+HPHj+1crn/+vHjw2kevPP31ib/ffezKBz8mcSIOZtOa89gpIzGSbZO+dBPe4eWdDtZhSadXgHuSnpo9q2d5HIqh6KmXAID/s7cjYgUA6DKJ+z8AdJnG5wA3l5eKjaGzn0jsresvRcS+1fwbzzdXp/Rmz+z21Z+DDt5M7ngykkTE8A7EH4mIz79988t0iF16DgnQyjuXIuLM8Eh27Y/c2vUnWddnYbue2cI8I3fVXf9g73yXtn+eb9X+y621f6JF+2egxbl7LzY//3NXdyBMW2n778Wmvm23mvLPDPdktYfqbb6+5Oy5cim9tj0cEaPRN5DWxzeIMXrjnxvtpjW3//74+K0v0vjp/9tz5K72Dty5zGShVrifnJtdvxTxRG+r/JO1/Z+0af+e2mKMV194/7N209L803wbw/r8I/avX2xlp/qbrVyOeKrl/r8dIdmwf+JY/XAYaxwULXzzy6eD7eI37/90SOM33gvshXT/D26c/3DS3F+zuv0YP10e+r7dtM3zb3389ydv1Mv92biLhVptbjyiP3lt/fijt5dt1Bvzp/mPPtn6/N/o+E/fE57ZYv6913776t7z311p/pPb2v/bL1y5Nd3TOvpqD+PN9/9EvTSajdnK9W+rK3g/2w4AAAAAAAAAAAAAAAAAAAAAAAAAtioXEQcjyeXXyrlcPr/6G96PxmCuXKnWDp+tzM9ORv23soejL9f4qsuhpu9DHc++D79RP3pX/dmIeCQiPhnYX6/ni5XyZKeTBwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIDMgTa//5/6daDTawcA7Jp9nV4BAGDPuf8DQPdx/weA7uP+DwDdx/0fALqP+z8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC77NTJk+mw8tfyUjGtT15YmJ+uXDgyWapO52fmi/liZe58fqpSmSqX8sXKzGavV65Uzk/E7PzFsVqpWhurLiyenqnMz9ZOn5spTJVOl/r2JCsAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA2J7qwuJ0oVwuzSkodLiwPzsm/yvr82AW+rOteL+v08GLEgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMAD5N8AAAD//8TbIu0=") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) r1 = openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat(r1, &(0x7f0000004400)='./bus\x00', 0x5a042, 0x0) renameat2(r1, &(0x7f0000000240)='./bus\x00', r1, &(0x7f00000001c0)='./file0\x00', 0x0) 18:37:28 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x4) capset(&(0x7f00000000c0)={0x20080522}, &(0x7f0000000100)) writev(r0, &(0x7f0000001200)=[{&(0x7f0000000080)="580000001200add427323b472545b4560a117fffffff81004e220e227f000001925aa80020007b00090080007f000001e809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) [ 59.144695][ T23] audit: type=1400 audit(1680201448.339:140): avc: denied { write } for pid=5291 comm="syz-executor.3" name="/" dev="loop3" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 59.166651][ T23] audit: type=1400 audit(1680201448.339:141): avc: denied { add_name } for pid=5291 comm="syz-executor.3" name="freezer.self_freezing" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 59.189084][ T23] audit: type=1400 audit(1680201448.339:142): avc: denied { create } for pid=5291 comm="syz-executor.3" name="freezer.self_freezing" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 18:37:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x10, &(0x7f00000004c0)={[{@journal_dev={'journal_dev', 0x3d, 0x865}}, {@noblock_validity}, {@nobh}, {@quota}, {@quota}, {@grpquota}]}, 0x1, 0x773, &(0x7f0000000fc0)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) r1 = openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat(r1, &(0x7f0000004400)='./bus\x00', 0x5a042, 0x0) renameat2(r1, &(0x7f0000000240)='./bus\x00', r1, &(0x7f00000001c0)='./file0\x00', 0x0) [ 59.211219][ T23] audit: type=1400 audit(1680201448.349:143): avc: denied { read append open } for pid=5291 comm="syz-executor.3" path="/root/syzkaller-testdir1523085914/syzkaller.3LCECB/31/file0/freezer.self_freezing" dev="loop3" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 59.240945][ T23] audit: type=1400 audit(1680201448.349:144): avc: denied { write } for pid=5291 comm="syz-executor.3" path="/root/syzkaller-testdir1523085914/syzkaller.3LCECB/31/file0/bus" dev="loop3" ino=19 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 59.275346][ T3139] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 59.279753][ T3143] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 59.301108][ T5315] loop5: detected capacity change from 0 to 2048 18:37:28 executing program 0: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)={0x24, 0x1402, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz1\x00'}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}]}, 0x24}}, 0x0) 18:37:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x10, &(0x7f00000004c0)={[{@journal_dev={'journal_dev', 0x3d, 0x865}}, {@noblock_validity}, {@nobh}, {@quota}, {@quota}, {@grpquota}]}, 0x1, 0x773, &(0x7f0000000fc0)="$eJzs3ctrXFUYAPDvTl5tWk0EQesqIGigdGJqbBVcVFyIYKGga9thMg01k0zJTEoTAlpEcCOouBB007WPunPrY6v/hQtpqZoWKy4kcid30mkzk0ebZKzz+8FNzrmP+e53n2fmHmYC6Foj6Z9cxKGI+DCJGMrGJxHRVy/1RpxYne/W8lIxHZJYWXn996Q+z83lpWI0LZM6kFUej4gf3os4nFsft7qwOF0ol0tzWX2sNnN+rLqweOTcTGGqNFWaPTY+MXH0+HPHj+1crn/+vHjw2kevPP31ib/ffezKBz8mcSIOZtOa89gpIzGSbZO+dBPe4eWdDtZhSadXgHuSnpo9q2d5HIqh6KmXAID/s7cjYgUA6DKJ+z8AdJnG5wA3l5eKjaGzn0jsresvRcS+1fwbzzdXp/Rmz+z21Z+DDt5M7ngykkTE8A7EH4mIz79988t0iF16DgnQyjuXIuLM8Eh27Y/c2vUnWddnYbue2cI8I3fVXf9g73yXtn+eb9X+y621f6JF+2egxbl7LzY//3NXdyBMW2n778Wmvm23mvLPDPdktYfqbb6+5Oy5cim9tj0cEaPRN5DWxzeIMXrjnxvtpjW3//74+K0v0vjp/9tz5K72Dty5zGShVrifnJtdvxTxRG+r/JO1/Z+0af+e2mKMV194/7N209L803wbw/r8I/avX2xlp/qbrVyOeKrl/r8dIdmwf+JY/XAYaxwULXzzy6eD7eI37/90SOM33gvshXT/D26c/3DS3F+zuv0YP10e+r7dtM3zb3389ydv1Mv92biLhVptbjyiP3lt/fijt5dt1Bvzp/mPPtn6/N/o+E/fE57ZYv6913776t7z311p/pPb2v/bL1y5Nd3TOvpqD+PN9/9EvTSajdnK9W+rK3g/2w4AAAAAAAAAAAAAAAAAAAAAAAAAtioXEQcjyeXXyrlcPr/6G96PxmCuXKnWDp+tzM9ORv23soejL9f4qsuhpu9DHc++D79RP3pX/dmIeCQiPhnYX6/ni5XyZKeTBwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIDMgTa//5/6daDTawcA7Jp9nV4BAGDPuf8DQPdx/weA7uP+DwDdx/0fALqP+z8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC77NTJk+mw8tfyUjGtT15YmJ+uXDgyWapO52fmi/liZe58fqpSmSqX8sXKzGavV65Uzk/E7PzFsVqpWhurLiyenqnMz9ZOn5spTJVOl/r2JCsAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA2J7qwuJ0oVwuzSkodLiwPzsm/yvr82AW+rOteL+v08GLEgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMAD5N8AAAD//8TbIu0=") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) r1 = openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat(r1, &(0x7f0000004400)='./bus\x00', 0x5a042, 0x0) renameat2(r1, &(0x7f0000000240)='./bus\x00', r1, &(0x7f00000001c0)='./file0\x00', 0x0) 18:37:28 executing program 0: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)={0x24, 0x1402, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz1\x00'}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}]}, 0x24}}, 0x0) [ 59.345738][ T5321] loop3: detected capacity change from 0 to 1024 [ 59.349548][ T5320] loop4: detected capacity change from 0 to 2048 [ 59.373765][ T5321] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. [ 59.381674][ T5326] loop1: detected capacity change from 0 to 2048 [ 59.407359][ T5315] EXT4-fs: Ignoring removed nobh option [ 59.409592][ T5320] EXT4-fs: Ignoring removed nobh option [ 59.424813][ T5326] EXT4-fs: Ignoring removed nobh option [ 59.440306][ T5326] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. [ 59.454105][ T5315] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. [ 59.465258][ T5320] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. [ 59.489333][ T3143] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 59.506566][ T3130] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 59.516791][ T3139] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 59.539492][ T3128] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. 18:37:29 executing program 2: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = memfd_create(&(0x7f0000000000)='e\xf4E\x88-\x00', 0x0) pwritev(r1, &(0x7f0000000040)=[{&(0x7f0000000480)="db", 0x1}], 0x1, 0x4000001, 0x0) sendfile(r0, r1, 0x0, 0x80000001) fcntl$setstatus(r0, 0x4, 0x42800) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=ANY=[], 0x178}, 0x0) sendfile(r0, r1, 0x0, 0x7ff) 18:37:29 executing program 0: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)={0x24, 0x1402, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz1\x00'}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}]}, 0x24}}, 0x0) 18:37:29 executing program 3: syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, &(0x7f0000000bc0)=ANY=[], 0x1, 0x563, &(0x7f0000000640)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) r1 = open(&(0x7f0000000180)='./bus\x00', 0x143042, 0x0) pwritev2(r1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="ee", 0x1}], 0x1, 0x8000, 0x0, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000000)='THAWED\x00', 0x7) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[], 0x208e24b) ioctl$FS_IOC_RESVSP(r0, 0x40305829, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xcfff}) 18:37:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x10, &(0x7f00000004c0)={[{@journal_dev={'journal_dev', 0x3d, 0x865}}, {@noblock_validity}, {@nobh}, {@quota}, {@quota}, {@grpquota}]}, 0x1, 0x773, &(0x7f0000000fc0)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) r1 = openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat(r1, &(0x7f0000004400)='./bus\x00', 0x5a042, 0x0) renameat2(r1, &(0x7f0000000240)='./bus\x00', r1, &(0x7f00000001c0)='./file0\x00', 0x0) 18:37:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x10, &(0x7f00000004c0)={[{@journal_dev={'journal_dev', 0x3d, 0x865}}, {@noblock_validity}, {@nobh}, {@quota}, {@quota}, {@grpquota}]}, 0x1, 0x773, &(0x7f0000000fc0)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) r1 = openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat(r1, &(0x7f0000004400)='./bus\x00', 0x5a042, 0x0) renameat2(r1, &(0x7f0000000240)='./bus\x00', r1, &(0x7f00000001c0)='./file0\x00', 0x0) 18:37:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x10, &(0x7f00000004c0)={[{@journal_dev={'journal_dev', 0x3d, 0x865}}, {@noblock_validity}, {@nobh}, {@quota}, {@quota}, {@grpquota}]}, 0x1, 0x773, &(0x7f0000000fc0)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) r1 = openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat(r1, &(0x7f0000004400)='./bus\x00', 0x5a042, 0x0) renameat2(r1, &(0x7f0000000240)='./bus\x00', r1, &(0x7f00000001c0)='./file0\x00', 0x0) 18:37:29 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = memfd_create(&(0x7f0000000000)='e\xf4E\x88-\x00', 0x0) pwritev(r1, &(0x7f0000000040)=[{&(0x7f0000000480)="db", 0x1}], 0x1, 0x4000001, 0x0) sendfile(r0, r1, 0x0, 0x80000001) fcntl$setstatus(r0, 0x4, 0x42800) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=ANY=[], 0x178}, 0x0) sendfile(r0, r1, 0x0, 0x7ff) [ 59.869444][ T5344] loop3: detected capacity change from 0 to 1024 [ 59.884715][ T5343] loop1: detected capacity change from 0 to 2048 [ 59.889737][ T5340] loop4: detected capacity change from 0 to 2048 [ 59.893991][ T5343] EXT4-fs: Ignoring removed nobh option [ 59.904336][ T5341] loop5: detected capacity change from 0 to 2048 [ 59.919485][ T5340] EXT4-fs: Ignoring removed nobh option [ 59.919979][ T5344] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. [ 59.944459][ T5341] EXT4-fs: Ignoring removed nobh option 18:37:29 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = memfd_create(&(0x7f0000000000)='e\xf4E\x88-\x00', 0x0) pwritev(r1, &(0x7f0000000040)=[{&(0x7f0000000480)="db", 0x1}], 0x1, 0x4000001, 0x0) sendfile(r0, r1, 0x0, 0x80000001) fcntl$setstatus(r0, 0x4, 0x42800) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=ANY=[], 0x178}, 0x0) sendfile(r0, r1, 0x0, 0x7ff) 18:37:29 executing program 2: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = memfd_create(&(0x7f0000000000)='e\xf4E\x88-\x00', 0x0) pwritev(r1, &(0x7f0000000040)=[{&(0x7f0000000480)="db", 0x1}], 0x1, 0x4000001, 0x0) sendfile(r0, r1, 0x0, 0x80000001) fcntl$setstatus(r0, 0x4, 0x42800) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=ANY=[], 0x178}, 0x0) sendfile(r0, r1, 0x0, 0x7ff) [ 59.974552][ T5343] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. [ 59.989128][ T5340] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. [ 60.030526][ T5341] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. 18:37:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x10, &(0x7f00000004c0)={[{@journal_dev={'journal_dev', 0x3d, 0x865}}, {@noblock_validity}, {@nobh}, {@quota}, {@quota}, {@grpquota}]}, 0x1, 0x773, &(0x7f0000000fc0)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) r1 = openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat(r1, &(0x7f0000004400)='./bus\x00', 0x5a042, 0x0) renameat2(r1, &(0x7f0000000240)='./bus\x00', r1, &(0x7f00000001c0)='./file0\x00', 0x0) [ 60.096652][ T5361] ================================================================== [ 60.098565][ T3130] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 60.104766][ T5361] BUG: KCSAN: data-race in fasync_insert_entry / sock_sendpage [ 60.121242][ T5361] [ 60.123582][ T5361] read-write to 0xffff888124f2dc40 of 4 bytes by task 5363 on cpu 1: [ 60.131662][ T5361] fasync_insert_entry+0x124/0x150 [ 60.136799][ T5361] fasync_helper+0x5d/0xc0 [ 60.141228][ T5361] sock_fasync+0x60/0xd0 [ 60.145483][ T5361] do_fcntl+0xcd2/0xef0 [ 60.149647][ T5361] __se_sys_fcntl+0xc4/0x180 [ 60.154247][ T5361] __x64_sys_fcntl+0x43/0x50 [ 60.158850][ T5361] do_syscall_64+0x41/0xc0 [ 60.163277][ T5361] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 60.169181][ T5361] [ 60.171517][ T5361] read to 0xffff888124f2dc40 of 4 bytes by task 5361 on cpu 0: [ 60.179062][ T5361] sock_sendpage+0x3e/0xa0 [ 60.183504][ T5361] pipe_to_sendpage+0x12e/0x160 [ 60.188372][ T5361] __splice_from_pipe+0x200/0x4a0 [ 60.193411][ T5361] generic_splice_sendpage+0x9a/0xd0 [ 60.198709][ T5361] direct_splice_actor+0x84/0xa0 [ 60.203662][ T5361] splice_direct_to_actor+0x2ee/0x5f0 [ 60.209051][ T5361] do_splice_direct+0x104/0x180 [ 60.213918][ T5361] do_sendfile+0x3b8/0x950 [ 60.218337][ T5361] __x64_sys_sendfile64+0x110/0x150 [ 60.223567][ T5361] do_syscall_64+0x41/0xc0 [ 60.227997][ T5361] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 60.233997][ T5361] [ 60.236333][ T5361] value changed: 0x00000002 -> 0x00042802 [ 60.242046][ T5361] 18:37:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x10, &(0x7f00000004c0)={[{@journal_dev={'journal_dev', 0x3d, 0x865}}, {@noblock_validity}, {@nobh}, {@quota}, {@quota}, {@grpquota}]}, 0x1, 0x773, &(0x7f0000000fc0)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) r1 = openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat(r1, &(0x7f0000004400)='./bus\x00', 0x5a042, 0x0) renameat2(r1, &(0x7f0000000240)='./bus\x00', r1, &(0x7f00000001c0)='./file0\x00', 0x0) 18:37:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x10, &(0x7f00000004c0)={[{@journal_dev={'journal_dev', 0x3d, 0x865}}, {@noblock_validity}, {@nobh}, {@quota}, {@quota}, {@grpquota}]}, 0x1, 0x773, &(0x7f0000000fc0)="$eJzs3ctrXFUYAPDvTl5tWk0EQesqIGigdGJqbBVcVFyIYKGga9thMg01k0zJTEoTAlpEcCOouBB007WPunPrY6v/hQtpqZoWKy4kcid30mkzk0ebZKzz+8FNzrmP+e53n2fmHmYC6Foj6Z9cxKGI+DCJGMrGJxHRVy/1RpxYne/W8lIxHZJYWXn996Q+z83lpWI0LZM6kFUej4gf3os4nFsft7qwOF0ol0tzWX2sNnN+rLqweOTcTGGqNFWaPTY+MXH0+HPHj+1crn/+vHjw2kevPP31ib/ffezKBz8mcSIOZtOa89gpIzGSbZO+dBPe4eWdDtZhSadXgHuSnpo9q2d5HIqh6KmXAID/s7cjYgUA6DKJ+z8AdJnG5wA3l5eKjaGzn0jsresvRcS+1fwbzzdXp/Rmz+z21Z+DDt5M7ngykkTE8A7EH4mIz79988t0iF16DgnQyjuXIuLM8Eh27Y/c2vUnWddnYbue2cI8I3fVXf9g73yXtn+eb9X+y621f6JF+2egxbl7LzY//3NXdyBMW2n778Wmvm23mvLPDPdktYfqbb6+5Oy5cim9tj0cEaPRN5DWxzeIMXrjnxvtpjW3//74+K0v0vjp/9tz5K72Dty5zGShVrifnJtdvxTxRG+r/JO1/Z+0af+e2mKMV194/7N209L803wbw/r8I/avX2xlp/qbrVyOeKrl/r8dIdmwf+JY/XAYaxwULXzzy6eD7eI37/90SOM33gvshXT/D26c/3DS3F+zuv0YP10e+r7dtM3zb3389ydv1Mv92biLhVptbjyiP3lt/fijt5dt1Bvzp/mPPtn6/N/o+E/fE57ZYv6913776t7z311p/pPb2v/bL1y5Nd3TOvpqD+PN9/9EvTSajdnK9W+rK3g/2w4AAAAAAAAAAAAAAAAAAAAAAAAAtioXEQcjyeXXyrlcPr/6G96PxmCuXKnWDp+tzM9ORv23soejL9f4qsuhpu9DHc++D79RP3pX/dmIeCQiPhnYX6/ni5XyZKeTBwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIDMgTa//5/6daDTawcA7Jp9nV4BAGDPuf8DQPdx/weA7uP+DwDdx/0fALqP+z8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC77NTJk+mw8tfyUjGtT15YmJ+uXDgyWapO52fmi/liZe58fqpSmSqX8sXKzGavV65Uzk/E7PzFsVqpWhurLiyenqnMz9ZOn5spTJVOl/r2JCsAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA2J7qwuJ0oVwuzSkodLiwPzsm/yvr82AW+rOteL+v08GLEgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMAD5N8AAAD//8TbIu0=") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) r1 = openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat(r1, &(0x7f0000004400)='./bus\x00', 0x5a042, 0x0) renameat2(r1, &(0x7f0000000240)='./bus\x00', r1, &(0x7f00000001c0)='./file0\x00', 0x0) 18:37:29 executing program 3: syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, &(0x7f0000000bc0)=ANY=[], 0x1, 0x563, &(0x7f0000000640)="$eJzs3c9vFFUcAPDvm/7gR9EWYlQ8aBNjIFFaWsAQ4wHuhOCPmxdXWgiy/Ait0aIHSPBiYrx4MPHkQfwvlOjVkzcPXjwZEmIMRxPXzHamLHS3tGXXqcznk0w7b95uvm9289038/bNbAC1NZn/ySL2RsTlFDHeUTccReXk8uPu/vXJ6XxJ0Wq99WeKVGwrH5+K/2PFk7dHxC8/ptgztDruwtLV841mc/5KUZ5evHB5emHp6oFzFxpn58/OX5x9dfbokcNHjs4c7Nu+nrjx/ofjn51859uv/04z3/12MsWx2FXUde5Hv0zG5Mpr0il/XY/2O1hFhor96XyL03CFDWJDyvdvJCKeifEYintv3nh8+kaljQMGqpUiWkBNJfkPNVUeB5Tn9oM4Dwa2pjvHlwcAVuf/8PLYYGxvjw3svJuic1gnRUQ/RubyGD//dPJGvsSAxuGA7q5dj4hnu+V/aufmRHsUP8//7L78zyLiVPE/3/7mJuNPPlCW//DfeZT8f7cj/9/bZHz5DwAAAAAAAP1z63hEvNLt+79sZf5PdJn/MxYRx/oQ/+Hf/2W3+xAG6OLO8YjXu87/zcqHTAwVpSfa8wFG0plzzfmDEfFkROyPkW15eWaNGAc+3/NVr7rO+X/5kscv5wIW7bg9vO3+58w1FhuPss/AsjvXI57rOv83rfT/qUv/n38eXF5njD0v3TzVq+7h+Q8MSuubiH1d+/97d65Ia9+fY7p9PDBdHhWs9vzHX3zfK778h+rk/f/OtfN/InXer2dh4zEOLQ23etVt9vh/NL3dvuXMaLHto8bi4pWZiNF0YvX22Y23GR5HZT6U+ZLn//4X1x7/63b8vyMirq0z5tP/jP3eq07/D9XJ839uQ/3/xldmb0780Cv++vr/w+0+fX+xxfgfrG29CVp1OwEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADg/yiLiF2RsqmV9SybmooYi4inYmfWvLSw+PKZSx9cnMvr2r//n5W/9Du+XE7l7/9PdJRnHygfiojdEfHl0I52eer0peZc1TsPAAAAAAAAAAAAAAAAAAAAW8RYj+v/c38MVd06YOCGq24AUBn5D/Ul/6G+5D/Ul/yH+pL/UF/yH+pL/kN9yX+oL/kPAAAAAACPld0v3Po1RcS113a0l9xoUTdSacuAQcuqbgBQGbf4gfoy9Qfqyzk+kB5Sv33TzwQAAAAAAAAAAAAA+mXfXtf/Q125/h/qy/X/UF+u/4f6co4PuP4fAAAAAAAAAAAAALa+haWr5xvN5vwVK1asWFlZqfqTCQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAKP0bAAD//zn7JB8=") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) r1 = open(&(0x7f0000000180)='./bus\x00', 0x143042, 0x0) pwritev2(r1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="ee", 0x1}], 0x1, 0x8000, 0x0, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000000)='THAWED\x00', 0x7) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[], 0x208e24b) ioctl$FS_IOC_RESVSP(r0, 0x40305829, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xcfff}) [ 60.244362][ T5361] Reported by Kernel Concurrency Sanitizer on: [ 60.250518][ T5361] CPU: 0 PID: 5361 Comm: syz-executor.2 Not tainted 6.3.0-rc4-syzkaller-00051-g8bb95a1662f8 #0 [ 60.261025][ T5361] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 [ 60.271082][ T5361] ================================================================== [ 60.283644][ T3128] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. 18:37:29 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = memfd_create(&(0x7f0000000000)='e\xf4E\x88-\x00', 0x0) pwritev(r1, &(0x7f0000000040)=[{&(0x7f0000000480)="db", 0x1}], 0x1, 0x4000001, 0x0) sendfile(r0, r1, 0x0, 0x80000001) fcntl$setstatus(r0, 0x4, 0x42800) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=ANY=[], 0x178}, 0x0) sendfile(r0, r1, 0x0, 0x7ff) [ 60.293469][ T3139] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 60.309035][ T3143] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. 18:37:29 executing program 2: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = memfd_create(&(0x7f0000000000)='e\xf4E\x88-\x00', 0x0) pwritev(r1, &(0x7f0000000040)=[{&(0x7f0000000480)="db", 0x1}], 0x1, 0x4000001, 0x0) sendfile(r0, r1, 0x0, 0x80000001) fcntl$setstatus(r0, 0x4, 0x42800) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=ANY=[], 0x178}, 0x0) sendfile(r0, r1, 0x0, 0x7ff) [ 60.386101][ T5372] loop3: detected capacity change from 0 to 1024 [ 60.387368][ T5365] loop1: detected capacity change from 0 to 2048 [ 60.404405][ T5369] loop4: detected capacity change from 0 to 2048 [ 60.406552][ T5373] loop5: detected capacity change from 0 to 2048 [ 60.423013][ T5372] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. [ 60.428658][ T5369] EXT4-fs: Ignoring removed nobh option [ 60.436301][ T5373] EXT4-fs: Ignoring removed nobh option [ 60.450403][ T5365] EXT4-fs: Ignoring removed nobh option [ 60.466865][ T5373] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. 18:37:29 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = memfd_create(&(0x7f0000000000)='e\xf4E\x88-\x00', 0x0) pwritev(r1, &(0x7f0000000040)=[{&(0x7f0000000480)="db", 0x1}], 0x1, 0x4000001, 0x0) sendfile(r0, r1, 0x0, 0x80000001) fcntl$setstatus(r0, 0x4, 0x42800) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=ANY=[], 0x178}, 0x0) sendfile(r0, r1, 0x0, 0x7ff) [ 60.493269][ T5365] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. [ 60.515230][ T5369] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. [ 60.529895][ T3128] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. 18:37:29 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = memfd_create(&(0x7f0000000000)='e\xf4E\x88-\x00', 0x0) pwritev(r1, &(0x7f0000000040)=[{&(0x7f0000000480)="db", 0x1}], 0x1, 0x4000001, 0x0) sendfile(r0, r1, 0x0, 0x80000001) fcntl$setstatus(r0, 0x4, 0x42800) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=ANY=[], 0x178}, 0x0) sendfile(r0, r1, 0x0, 0x7ff) 18:37:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x10, &(0x7f00000004c0)={[{@journal_dev={'journal_dev', 0x3d, 0x865}}, {@noblock_validity}, {@nobh}, {@quota}, {@quota}, {@grpquota}]}, 0x1, 0x773, &(0x7f0000000fc0)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) r1 = openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat(r1, &(0x7f0000004400)='./bus\x00', 0x5a042, 0x0) renameat2(r1, &(0x7f0000000240)='./bus\x00', r1, &(0x7f00000001c0)='./file0\x00', 0x0) [ 60.543637][ T3143] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 60.582542][ T3130] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 18:37:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, &(0x7f0000000bc0)=ANY=[], 0x1, 0x563, &(0x7f0000000640)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) r1 = open(&(0x7f0000000180)='./bus\x00', 0x143042, 0x0) pwritev2(r1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="ee", 0x1}], 0x1, 0x8000, 0x0, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000000)='THAWED\x00', 0x7) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[], 0x208e24b) ioctl$FS_IOC_RESVSP(r0, 0x40305829, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xcfff}) 18:37:29 executing program 2: syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, &(0x7f0000000bc0)=ANY=[], 0x1, 0x563, &(0x7f0000000640)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) r1 = open(&(0x7f0000000180)='./bus\x00', 0x143042, 0x0) pwritev2(r1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="ee", 0x1}], 0x1, 0x8000, 0x0, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000000)='THAWED\x00', 0x7) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[], 0x208e24b) ioctl$FS_IOC_RESVSP(r0, 0x40305829, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xcfff}) [ 60.616258][ T3139] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. 18:37:29 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = memfd_create(&(0x7f0000000000)='e\xf4E\x88-\x00', 0x0) pwritev(r1, &(0x7f0000000040)=[{&(0x7f0000000480)="db", 0x1}], 0x1, 0x4000001, 0x0) sendfile(r0, r1, 0x0, 0x80000001) fcntl$setstatus(r0, 0x4, 0x42800) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=ANY=[], 0x178}, 0x0) sendfile(r0, r1, 0x0, 0x7ff) [ 60.688297][ T5391] loop1: detected capacity change from 0 to 2048 [ 60.694192][ T5395] loop4: detected capacity change from 0 to 1024 [ 60.699901][ T5393] loop2: detected capacity change from 0 to 1024 [ 60.710176][ T5391] EXT4-fs: Ignoring removed nobh option [ 60.719117][ T5395] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. 18:37:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x10, &(0x7f00000004c0)={[{@journal_dev={'journal_dev', 0x3d, 0x865}}, {@noblock_validity}, {@nobh}, {@quota}, {@quota}, {@grpquota}]}, 0x1, 0x773, &(0x7f0000000fc0)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) r1 = openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat(r1, &(0x7f0000004400)='./bus\x00', 0x5a042, 0x0) renameat2(r1, &(0x7f0000000240)='./bus\x00', r1, &(0x7f00000001c0)='./file0\x00', 0x0) [ 60.741763][ T5393] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. [ 60.765949][ T5391] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. 18:37:30 executing program 4: syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, &(0x7f0000000bc0)=ANY=[], 0x1, 0x563, &(0x7f0000000640)="$eJzs3c9vFFUcAPDvm/7gR9EWYlQ8aBNjIFFaWsAQ4wHuhOCPmxdXWgiy/Ait0aIHSPBiYrx4MPHkQfwvlOjVkzcPXjwZEmIMRxPXzHamLHS3tGXXqcznk0w7b95uvm9289038/bNbAC1NZn/ySL2RsTlFDHeUTccReXk8uPu/vXJ6XxJ0Wq99WeKVGwrH5+K/2PFk7dHxC8/ptgztDruwtLV841mc/5KUZ5evHB5emHp6oFzFxpn58/OX5x9dfbokcNHjs4c7Nu+nrjx/ofjn51859uv/04z3/12MsWx2FXUde5Hv0zG5Mpr0il/XY/2O1hFhor96XyL03CFDWJDyvdvJCKeifEYintv3nh8+kaljQMGqpUiWkBNJfkPNVUeB5Tn9oM4Dwa2pjvHlwcAVuf/8PLYYGxvjw3svJuic1gnRUQ/RubyGD//dPJGvsSAxuGA7q5dj4hnu+V/aufmRHsUP8//7L78zyLiVPE/3/7mJuNPPlCW//DfeZT8f7cj/9/bZHz5DwAAAAAAAP1z63hEvNLt+79sZf5PdJn/MxYRx/oQ/+Hf/2W3+xAG6OLO8YjXu87/zcqHTAwVpSfa8wFG0plzzfmDEfFkROyPkW15eWaNGAc+3/NVr7rO+X/5kscv5wIW7bg9vO3+58w1FhuPss/AsjvXI57rOv83rfT/qUv/n38eXF5njD0v3TzVq+7h+Q8MSuubiH1d+/97d65Ia9+fY7p9PDBdHhWs9vzHX3zfK778h+rk/f/OtfN/InXer2dh4zEOLQ23etVt9vh/NL3dvuXMaLHto8bi4pWZiNF0YvX22Y23GR5HZT6U+ZLn//4X1x7/63b8vyMirq0z5tP/jP3eq07/D9XJ839uQ/3/xldmb0780Cv++vr/w+0+fX+xxfgfrG29CVp1OwEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADg/yiLiF2RsqmV9SybmooYi4inYmfWvLSw+PKZSx9cnMvr2r//n5W/9Du+XE7l7/9PdJRnHygfiojdEfHl0I52eer0peZc1TsPAAAAAAAAAAAAAAAAAAAAW8RYj+v/c38MVd06YOCGq24AUBn5D/Ul/6G+5D/Ul/yH+pL/UF/yH+pL/kN9yX+oL/kPAAAAAACPld0v3Po1RcS113a0l9xoUTdSacuAQcuqbgBQGbf4gfoy9Qfqyzk+kB5Sv33TzwQAAAAAAAAAAAAA+mXfXtf/Q125/h/qy/X/UF+u/4f6co4PuP4fAAAAAAAAAAAAALa+haWr5xvN5vwVK1asWFlZqfqTCQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAKP0bAAD//zn7JB8=") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) r1 = open(&(0x7f0000000180)='./bus\x00', 0x143042, 0x0) pwritev2(r1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="ee", 0x1}], 0x1, 0x8000, 0x0, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000000)='THAWED\x00', 0x7) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[], 0x208e24b) ioctl$FS_IOC_RESVSP(r0, 0x40305829, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xcfff}) 18:37:30 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = memfd_create(&(0x7f0000000000)='e\xf4E\x88-\x00', 0x0) pwritev(r1, &(0x7f0000000040)=[{&(0x7f0000000480)="db", 0x1}], 0x1, 0x4000001, 0x0) sendfile(r0, r1, 0x0, 0x80000001) fcntl$setstatus(r0, 0x4, 0x42800) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=ANY=[], 0x178}, 0x0) sendfile(r0, r1, 0x0, 0x7ff) 18:37:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, &(0x7f0000000bc0)=ANY=[], 0x1, 0x563, &(0x7f0000000640)="$eJzs3c9vFFUcAPDvm/7gR9EWYlQ8aBNjIFFaWsAQ4wHuhOCPmxdXWgiy/Ait0aIHSPBiYrx4MPHkQfwvlOjVkzcPXjwZEmIMRxPXzHamLHS3tGXXqcznk0w7b95uvm9289038/bNbAC1NZn/ySL2RsTlFDHeUTccReXk8uPu/vXJ6XxJ0Wq99WeKVGwrH5+K/2PFk7dHxC8/ptgztDruwtLV841mc/5KUZ5evHB5emHp6oFzFxpn58/OX5x9dfbokcNHjs4c7Nu+nrjx/ofjn51859uv/04z3/12MsWx2FXUde5Hv0zG5Mpr0il/XY/2O1hFhor96XyL03CFDWJDyvdvJCKeifEYintv3nh8+kaljQMGqpUiWkBNJfkPNVUeB5Tn9oM4Dwa2pjvHlwcAVuf/8PLYYGxvjw3svJuic1gnRUQ/RubyGD//dPJGvsSAxuGA7q5dj4hnu+V/aufmRHsUP8//7L78zyLiVPE/3/7mJuNPPlCW//DfeZT8f7cj/9/bZHz5DwAAAAAAAP1z63hEvNLt+79sZf5PdJn/MxYRx/oQ/+Hf/2W3+xAG6OLO8YjXu87/zcqHTAwVpSfa8wFG0plzzfmDEfFkROyPkW15eWaNGAc+3/NVr7rO+X/5kscv5wIW7bg9vO3+58w1FhuPss/AsjvXI57rOv83rfT/qUv/n38eXF5njD0v3TzVq+7h+Q8MSuubiH1d+/97d65Ia9+fY7p9PDBdHhWs9vzHX3zfK778h+rk/f/OtfN/InXer2dh4zEOLQ23etVt9vh/NL3dvuXMaLHto8bi4pWZiNF0YvX22Y23GR5HZT6U+ZLn//4X1x7/63b8vyMirq0z5tP/jP3eq07/D9XJ839uQ/3/xldmb0780Cv++vr/w+0+fX+xxfgfrG29CVp1OwEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADg/yiLiF2RsqmV9SybmooYi4inYmfWvLSw+PKZSx9cnMvr2r//n5W/9Du+XE7l7/9PdJRnHygfiojdEfHl0I52eer0peZc1TsPAAAAAAAAAAAAAAAAAAAAW8RYj+v/c38MVd06YOCGq24AUBn5D/Ul/6G+5D/Ul/yH+pL/UF/yH+pL/kN9yX+oL/kPAAAAAACPld0v3Po1RcS113a0l9xoUTdSacuAQcuqbgBQGbf4gfoy9Qfqyzk+kB5Sv33TzwQAAAAAAAAAAAAA+mXfXtf/Q125/h/qy/X/UF+u/4f6co4PuP4fAAAAAAAAAAAAALa+haWr5xvN5vwVK1asWFlZqfqTCQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAKP0bAAD//zn7JB8=") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) r1 = open(&(0x7f0000000180)='./bus\x00', 0x143042, 0x0) pwritev2(r1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="ee", 0x1}], 0x1, 0x8000, 0x0, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000000)='THAWED\x00', 0x7) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[], 0x208e24b) ioctl$FS_IOC_RESVSP(r0, 0x40305829, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xcfff}) [ 60.804156][ T3130] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 60.828741][ T3139] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 60.865384][ T3131] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 60.870580][ T5406] loop1: detected capacity change from 0 to 2048 [ 60.878290][ T3400] I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 [ 60.882314][ T5406] EXT4-fs: Ignoring removed nobh option [ 60.916679][ T5406] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. [ 60.950695][ T5412] loop4: detected capacity change from 0 to 1024 [ 60.959627][ T5414] loop2: detected capacity change from 0 to 1024 [ 60.974005][ T5414] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. [ 60.994968][ T3130] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 61.003781][ T5412] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. [ 61.057841][ T3131] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 61.082631][ T3139] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. 18:37:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, &(0x7f0000000bc0)=ANY=[], 0x1, 0x563, &(0x7f0000000640)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) r1 = open(&(0x7f0000000180)='./bus\x00', 0x143042, 0x0) pwritev2(r1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="ee", 0x1}], 0x1, 0x8000, 0x0, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000000)='THAWED\x00', 0x7) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[], 0x208e24b) ioctl$FS_IOC_RESVSP(r0, 0x40305829, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xcfff}) 18:37:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x10, &(0x7f00000004c0)={[{@journal_dev={'journal_dev', 0x3d, 0x865}}, {@noblock_validity}, {@nobh}, {@quota}, {@quota}, {@grpquota}]}, 0x1, 0x773, &(0x7f0000000fc0)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) r1 = openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat(r1, &(0x7f0000004400)='./bus\x00', 0x5a042, 0x0) renameat2(r1, &(0x7f0000000240)='./bus\x00', r1, &(0x7f00000001c0)='./file0\x00', 0x0) 18:37:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, &(0x7f0000000bc0)=ANY=[], 0x1, 0x563, &(0x7f0000000640)="$eJzs3c9vFFUcAPDvm/7gR9EWYlQ8aBNjIFFaWsAQ4wHuhOCPmxdXWgiy/Ait0aIHSPBiYrx4MPHkQfwvlOjVkzcPXjwZEmIMRxPXzHamLHS3tGXXqcznk0w7b95uvm9289038/bNbAC1NZn/ySL2RsTlFDHeUTccReXk8uPu/vXJ6XxJ0Wq99WeKVGwrH5+K/2PFk7dHxC8/ptgztDruwtLV841mc/5KUZ5evHB5emHp6oFzFxpn58/OX5x9dfbokcNHjs4c7Nu+nrjx/ofjn51859uv/04z3/12MsWx2FXUde5Hv0zG5Mpr0il/XY/2O1hFhor96XyL03CFDWJDyvdvJCKeifEYintv3nh8+kaljQMGqpUiWkBNJfkPNVUeB5Tn9oM4Dwa2pjvHlwcAVuf/8PLYYGxvjw3svJuic1gnRUQ/RubyGD//dPJGvsSAxuGA7q5dj4hnu+V/aufmRHsUP8//7L78zyLiVPE/3/7mJuNPPlCW//DfeZT8f7cj/9/bZHz5DwAAAAAAAP1z63hEvNLt+79sZf5PdJn/MxYRx/oQ/+Hf/2W3+xAG6OLO8YjXu87/zcqHTAwVpSfa8wFG0plzzfmDEfFkROyPkW15eWaNGAc+3/NVr7rO+X/5kscv5wIW7bg9vO3+58w1FhuPss/AsjvXI57rOv83rfT/qUv/n38eXF5njD0v3TzVq+7h+Q8MSuubiH1d+/97d65Ia9+fY7p9PDBdHhWs9vzHX3zfK778h+rk/f/OtfN/InXer2dh4zEOLQ23etVt9vh/NL3dvuXMaLHto8bi4pWZiNF0YvX22Y23GR5HZT6U+ZLn//4X1x7/63b8vyMirq0z5tP/jP3eq07/D9XJ839uQ/3/xldmb0780Cv++vr/w+0+fX+xxfgfrG29CVp1OwEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADg/yiLiF2RsqmV9SybmooYi4inYmfWvLSw+PKZSx9cnMvr2r//n5W/9Du+XE7l7/9PdJRnHygfiojdEfHl0I52eer0peZc1TsPAAAAAAAAAAAAAAAAAAAAW8RYj+v/c38MVd06YOCGq24AUBn5D/Ul/6G+5D/Ul/yH+pL/UF/yH+pL/kN9yX+oL/kPAAAAAACPld0v3Po1RcS113a0l9xoUTdSacuAQcuqbgBQGbf4gfoy9Qfqyzk+kB5Sv33TzwQAAAAAAAAAAAAA+mXfXtf/Q125/h/qy/X/UF+u/4f6co4PuP4fAAAAAAAAAAAAALa+haWr5xvN5vwVK1asWFlZqfqTCQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAKP0bAAD//zn7JB8=") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) r1 = open(&(0x7f0000000180)='./bus\x00', 0x143042, 0x0) pwritev2(r1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="ee", 0x1}], 0x1, 0x8000, 0x0, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000000)='THAWED\x00', 0x7) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[], 0x208e24b) ioctl$FS_IOC_RESVSP(r0, 0x40305829, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xcfff}) [ 61.229543][ T5422] loop1: detected capacity change from 0 to 2048 [ 61.231382][ T5420] loop5: detected capacity change from 0 to 1024 [ 61.237477][ T5422] EXT4-fs: Ignoring removed nobh option [ 61.242677][ T5421] loop2: detected capacity change from 0 to 1024 [ 61.258402][ T5420] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. [ 61.259013][ T5421] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. [ 61.280857][ T5422] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. [ 61.342460][ T3130] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 61.361157][ T3131] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 61.389112][ T3128] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. 18:37:30 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = memfd_create(&(0x7f0000000000)='e\xf4E\x88-\x00', 0x0) pwritev(r1, &(0x7f0000000040)=[{&(0x7f0000000480)="db", 0x1}], 0x1, 0x4000001, 0x0) sendfile(r0, r1, 0x0, 0x80000001) fcntl$setstatus(r0, 0x4, 0x42800) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=ANY=[], 0x178}, 0x0) sendfile(r0, r1, 0x0, 0x7ff) 18:37:30 executing program 4: syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, &(0x7f0000000bc0)=ANY=[], 0x1, 0x563, &(0x7f0000000640)="$eJzs3c9vFFUcAPDvm/7gR9EWYlQ8aBNjIFFaWsAQ4wHuhOCPmxdXWgiy/Ait0aIHSPBiYrx4MPHkQfwvlOjVkzcPXjwZEmIMRxPXzHamLHS3tGXXqcznk0w7b95uvm9289038/bNbAC1NZn/ySL2RsTlFDHeUTccReXk8uPu/vXJ6XxJ0Wq99WeKVGwrH5+K/2PFk7dHxC8/ptgztDruwtLV841mc/5KUZ5evHB5emHp6oFzFxpn58/OX5x9dfbokcNHjs4c7Nu+nrjx/ofjn51859uv/04z3/12MsWx2FXUde5Hv0zG5Mpr0il/XY/2O1hFhor96XyL03CFDWJDyvdvJCKeifEYintv3nh8+kaljQMGqpUiWkBNJfkPNVUeB5Tn9oM4Dwa2pjvHlwcAVuf/8PLYYGxvjw3svJuic1gnRUQ/RubyGD//dPJGvsSAxuGA7q5dj4hnu+V/aufmRHsUP8//7L78zyLiVPE/3/7mJuNPPlCW//DfeZT8f7cj/9/bZHz5DwAAAAAAAP1z63hEvNLt+79sZf5PdJn/MxYRx/oQ/+Hf/2W3+xAG6OLO8YjXu87/zcqHTAwVpSfa8wFG0plzzfmDEfFkROyPkW15eWaNGAc+3/NVr7rO+X/5kscv5wIW7bg9vO3+58w1FhuPss/AsjvXI57rOv83rfT/qUv/n38eXF5njD0v3TzVq+7h+Q8MSuubiH1d+/97d65Ia9+fY7p9PDBdHhWs9vzHX3zfK778h+rk/f/OtfN/InXer2dh4zEOLQ23etVt9vh/NL3dvuXMaLHto8bi4pWZiNF0YvX22Y23GR5HZT6U+ZLn//4X1x7/63b8vyMirq0z5tP/jP3eq07/D9XJ839uQ/3/xldmb0780Cv++vr/w+0+fX+xxfgfrG29CVp1OwEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADg/yiLiF2RsqmV9SybmooYi4inYmfWvLSw+PKZSx9cnMvr2r//n5W/9Du+XE7l7/9PdJRnHygfiojdEfHl0I52eer0peZc1TsPAAAAAAAAAAAAAAAAAAAAW8RYj+v/c38MVd06YOCGq24AUBn5D/Ul/6G+5D/Ul/yH+pL/UF/yH+pL/kN9yX+oL/kPAAAAAACPld0v3Po1RcS113a0l9xoUTdSacuAQcuqbgBQGbf4gfoy9Qfqyzk+kB5Sv33TzwQAAAAAAAAAAAAA+mXfXtf/Q125/h/qy/X/UF+u/4f6co4PuP4fAAAAAAAAAAAAALa+haWr5xvN5vwVK1asWFlZqfqTCQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAKP0bAAD//zn7JB8=") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) r1 = open(&(0x7f0000000180)='./bus\x00', 0x143042, 0x0) pwritev2(r1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="ee", 0x1}], 0x1, 0x8000, 0x0, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000000)='THAWED\x00', 0x7) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[], 0x208e24b) ioctl$FS_IOC_RESVSP(r0, 0x40305829, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xcfff}) 18:37:30 executing program 0: syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, &(0x7f0000000bc0)=ANY=[], 0x1, 0x563, &(0x7f0000000640)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) r1 = open(&(0x7f0000000180)='./bus\x00', 0x143042, 0x0) pwritev2(r1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="ee", 0x1}], 0x1, 0x8000, 0x0, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000000)='THAWED\x00', 0x7) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[], 0x208e24b) ioctl$FS_IOC_RESVSP(r0, 0x40305829, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xcfff}) 18:37:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, &(0x7f0000000bc0)=ANY=[], 0x1, 0x563, &(0x7f0000000640)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) r1 = open(&(0x7f0000000180)='./bus\x00', 0x143042, 0x0) pwritev2(r1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="ee", 0x1}], 0x1, 0x8000, 0x0, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000000)='THAWED\x00', 0x7) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[], 0x208e24b) ioctl$FS_IOC_RESVSP(r0, 0x40305829, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xcfff}) 18:37:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, &(0x7f0000000bc0)=ANY=[], 0x1, 0x563, &(0x7f0000000640)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) r1 = open(&(0x7f0000000180)='./bus\x00', 0x143042, 0x0) pwritev2(r1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="ee", 0x1}], 0x1, 0x8000, 0x0, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000000)='THAWED\x00', 0x7) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[], 0x208e24b) ioctl$FS_IOC_RESVSP(r0, 0x40305829, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xcfff}) 18:37:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, &(0x7f0000000bc0)=ANY=[], 0x1, 0x563, &(0x7f0000000640)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) r1 = open(&(0x7f0000000180)='./bus\x00', 0x143042, 0x0) pwritev2(r1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="ee", 0x1}], 0x1, 0x8000, 0x0, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000000)='THAWED\x00', 0x7) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[], 0x208e24b) ioctl$FS_IOC_RESVSP(r0, 0x40305829, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xcfff}) [ 61.482807][ T5431] loop2: detected capacity change from 0 to 1024 [ 61.486634][ T5433] loop0: detected capacity change from 0 to 1024 [ 61.493489][ T5434] loop4: detected capacity change from 0 to 1024 [ 61.495762][ T5432] loop5: detected capacity change from 0 to 1024 [ 61.509301][ T5436] loop1: detected capacity change from 0 to 1024 [ 61.521633][ T5434] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. [ 61.534950][ T5433] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. [ 61.549538][ T5431] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. [ 61.563657][ T5432] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. 18:37:30 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = memfd_create(&(0x7f0000000000)='e\xf4E\x88-\x00', 0x0) pwritev(r1, &(0x7f0000000040)=[{&(0x7f0000000480)="db", 0x1}], 0x1, 0x4000001, 0x0) sendfile(r0, r1, 0x0, 0x80000001) fcntl$setstatus(r0, 0x4, 0x42800) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=ANY=[], 0x178}, 0x0) sendfile(r0, r1, 0x0, 0x7ff) [ 61.597754][ T5436] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. 18:37:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, &(0x7f0000000bc0)=ANY=[], 0x1, 0x563, &(0x7f0000000640)="$eJzs3c9vFFUcAPDvm/7gR9EWYlQ8aBNjIFFaWsAQ4wHuhOCPmxdXWgiy/Ait0aIHSPBiYrx4MPHkQfwvlOjVkzcPXjwZEmIMRxPXzHamLHS3tGXXqcznk0w7b95uvm9289038/bNbAC1NZn/ySL2RsTlFDHeUTccReXk8uPu/vXJ6XxJ0Wq99WeKVGwrH5+K/2PFk7dHxC8/ptgztDruwtLV841mc/5KUZ5evHB5emHp6oFzFxpn58/OX5x9dfbokcNHjs4c7Nu+nrjx/ofjn51859uv/04z3/12MsWx2FXUde5Hv0zG5Mpr0il/XY/2O1hFhor96XyL03CFDWJDyvdvJCKeifEYintv3nh8+kaljQMGqpUiWkBNJfkPNVUeB5Tn9oM4Dwa2pjvHlwcAVuf/8PLYYGxvjw3svJuic1gnRUQ/RubyGD//dPJGvsSAxuGA7q5dj4hnu+V/aufmRHsUP8//7L78zyLiVPE/3/7mJuNPPlCW//DfeZT8f7cj/9/bZHz5DwAAAAAAAP1z63hEvNLt+79sZf5PdJn/MxYRx/oQ/+Hf/2W3+xAG6OLO8YjXu87/zcqHTAwVpSfa8wFG0plzzfmDEfFkROyPkW15eWaNGAc+3/NVr7rO+X/5kscv5wIW7bg9vO3+58w1FhuPss/AsjvXI57rOv83rfT/qUv/n38eXF5njD0v3TzVq+7h+Q8MSuubiH1d+/97d65Ia9+fY7p9PDBdHhWs9vzHX3zfK778h+rk/f/OtfN/InXer2dh4zEOLQ23etVt9vh/NL3dvuXMaLHto8bi4pWZiNF0YvX22Y23GR5HZT6U+ZLn//4X1x7/63b8vyMirq0z5tP/jP3eq07/D9XJ839uQ/3/xldmb0780Cv++vr/w+0+fX+xxfgfrG29CVp1OwEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADg/yiLiF2RsqmV9SybmooYi4inYmfWvLSw+PKZSx9cnMvr2r//n5W/9Du+XE7l7/9PdJRnHygfiojdEfHl0I52eer0peZc1TsPAAAAAAAAAAAAAAAAAAAAW8RYj+v/c38MVd06YOCGq24AUBn5D/Ul/6G+5D/Ul/yH+pL/UF/yH+pL/kN9yX+oL/kPAAAAAACPld0v3Po1RcS113a0l9xoUTdSacuAQcuqbgBQGbf4gfoy9Qfqyzk+kB5Sv33TzwQAAAAAAAAAAAAA+mXfXtf/Q125/h/qy/X/UF+u/4f6co4PuP4fAAAAAAAAAAAAALa+haWr5xvN5vwVK1asWFlZqfqTCQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAKP0bAAD//zn7JB8=") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) r1 = open(&(0x7f0000000180)='./bus\x00', 0x143042, 0x0) pwritev2(r1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="ee", 0x1}], 0x1, 0x8000, 0x0, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000000)='THAWED\x00', 0x7) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[], 0x208e24b) ioctl$FS_IOC_RESVSP(r0, 0x40305829, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xcfff}) 18:37:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, &(0x7f0000000bc0)=ANY=[], 0x1, 0x563, &(0x7f0000000640)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) r1 = open(&(0x7f0000000180)='./bus\x00', 0x143042, 0x0) pwritev2(r1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="ee", 0x1}], 0x1, 0x8000, 0x0, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000000)='THAWED\x00', 0x7) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[], 0x208e24b) ioctl$FS_IOC_RESVSP(r0, 0x40305829, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xcfff}) 18:37:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, &(0x7f0000000bc0)=ANY=[], 0x1, 0x563, &(0x7f0000000640)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) r1 = open(&(0x7f0000000180)='./bus\x00', 0x143042, 0x0) pwritev2(r1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="ee", 0x1}], 0x1, 0x8000, 0x0, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000000)='THAWED\x00', 0x7) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[], 0x208e24b) ioctl$FS_IOC_RESVSP(r0, 0x40305829, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xcfff}) 18:37:31 executing program 0: syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, &(0x7f0000000bc0)=ANY=[], 0x1, 0x563, &(0x7f0000000640)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) r1 = open(&(0x7f0000000180)='./bus\x00', 0x143042, 0x0) pwritev2(r1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="ee", 0x1}], 0x1, 0x8000, 0x0, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000000)='THAWED\x00', 0x7) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[], 0x208e24b) ioctl$FS_IOC_RESVSP(r0, 0x40305829, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xcfff}) 18:37:31 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) unshare(0x400) ioctl$TIOCSETD(r0, 0x5414, &(0x7f0000000080)=0xfdfdffff) [ 61.745148][ T3131] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 61.764762][ T3130] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 61.778004][ T3128] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 61.798050][ T3139] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 61.816099][ T3129] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 61.825254][ T5456] loop2: detected capacity change from 0 to 1024 [ 61.827844][ T3400] I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 [ 61.832695][ T5457] loop1: detected capacity change from 0 to 1024 [ 61.842046][ T3218] I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 [ 61.854281][ T5456] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. 18:37:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, &(0x7f0000000bc0)=ANY=[], 0x1, 0x563, &(0x7f0000000640)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) r1 = open(&(0x7f0000000180)='./bus\x00', 0x143042, 0x0) pwritev2(r1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="ee", 0x1}], 0x1, 0x8000, 0x0, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000000)='THAWED\x00', 0x7) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[], 0x208e24b) ioctl$FS_IOC_RESVSP(r0, 0x40305829, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xcfff}) 18:37:31 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) unshare(0x400) ioctl$TIOCSETD(r0, 0x5414, &(0x7f0000000080)=0xfdfdffff) [ 61.893960][ T5457] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. [ 61.915365][ T3131] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 61.922637][ T5461] loop5: detected capacity change from 0 to 1024 18:37:31 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) unshare(0x400) ioctl$TIOCSETD(r0, 0x5414, &(0x7f0000000080)=0xfdfdffff) 18:37:31 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) unshare(0x400) ioctl$TIOCSETD(r0, 0x5414, &(0x7f0000000080)=0xfdfdffff) [ 61.962610][ T5461] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. [ 61.983207][ T5466] loop0: detected capacity change from 0 to 1024 18:37:31 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@ipmr_delroute={0x24, 0x19, 0x831, 0x0, 0x0, {0x80, 0x20, 0x0, 0x0, 0x0, 0x11, 0x0, 0x5}, [@RTA_DST={0x8, 0x1, @loopback}]}, 0x24}}, 0x0) [ 62.017636][ T5466] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. [ 62.053517][ T5475] loop2: detected capacity change from 0 to 1024 18:37:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, &(0x7f0000000bc0)=ANY=[], 0x1, 0x563, &(0x7f0000000640)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) r1 = open(&(0x7f0000000180)='./bus\x00', 0x143042, 0x0) pwritev2(r1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="ee", 0x1}], 0x1, 0x8000, 0x0, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000000)='THAWED\x00', 0x7) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[], 0x208e24b) ioctl$FS_IOC_RESVSP(r0, 0x40305829, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xcfff}) [ 62.095046][ T3130] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 62.125471][ T5475] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: writeback. [ 62.161362][ T3129] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 62.192629][ T5482] loop1: detected capacity change from 0 to 1024 18:37:31 executing program 0: syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, &(0x7f0000000bc0)=ANY=[], 0x1, 0x563, &(0x7f0000000640)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) r1 = open(&(0x7f0000000180)='./bus\x00', 0x143042, 0x0) pwritev2(r1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="ee", 0x1}], 0x1, 0x8000, 0x0, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000000)='THAWED\x00', 0x7) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[], 0x208e24b) ioctl$FS_IOC_RESVSP(r0, 0x40305829, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xcfff}) 18:37:31 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@ipmr_delroute={0x24, 0x19, 0x831, 0x0, 0x0, {0x80, 0x20, 0x0, 0x0, 0x0, 0x11, 0x0, 0x5}, [@RTA_DST={0x8, 0x1, @loopback}]}, 0x24}}, 0x0) 18:37:31 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) listen(r0, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f0000000000)={0x0, 0x0, 0x5, 0x7}) 18:37:31 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e"], &(0x7f0000000840)=""/262, 0x37, 0x106, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000004440)=@base={0x6, 0x4, 0x4, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r0, 0x2, 0x1}, 0x48) 18:37:31 executing program 1: futex(&(0x7f000000cffc)=0x4, 0x9, 0x4, 0x0, 0x0, 0x2) futex(&(0x7f000000cffc), 0x5, 0x0, 0x0, &(0x7f0000000000), 0x0) 18:37:31 executing program 3: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff) 18:37:31 executing program 3: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff) [ 62.502943][ T23] kauditd_printk_skb: 8 callbacks suppressed [ 62.502965][ T23] audit: type=1400 audit(1680201451.739:153): avc: denied { map_create } for pid=5484 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 18:37:31 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) listen(r0, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f0000000000)={0x0, 0x0, 0x5, 0x7}) 18:37:31 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@ipmr_delroute={0x24, 0x19, 0x831, 0x0, 0x0, {0x80, 0x20, 0x0, 0x0, 0x0, 0x11, 0x0, 0x5}, [@RTA_DST={0x8, 0x1, @loopback}]}, 0x24}}, 0x0) 18:37:31 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) listen(r0, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f0000000000)={0x0, 0x0, 0x5, 0x7}) 18:37:31 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@ipmr_delroute={0x24, 0x19, 0x831, 0x0, 0x0, {0x80, 0x20, 0x0, 0x0, 0x0, 0x11, 0x0, 0x5}, [@RTA_DST={0x8, 0x1, @loopback}]}, 0x24}}, 0x0) [ 62.536999][ T23] audit: type=1400 audit(1680201451.749:154): avc: denied { create } for pid=5488 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 62.556775][ T23] audit: type=1400 audit(1680201451.749:155): avc: denied { listen } for pid=5488 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 62.576685][ T23] audit: type=1400 audit(1680201451.749:156): avc: denied { ioctl } for pid=5488 comm="syz-executor.5" path="socket:[20313]" dev="sockfs" ino=20313 ioctlcmd=0x89e3 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 18:37:31 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e"], &(0x7f0000000840)=""/262, 0x37, 0x106, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000004440)=@base={0x6, 0x4, 0x4, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r0, 0x2, 0x1}, 0x48) [ 62.596958][ T5491] loop0: detected capacity change from 0 to 1024 18:37:31 executing program 3: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff) 18:37:31 executing program 1: futex(&(0x7f000000cffc)=0x4, 0x9, 0x4, 0x0, 0x0, 0x2) futex(&(0x7f000000cffc), 0x5, 0x0, 0x0, &(0x7f0000000000), 0x0) 18:37:31 executing program 4: futex(&(0x7f000000cffc)=0x4, 0x9, 0x4, 0x0, 0x0, 0x2) futex(&(0x7f000000cffc), 0x5, 0x0, 0x0, &(0x7f0000000000), 0x0) 18:37:31 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e"], &(0x7f0000000840)=""/262, 0x37, 0x106, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000004440)=@base={0x6, 0x4, 0x4, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r0, 0x2, 0x1}, 0x48) 18:37:31 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) listen(r0, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f0000000000)={0x0, 0x0, 0x5, 0x7}) 18:37:31 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e"], &(0x7f0000000840)=""/262, 0x37, 0x106, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000004440)=@base={0x6, 0x4, 0x4, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r0, 0x2, 0x1}, 0x48) 18:37:31 executing program 3: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff) 18:37:31 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) listen(r0, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f0000000000)={0x0, 0x0, 0x5, 0x7}) 18:37:31 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e"], &(0x7f0000000840)=""/262, 0x37, 0x106, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000004440)=@base={0x6, 0x4, 0x4, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r0, 0x2, 0x1}, 0x48) 18:37:31 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) listen(r0, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f0000000000)={0x0, 0x0, 0x5, 0x7}) 18:37:32 executing program 1: futex(&(0x7f000000cffc)=0x4, 0x9, 0x4, 0x0, 0x0, 0x2) futex(&(0x7f000000cffc), 0x5, 0x0, 0x0, &(0x7f0000000000), 0x0) 18:37:32 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f00000001c0), 0x0, 0x0) syz_io_uring_setup(0xf94, &(0x7f0000000280)={0x0, 0x0, 0x20, 0x0, 0x0, 0x0, r0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000300), &(0x7f0000000340)) 18:37:32 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e"], &(0x7f0000000840)=""/262, 0x37, 0x106, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000004440)=@base={0x6, 0x4, 0x4, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r0, 0x2, 0x1}, 0x48) 18:37:32 executing program 4: futex(&(0x7f000000cffc)=0x4, 0x9, 0x4, 0x0, 0x0, 0x2) futex(&(0x7f000000cffc), 0x5, 0x0, 0x0, &(0x7f0000000000), 0x0) 18:37:32 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) listen(r0, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f0000000000)={0x0, 0x0, 0x5, 0x7}) 18:37:32 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e"], &(0x7f0000000840)=""/262, 0x37, 0x106, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000004440)=@base={0x6, 0x4, 0x4, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r0, 0x2, 0x1}, 0x48) 18:37:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x22000000, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x9}}, {@discard}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x66}}, {@acl}, {@jqfmt_vfsv0}, {@nombcache}]}, 0x0, 0x42c, &(0x7f0000000480)="$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") 18:37:32 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f00000001c0), 0x0, 0x0) syz_io_uring_setup(0xf94, &(0x7f0000000280)={0x0, 0x0, 0x20, 0x0, 0x0, 0x0, r0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000300), &(0x7f0000000340)) 18:37:32 executing program 5: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x12, 0x4, 0x4, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r0, &(0x7f0000000140)="ff", &(0x7f0000000240)=""/67}, 0x20) 18:37:32 executing program 1: futex(&(0x7f000000cffc)=0x4, 0x9, 0x4, 0x0, 0x0, 0x2) futex(&(0x7f000000cffc), 0x5, 0x0, 0x0, &(0x7f0000000000), 0x0) 18:37:32 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000340)={0x68, r1, 0x1, 0x0, 0x0, {{}, {}, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 18:37:32 executing program 4: futex(&(0x7f000000cffc)=0x4, 0x9, 0x4, 0x0, 0x0, 0x2) futex(&(0x7f000000cffc), 0x5, 0x0, 0x0, &(0x7f0000000000), 0x0) 18:37:32 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f00000001c0), 0x0, 0x0) syz_io_uring_setup(0xf94, &(0x7f0000000280)={0x0, 0x0, 0x20, 0x0, 0x0, 0x0, r0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000300), &(0x7f0000000340)) [ 62.857011][ T5543] loop2: detected capacity change from 0 to 512 18:37:32 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000340)={0x68, r1, 0x1, 0x0, 0x0, {{}, {}, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 18:37:32 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) r1 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000) r2 = open(&(0x7f0000000040)='./bus\x00', 0x147042, 0x0) pwritev2(r2, &(0x7f0000000680)=[{&(0x7f0000000200)="05", 0x6d000}], 0x1, 0x0, 0x0, 0x0) 18:37:32 executing program 5: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x12, 0x4, 0x4, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r0, &(0x7f0000000140)="ff", &(0x7f0000000240)=""/67}, 0x20) 18:37:32 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f00000001c0), 0x0, 0x0) syz_io_uring_setup(0xf94, &(0x7f0000000280)={0x0, 0x0, 0x20, 0x0, 0x0, 0x0, r0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000300), &(0x7f0000000340)) 18:37:32 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000340)={0x68, r1, 0x1, 0x0, 0x0, {{}, {}, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) [ 62.901130][ T23] audit: type=1400 audit(1680201452.139:157): avc: denied { map_read map_write } for pid=5550 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 18:37:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x22000000, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x9}}, {@discard}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x66}}, {@acl}, {@jqfmt_vfsv0}, {@nombcache}]}, 0x0, 0x42c, &(0x7f0000000480)="$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") 18:37:32 executing program 5: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x12, 0x4, 0x4, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r0, &(0x7f0000000140)="ff", &(0x7f0000000240)=""/67}, 0x20) 18:37:32 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x12, 0x4, 0x4, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r0, &(0x7f0000000140)="ff", &(0x7f0000000240)=""/67}, 0x20) 18:37:32 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000340)={0x68, r1, 0x1, 0x0, 0x0, {{}, {}, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 18:37:32 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540), 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000080)=@gcm_256={{0x303, 0x3a}, "bb962aecbd89e4cf", "3bac230607b1ea1f523d7897f9eee66618b2b323758c00", "496626c6", "0500c2459cdb00"}, 0x38) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0), 0x4) [ 62.972826][ T5543] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 62.999933][ T5543] EXT4-fs warning (device loop2): ext4_expand_extra_isize_ea:2861: Unable to expand inode 15. Delete some EAs or run e2fsck. [ 63.013364][ T5543] EXT4-fs (loop2): 1 truncate cleaned up 18:37:32 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) r1 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000) r2 = open(&(0x7f0000000040)='./bus\x00', 0x147042, 0x0) pwritev2(r2, &(0x7f0000000680)=[{&(0x7f0000000200)="05", 0x6d000}], 0x1, 0x0, 0x0, 0x0) 18:37:32 executing program 5: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x12, 0x4, 0x4, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r0, &(0x7f0000000140)="ff", &(0x7f0000000240)=""/67}, 0x20) 18:37:32 executing program 0: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)={0x20000009}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x3}) 18:37:32 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x12, 0x4, 0x4, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r0, &(0x7f0000000140)="ff", &(0x7f0000000240)=""/67}, 0x20) 18:37:32 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) r1 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000) r2 = open(&(0x7f0000000040)='./bus\x00', 0x147042, 0x0) pwritev2(r2, &(0x7f0000000680)=[{&(0x7f0000000200)="05", 0x6d000}], 0x1, 0x0, 0x0, 0x0) 18:37:32 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x12, 0x4, 0x4, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r0, &(0x7f0000000140)="ff", &(0x7f0000000240)=""/67}, 0x20) 18:37:32 executing program 5: r0 = open(&(0x7f0000001100)='./bus\x00', 0x14d27e, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x60142, 0x0) r2 = open(&(0x7f00000000c0)='./file2\x00', 0x1412c2, 0x0) ftruncate(r2, 0x2007ffb) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000080), 0x501002, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_BEACON(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x124, r5, 0x1, 0x0, 0x0, {{}, {@val={0x9}, @void}}, [@NL80211_ATTR_FTM_RESPONDER={0x108, 0x10e, 0x0, 0x1, [@NL80211_FTM_RESP_ATTR_LCI={0x104, 0xe, "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"}]}]}, 0x124}}, 0x0) sendmsg$NL80211_CMD_JOIN_IBSS(r3, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="00042bbd7000fcdbdf252b0000000c00990008000000340000000400bf00"], 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x851) sendfile(r1, r2, 0x0, 0x1000000201005) sendfile(r0, r0, 0x0, 0x8800000) [ 63.110457][ T5587] loop2: detected capacity change from 0 to 512 [ 63.128293][ T23] audit: type=1400 audit(1680201452.369:158): avc: denied { block_suspend } for pid=5586 comm="syz-executor.0" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 63.152969][ T5587] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled 18:37:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x22000000, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x9}}, {@discard}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x66}}, {@acl}, {@jqfmt_vfsv0}, {@nombcache}]}, 0x0, 0x42c, &(0x7f0000000480)="$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") 18:37:32 executing program 0: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)={0x20000009}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x3}) 18:37:32 executing program 3: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)={0x20000009}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x3}) 18:37:32 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) r1 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000) r2 = open(&(0x7f0000000040)='./bus\x00', 0x147042, 0x0) pwritev2(r2, &(0x7f0000000680)=[{&(0x7f0000000200)="05", 0x6d000}], 0x1, 0x0, 0x0, 0x0) [ 63.185623][ T5599] netlink: 'syz-executor.5': attribute type 3 has an invalid length. [ 63.198040][ T5587] EXT4-fs (loop2): 1 truncate cleaned up 18:37:32 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540), 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000080)=@gcm_256={{0x303, 0x3a}, "bb962aecbd89e4cf", "3bac230607b1ea1f523d7897f9eee66618b2b323758c00", "496626c6", "0500c2459cdb00"}, 0x38) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0), 0x4) 18:37:32 executing program 0: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)={0x20000009}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x3}) 18:37:32 executing program 3: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)={0x20000009}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x3}) 18:37:32 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x14, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x1}, @IFLA_MACVLAN_MACADDR_MODE={0x8}]}}}]}, 0x44}}, 0x0) 18:37:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x22000000, &(0x7f0000000000)={[{@min_batch_time={'min_batch_time', 0x3d, 0x9}}, {@discard}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x66}}, {@acl}, {@jqfmt_vfsv0}, {@nombcache}]}, 0x0, 0x42c, &(0x7f0000000480)="$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") 18:37:32 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x14, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x1}, @IFLA_MACVLAN_MACADDR_MODE={0x8}]}}}]}, 0x44}}, 0x0) [ 63.289732][ T5615] loop2: detected capacity change from 0 to 512 [ 63.307959][ T5615] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 63.320111][ T5615] EXT4-fs (loop2): 1 truncate cleaned up 18:37:32 executing program 3: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)={0x20000009}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x3}) [ 63.399627][ T5627] loop2: detected capacity change from 0 to 512 [ 63.446276][ T5627] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 63.464381][ T5627] EXT4-fs (loop2): 1 truncate cleaned up 18:37:33 executing program 5: r0 = open(&(0x7f0000001100)='./bus\x00', 0x14d27e, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x60142, 0x0) r2 = open(&(0x7f00000000c0)='./file2\x00', 0x1412c2, 0x0) ftruncate(r2, 0x2007ffb) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000080), 0x501002, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_BEACON(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x124, r5, 0x1, 0x0, 0x0, {{}, {@val={0x9}, @void}}, [@NL80211_ATTR_FTM_RESPONDER={0x108, 0x10e, 0x0, 0x1, [@NL80211_FTM_RESP_ATTR_LCI={0x104, 0xe, "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"}]}]}, 0x124}}, 0x0) sendmsg$NL80211_CMD_JOIN_IBSS(r3, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="00042bbd7000fcdbdf252b0000000c00990008000000340000000400bf00"], 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x851) sendfile(r1, r2, 0x0, 0x1000000201005) sendfile(r0, r0, 0x0, 0x8800000) 18:37:33 executing program 0: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)={0x20000009}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x3}) 18:37:33 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540), 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000080)=@gcm_256={{0x303, 0x3a}, "bb962aecbd89e4cf", "3bac230607b1ea1f523d7897f9eee66618b2b323758c00", "496626c6", "0500c2459cdb00"}, 0x38) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0), 0x4) 18:37:33 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x14, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x1}, @IFLA_MACVLAN_MACADDR_MODE={0x8}]}}}]}, 0x44}}, 0x0) 18:37:33 executing program 2: r0 = memfd_create(&(0x7f0000000000)='$-,/\x00', 0x2) fcntl$addseals(r0, 0x409, 0x4) write$binfmt_script(r0, &(0x7f0000000040)={'#! ', './file0'}, 0xb) 18:37:33 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540), 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000080)=@gcm_256={{0x303, 0x3a}, "bb962aecbd89e4cf", "3bac230607b1ea1f523d7897f9eee66618b2b323758c00", "496626c6", "0500c2459cdb00"}, 0x38) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0), 0x4) 18:37:33 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x14, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x1}, @IFLA_MACVLAN_MACADDR_MODE={0x8}]}}}]}, 0x44}}, 0x0) 18:37:33 executing program 0: r0 = open(&(0x7f0000001100)='./bus\x00', 0x14d27e, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x60142, 0x0) r2 = open(&(0x7f00000000c0)='./file2\x00', 0x1412c2, 0x0) ftruncate(r2, 0x2007ffb) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000080), 0x501002, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_BEACON(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x124, r5, 0x1, 0x0, 0x0, {{}, {@val={0x9}, @void}}, [@NL80211_ATTR_FTM_RESPONDER={0x108, 0x10e, 0x0, 0x1, [@NL80211_FTM_RESP_ATTR_LCI={0x104, 0xe, "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"}]}]}, 0x124}}, 0x0) sendmsg$NL80211_CMD_JOIN_IBSS(r3, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="00042bbd7000fcdbdf252b0000000c00990008000000340000000400bf00"], 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x851) sendfile(r1, r2, 0x0, 0x1000000201005) sendfile(r0, r0, 0x0, 0x8800000) 18:37:33 executing program 2: r0 = memfd_create(&(0x7f0000000000)='$-,/\x00', 0x2) fcntl$addseals(r0, 0x409, 0x4) write$binfmt_script(r0, &(0x7f0000000040)={'#! ', './file0'}, 0xb) 18:37:33 executing program 2: r0 = memfd_create(&(0x7f0000000000)='$-,/\x00', 0x2) fcntl$addseals(r0, 0x409, 0x4) write$binfmt_script(r0, &(0x7f0000000040)={'#! ', './file0'}, 0xb) 18:37:33 executing program 1: r0 = memfd_create(&(0x7f0000000000)='$-,/\x00', 0x2) fcntl$addseals(r0, 0x409, 0x4) write$binfmt_script(r0, &(0x7f0000000040)={'#! ', './file0'}, 0xb) 18:37:33 executing program 1: r0 = memfd_create(&(0x7f0000000000)='$-,/\x00', 0x2) fcntl$addseals(r0, 0x409, 0x4) write$binfmt_script(r0, &(0x7f0000000040)={'#! ', './file0'}, 0xb) [ 64.084684][ T5660] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 64.207749][ T5677] netlink: 'syz-executor.5': attribute type 3 has an invalid length. 18:37:34 executing program 5: r0 = open(&(0x7f0000001100)='./bus\x00', 0x14d27e, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x60142, 0x0) r2 = open(&(0x7f00000000c0)='./file2\x00', 0x1412c2, 0x0) ftruncate(r2, 0x2007ffb) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000080), 0x501002, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_BEACON(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x124, r5, 0x1, 0x0, 0x0, {{}, {@val={0x9}, @void}}, [@NL80211_ATTR_FTM_RESPONDER={0x108, 0x10e, 0x0, 0x1, [@NL80211_FTM_RESP_ATTR_LCI={0x104, 0xe, "5a17177dccf430502e1e881da8bcca5b910ec3922e542abbf686242b34dcf50928d74b3cb944732c7f36d3de33b810c4dd664360775c79a58a19c922f8ac8ad8ca541e6e7fb143f9d38c2236787869b3aeeb8cbeb7203776b45e35497d924ffb221cf28192ac451ea6269b7ce68defc5e4191f341727c46ce2937680c748ac3fdff6dc7160714efb77a7290273f518e3715f8e19daf26424559f1490d264eb81928a4347b7c013fa16dccbf3d687e4816d82e23fca08f7ed08d0fba18c2e5a3abf4666eca3d3721903294e23fa1a3db882708bf4e778b1dad26de7b169825d07ad15ef5a49dd04e29e438727d1acdf1d2e8cd79742a432763d7b07484059ac99"}]}]}, 0x124}}, 0x0) sendmsg$NL80211_CMD_JOIN_IBSS(r3, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="00042bbd7000fcdbdf252b0000000c00990008000000340000000400bf00"], 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x851) sendfile(r1, r2, 0x0, 0x1000000201005) sendfile(r0, r0, 0x0, 0x8800000) 18:37:34 executing program 2: r0 = memfd_create(&(0x7f0000000000)='$-,/\x00', 0x2) fcntl$addseals(r0, 0x409, 0x4) write$binfmt_script(r0, &(0x7f0000000040)={'#! ', './file0'}, 0xb) 18:37:34 executing program 1: r0 = memfd_create(&(0x7f0000000000)='$-,/\x00', 0x2) fcntl$addseals(r0, 0x409, 0x4) write$binfmt_script(r0, &(0x7f0000000040)={'#! ', './file0'}, 0xb) 18:37:34 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540), 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000080)=@gcm_256={{0x303, 0x3a}, "bb962aecbd89e4cf", "3bac230607b1ea1f523d7897f9eee66618b2b323758c00", "496626c6", "0500c2459cdb00"}, 0x38) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0), 0x4) 18:37:34 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540), 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000080)=@gcm_256={{0x303, 0x3a}, "bb962aecbd89e4cf", "3bac230607b1ea1f523d7897f9eee66618b2b323758c00", "496626c6", "0500c2459cdb00"}, 0x38) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0), 0x4) 18:37:34 executing program 0: r0 = open(&(0x7f0000001100)='./bus\x00', 0x14d27e, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x60142, 0x0) r2 = open(&(0x7f00000000c0)='./file2\x00', 0x1412c2, 0x0) ftruncate(r2, 0x2007ffb) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000080), 0x501002, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_BEACON(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x124, r5, 0x1, 0x0, 0x0, {{}, {@val={0x9}, @void}}, [@NL80211_ATTR_FTM_RESPONDER={0x108, 0x10e, 0x0, 0x1, [@NL80211_FTM_RESP_ATTR_LCI={0x104, 0xe, "5a17177dccf430502e1e881da8bcca5b910ec3922e542abbf686242b34dcf50928d74b3cb944732c7f36d3de33b810c4dd664360775c79a58a19c922f8ac8ad8ca541e6e7fb143f9d38c2236787869b3aeeb8cbeb7203776b45e35497d924ffb221cf28192ac451ea6269b7ce68defc5e4191f341727c46ce2937680c748ac3fdff6dc7160714efb77a7290273f518e3715f8e19daf26424559f1490d264eb81928a4347b7c013fa16dccbf3d687e4816d82e23fca08f7ed08d0fba18c2e5a3abf4666eca3d3721903294e23fa1a3db882708bf4e778b1dad26de7b169825d07ad15ef5a49dd04e29e438727d1acdf1d2e8cd79742a432763d7b07484059ac99"}]}]}, 0x124}}, 0x0) sendmsg$NL80211_CMD_JOIN_IBSS(r3, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="00042bbd7000fcdbdf252b0000000c00990008000000340000000400bf00"], 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x851) sendfile(r1, r2, 0x0, 0x1000000201005) sendfile(r0, r0, 0x0, 0x8800000) 18:37:34 executing program 2: r0 = open(&(0x7f0000001100)='./bus\x00', 0x14d27e, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x60142, 0x0) r2 = open(&(0x7f00000000c0)='./file2\x00', 0x1412c2, 0x0) ftruncate(r2, 0x2007ffb) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000080), 0x501002, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_BEACON(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x124, r5, 0x1, 0x0, 0x0, {{}, {@val={0x9}, @void}}, [@NL80211_ATTR_FTM_RESPONDER={0x108, 0x10e, 0x0, 0x1, [@NL80211_FTM_RESP_ATTR_LCI={0x104, 0xe, "5a17177dccf430502e1e881da8bcca5b910ec3922e542abbf686242b34dcf50928d74b3cb944732c7f36d3de33b810c4dd664360775c79a58a19c922f8ac8ad8ca541e6e7fb143f9d38c2236787869b3aeeb8cbeb7203776b45e35497d924ffb221cf28192ac451ea6269b7ce68defc5e4191f341727c46ce2937680c748ac3fdff6dc7160714efb77a7290273f518e3715f8e19daf26424559f1490d264eb81928a4347b7c013fa16dccbf3d687e4816d82e23fca08f7ed08d0fba18c2e5a3abf4666eca3d3721903294e23fa1a3db882708bf4e778b1dad26de7b169825d07ad15ef5a49dd04e29e438727d1acdf1d2e8cd79742a432763d7b07484059ac99"}]}]}, 0x124}}, 0x0) sendmsg$NL80211_CMD_JOIN_IBSS(r3, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="00042bbd7000fcdbdf252b0000000c00990008000000340000000400bf00"], 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x851) sendfile(r1, r2, 0x0, 0x1000000201005) sendfile(r0, r0, 0x0, 0x8800000) 18:37:34 executing program 1: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) connect$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x2}}, 0x8) [ 65.098440][ T5694] netlink: 'syz-executor.0': attribute type 3 has an invalid length. 18:37:34 executing program 1: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) connect$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x2}}, 0x8) [ 65.147454][ T5700] netlink: 'syz-executor.2': attribute type 3 has an invalid length. [ 65.147782][ T23] audit: type=1400 audit(1680201454.389:159): avc: denied { create } for pid=5698 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 18:37:34 executing program 1: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) connect$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x2}}, 0x8) 18:37:34 executing program 1: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) connect$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x2}}, 0x8) [ 65.225777][ T5707] netlink: 'syz-executor.5': attribute type 3 has an invalid length. [ 65.232253][ T23] audit: type=1400 audit(1680201454.429:160): avc: denied { connect } for pid=5698 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 18:37:34 executing program 1: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) connect$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x2}}, 0x8) 18:37:35 executing program 5: r0 = open(&(0x7f0000001100)='./bus\x00', 0x14d27e, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x60142, 0x0) r2 = open(&(0x7f00000000c0)='./file2\x00', 0x1412c2, 0x0) ftruncate(r2, 0x2007ffb) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000080), 0x501002, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_BEACON(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x124, r5, 0x1, 0x0, 0x0, {{}, {@val={0x9}, @void}}, [@NL80211_ATTR_FTM_RESPONDER={0x108, 0x10e, 0x0, 0x1, [@NL80211_FTM_RESP_ATTR_LCI={0x104, 0xe, "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"}]}]}, 0x124}}, 0x0) sendmsg$NL80211_CMD_JOIN_IBSS(r3, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="00042bbd7000fcdbdf252b0000000c00990008000000340000000400bf00"], 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x851) sendfile(r1, r2, 0x0, 0x1000000201005) sendfile(r0, r0, 0x0, 0x8800000) 18:37:35 executing program 1: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) connect$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x2}}, 0x8) 18:37:35 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540), 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000080)=@gcm_256={{0x303, 0x3a}, "bb962aecbd89e4cf", "3bac230607b1ea1f523d7897f9eee66618b2b323758c00", "496626c6", "0500c2459cdb00"}, 0x38) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0), 0x4) 18:37:35 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000100)='sys_exit\x00', r0}, 0x10) bpf$BPF_PROG_ATTACH(0xf, &(0x7f0000000080), 0x14) 18:37:35 executing program 0: r0 = open(&(0x7f0000001100)='./bus\x00', 0x14d27e, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x60142, 0x0) r2 = open(&(0x7f00000000c0)='./file2\x00', 0x1412c2, 0x0) ftruncate(r2, 0x2007ffb) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000080), 0x501002, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_BEACON(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x124, r5, 0x1, 0x0, 0x0, {{}, {@val={0x9}, @void}}, [@NL80211_ATTR_FTM_RESPONDER={0x108, 0x10e, 0x0, 0x1, [@NL80211_FTM_RESP_ATTR_LCI={0x104, 0xe, "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"}]}]}, 0x124}}, 0x0) sendmsg$NL80211_CMD_JOIN_IBSS(r3, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="00042bbd7000fcdbdf252b0000000c00990008000000340000000400bf00"], 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x851) sendfile(r1, r2, 0x0, 0x1000000201005) sendfile(r0, r0, 0x0, 0x8800000) 18:37:35 executing program 2: r0 = open(&(0x7f0000001100)='./bus\x00', 0x14d27e, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x60142, 0x0) r2 = open(&(0x7f00000000c0)='./file2\x00', 0x1412c2, 0x0) ftruncate(r2, 0x2007ffb) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000080), 0x501002, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_BEACON(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x124, r5, 0x1, 0x0, 0x0, {{}, {@val={0x9}, @void}}, [@NL80211_ATTR_FTM_RESPONDER={0x108, 0x10e, 0x0, 0x1, [@NL80211_FTM_RESP_ATTR_LCI={0x104, 0xe, "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"}]}]}, 0x124}}, 0x0) sendmsg$NL80211_CMD_JOIN_IBSS(r3, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="00042bbd7000fcdbdf252b0000000c00990008000000340000000400bf00"], 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x851) sendfile(r1, r2, 0x0, 0x1000000201005) sendfile(r0, r0, 0x0, 0x8800000) 18:37:35 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000100)='sys_exit\x00', r0}, 0x10) bpf$BPF_PROG_ATTACH(0xf, &(0x7f0000000080), 0x14) 18:37:35 executing program 1: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) connect$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x2}}, 0x8) [ 66.141220][ T5732] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 66.164517][ T5731] netlink: 'syz-executor.2': attribute type 3 has an invalid length. 18:37:35 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000100)='sys_exit\x00', r0}, 0x10) bpf$BPF_PROG_ATTACH(0xf, &(0x7f0000000080), 0x14) 18:37:35 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000cc0)={{0x14}, [@NFT_MSG_DELFLOWTABLE={0x14}, @NFT_MSG_DELSETELEM={0x14}, @NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x401, 0x0, 0x0, {0x7}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x30, 0x16, 0xa, 0x201, 0x0, 0x0, {0x7}, [@NFTA_FLOWTABLE_HOOK={0x4}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}]}], {0x14}}, 0xa0}}, 0x0) 18:37:35 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000100)='sys_exit\x00', r0}, 0x10) bpf$BPF_PROG_ATTACH(0xf, &(0x7f0000000080), 0x14) [ 66.219313][ T5741] netlink: 'syz-executor.5': attribute type 3 has an invalid length. 18:37:35 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000cc0)={{0x14}, [@NFT_MSG_DELFLOWTABLE={0x14}, @NFT_MSG_DELSETELEM={0x14}, @NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x401, 0x0, 0x0, {0x7}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x30, 0x16, 0xa, 0x201, 0x0, 0x0, {0x7}, [@NFTA_FLOWTABLE_HOOK={0x4}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}]}], {0x14}}, 0xa0}}, 0x0) 18:37:36 executing program 2: r0 = open(&(0x7f0000001100)='./bus\x00', 0x14d27e, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x60142, 0x0) r2 = open(&(0x7f00000000c0)='./file2\x00', 0x1412c2, 0x0) ftruncate(r2, 0x2007ffb) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000080), 0x501002, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_BEACON(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x124, r5, 0x1, 0x0, 0x0, {{}, {@val={0x9}, @void}}, [@NL80211_ATTR_FTM_RESPONDER={0x108, 0x10e, 0x0, 0x1, [@NL80211_FTM_RESP_ATTR_LCI={0x104, 0xe, "5a17177dccf430502e1e881da8bcca5b910ec3922e542abbf686242b34dcf50928d74b3cb944732c7f36d3de33b810c4dd664360775c79a58a19c922f8ac8ad8ca541e6e7fb143f9d38c2236787869b3aeeb8cbeb7203776b45e35497d924ffb221cf28192ac451ea6269b7ce68defc5e4191f341727c46ce2937680c748ac3fdff6dc7160714efb77a7290273f518e3715f8e19daf26424559f1490d264eb81928a4347b7c013fa16dccbf3d687e4816d82e23fca08f7ed08d0fba18c2e5a3abf4666eca3d3721903294e23fa1a3db882708bf4e778b1dad26de7b169825d07ad15ef5a49dd04e29e438727d1acdf1d2e8cd79742a432763d7b07484059ac99"}]}]}, 0x124}}, 0x0) sendmsg$NL80211_CMD_JOIN_IBSS(r3, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="00042bbd7000fcdbdf252b0000000c00990008000000340000000400bf00"], 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x851) sendfile(r1, r2, 0x0, 0x1000000201005) sendfile(r0, r0, 0x0, 0x8800000) 18:37:36 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) getresuid(&(0x7f0000001940), &(0x7f0000001980), &(0x7f00000019c0)) 18:37:36 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000cc0)={{0x14}, [@NFT_MSG_DELFLOWTABLE={0x14}, @NFT_MSG_DELSETELEM={0x14}, @NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x401, 0x0, 0x0, {0x7}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x30, 0x16, 0xa, 0x201, 0x0, 0x0, {0x7}, [@NFTA_FLOWTABLE_HOOK={0x4}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}]}], {0x14}}, 0xa0}}, 0x0) 18:37:36 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}]}, @NFT_MSG_NEWSETELEM={0x78, 0xc, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x4c, 0x3, 0x0, 0x1, [{0x48, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0xb}, @NFTA_SET_ELEM_EXPRESSIONS={0x3c, 0xb, 0x0, 0x1, [{0x20, 0x4, 0x0, 0x1, @connlimit={{0xe}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_CONNLIMIT_COUNT={0x8}]}}}, {0x18, 0x1, 0x0, 0x1, @connlimit={{0x5}, @val={0x4}}}]}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xfc}}, 0x0) 18:37:36 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x8}]}, &(0x7f00000001c0)='GPL\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) mount_setattr(r1, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000040)={0x0, 0x0, 0x100000}, 0x20) 18:37:36 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000700), 0x0, 0x0) ioctl$IOC_PR_RELEASE(r0, 0x401070ca, 0x0) 18:37:36 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000cc0)={{0x14}, [@NFT_MSG_DELFLOWTABLE={0x14}, @NFT_MSG_DELSETELEM={0x14}, @NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x401, 0x0, 0x0, {0x7}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x30, 0x16, 0xa, 0x201, 0x0, 0x0, {0x7}, [@NFTA_FLOWTABLE_HOOK={0x4}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}]}], {0x14}}, 0xa0}}, 0x0) 18:37:36 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}