[ 18.414219][ T25] audit: type=1400 audit(1686213778.540:79): avc: denied { rlimitinh } for pid=2923 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 18.416903][ T25] audit: type=1400 audit(1686213778.540:80): avc: denied { siginh } for pid=2923 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 19.492626][ T2992] sed (2992) used greatest stack depth: 11632 bytes left [ 19.778623][ T2924] sshd (2924) used greatest stack depth: 11472 bytes left Warning: Permanently added '10.128.0.252' (ECDSA) to the list of known hosts. 2023/06/08 08:43:05 fuzzer started 2023/06/08 08:43:05 dialing manager at 10.128.0.163:30015 [ 27.463727][ T25] audit: type=1400 audit(1686213787.590:81): avc: denied { mounton } for pid=3044 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 27.464977][ T3044] cgroup: Unknown subsys name 'net' [ 27.486464][ T25] audit: type=1400 audit(1686213787.590:82): avc: denied { mount } for pid=3044 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 27.513821][ T25] audit: type=1400 audit(1686213787.620:83): avc: denied { unmount } for pid=3044 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 27.533670][ T25] audit: type=1400 audit(1686213787.620:84): avc: denied { read } for pid=2727 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 27.677492][ T3044] cgroup: Unknown subsys name 'rlimit' 2023/06/08 08:43:07 syscalls: 2854 2023/06/08 08:43:07 code coverage: enabled 2023/06/08 08:43:07 comparison tracing: enabled 2023/06/08 08:43:07 extra coverage: enabled 2023/06/08 08:43:07 delay kcov mmap: enabled 2023/06/08 08:43:07 setuid sandbox: enabled 2023/06/08 08:43:07 namespace sandbox: enabled 2023/06/08 08:43:07 Android sandbox: enabled 2023/06/08 08:43:07 fault injection: enabled 2023/06/08 08:43:07 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2023/06/08 08:43:07 net packet injection: enabled 2023/06/08 08:43:07 net device setup: enabled 2023/06/08 08:43:07 concurrency sanitizer: enabled 2023/06/08 08:43:07 devlink PCI setup: PCI device 0000:00:10.0 is not available 2023/06/08 08:43:07 NIC VF setup: PCI device 0000:00:11.0 is not available 2023/06/08 08:43:07 USB emulation: /dev/raw-gadget does not exist 2023/06/08 08:43:07 hci packet injection: /dev/vhci does not exist 2023/06/08 08:43:07 wifi device emulation: /sys/class/mac80211_hwsim/ does not exist 2023/06/08 08:43:07 802.15.4 emulation: enabled 2023/06/08 08:43:07 suppressing KCSAN reports in functions: '__lru_add_drain_all' 'ext4_free_inodes_count' 'generic_write_end' 'can_receive' 'do_notify_parent_cldstop' 'tick_sched_timer' 'dont_mount' 'exit_mm' '__xa_clear_mark' 'pcpu_alloc' 'generic_fillattr' 'fsnotify' 'd_instantiate_new' 'blk_mq_sched_dispatch_requests' 'wg_packet_send_staged_packets' 'ext4_fill_raw_inode' 'xas_clear_mark' 'do_sys_poll' 'can_send' 'tick_nohz_idle_stop_tick' 2023/06/08 08:43:07 fetching corpus: 0, signal 0/2000 (executing program) [ 27.796851][ T25] audit: type=1400 audit(1686213787.930:85): avc: denied { mounton } for pid=3044 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 27.821898][ T25] audit: type=1400 audit(1686213787.930:86): avc: denied { mount } for pid=3044 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 27.845164][ T25] audit: type=1400 audit(1686213787.930:87): avc: denied { create } for pid=3044 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 27.865651][ T25] audit: type=1400 audit(1686213787.930:88): avc: denied { write } for pid=3044 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 2023/06/08 08:43:08 fetching corpus: 50, signal 15691/19443 (executing program) [ 27.886087][ T25] audit: type=1400 audit(1686213787.930:89): avc: denied { read } for pid=3044 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 2023/06/08 08:43:08 fetching corpus: 100, signal 31004/36272 (executing program) 2023/06/08 08:43:08 fetching corpus: 150, signal 37103/43976 (executing program) 2023/06/08 08:43:08 fetching corpus: 200, signal 41258/49674 (executing program) 2023/06/08 08:43:08 fetching corpus: 250, signal 44956/54932 (executing program) 2023/06/08 08:43:08 fetching corpus: 300, signal 50389/61690 (executing program) 2023/06/08 08:43:08 fetching corpus: 350, signal 53843/66572 (executing program) 2023/06/08 08:43:08 fetching corpus: 400, signal 55987/70142 (executing program) 2023/06/08 08:43:08 fetching corpus: 450, signal 57775/73337 (executing program) 2023/06/08 08:43:08 fetching corpus: 500, signal 61694/78490 (executing program) 2023/06/08 08:43:08 fetching corpus: 550, signal 64128/82207 (executing program) 2023/06/08 08:43:08 fetching corpus: 600, signal 67274/86494 (executing program) 2023/06/08 08:43:08 fetching corpus: 650, signal 69959/90399 (executing program) 2023/06/08 08:43:08 fetching corpus: 700, signal 71589/93291 (executing program) 2023/06/08 08:43:08 fetching corpus: 750, signal 73871/96731 (executing program) 2023/06/08 08:43:08 fetching corpus: 800, signal 75422/99477 (executing program) 2023/06/08 08:43:08 fetching corpus: 850, signal 77800/102966 (executing program) 2023/06/08 08:43:08 fetching corpus: 900, signal 79163/105494 (executing program) 2023/06/08 08:43:08 fetching corpus: 950, signal 80548/108065 (executing program) 2023/06/08 08:43:08 fetching corpus: 1000, signal 82719/111312 (executing program) 2023/06/08 08:43:09 fetching corpus: 1050, signal 84053/113749 (executing program) 2023/06/08 08:43:09 fetching corpus: 1100, signal 85733/116479 (executing program) 2023/06/08 08:43:09 fetching corpus: 1150, signal 87847/119515 (executing program) 2023/06/08 08:43:09 fetching corpus: 1200, signal 91060/123427 (executing program) 2023/06/08 08:43:09 fetching corpus: 1250, signal 93150/126336 (executing program) 2023/06/08 08:43:09 fetching corpus: 1300, signal 94715/128781 (executing program) 2023/06/08 08:43:09 fetching corpus: 1350, signal 96128/131142 (executing program) 2023/06/08 08:43:09 fetching corpus: 1400, signal 97619/133584 (executing program) 2023/06/08 08:43:09 fetching corpus: 1450, signal 98657/135606 (executing program) 2023/06/08 08:43:09 fetching corpus: 1500, signal 99643/137577 (executing program) 2023/06/08 08:43:09 fetching corpus: 1550, signal 101876/140451 (executing program) 2023/06/08 08:43:09 fetching corpus: 1600, signal 103595/142896 (executing program) 2023/06/08 08:43:09 fetching corpus: 1650, signal 104296/144622 (executing program) 2023/06/08 08:43:09 fetching corpus: 1700, signal 105853/146966 (executing program) 2023/06/08 08:43:09 fetching corpus: 1750, signal 107323/149195 (executing program) 2023/06/08 08:43:09 fetching corpus: 1800, signal 108065/150887 (executing program) 2023/06/08 08:43:09 fetching corpus: 1850, signal 109139/152831 (executing program) 2023/06/08 08:43:09 fetching corpus: 1900, signal 110138/154694 (executing program) 2023/06/08 08:43:09 fetching corpus: 1950, signal 111389/156657 (executing program) 2023/06/08 08:43:09 fetching corpus: 2000, signal 112695/158657 (executing program) 2023/06/08 08:43:09 fetching corpus: 2050, signal 113931/160601 (executing program) 2023/06/08 08:43:10 fetching corpus: 2100, signal 115762/163011 (executing program) 2023/06/08 08:43:10 fetching corpus: 2150, signal 116577/164661 (executing program) 2023/06/08 08:43:10 fetching corpus: 2200, signal 117658/166456 (executing program) 2023/06/08 08:43:10 fetching corpus: 2250, signal 118991/168421 (executing program) 2023/06/08 08:43:10 fetching corpus: 2300, signal 120037/170126 (executing program) 2023/06/08 08:43:10 fetching corpus: 2350, signal 121076/171825 (executing program) 2023/06/08 08:43:10 fetching corpus: 2400, signal 122191/173571 (executing program) 2023/06/08 08:43:10 fetching corpus: 2450, signal 123661/175518 (executing program) 2023/06/08 08:43:10 fetching corpus: 2500, signal 124435/176956 (executing program) 2023/06/08 08:43:10 fetching corpus: 2550, signal 125115/178400 (executing program) 2023/06/08 08:43:10 fetching corpus: 2600, signal 125916/179880 (executing program) 2023/06/08 08:43:10 fetching corpus: 2650, signal 127230/181670 (executing program) 2023/06/08 08:43:10 fetching corpus: 2700, signal 128305/183297 (executing program) 2023/06/08 08:43:10 fetching corpus: 2750, signal 128922/184656 (executing program) 2023/06/08 08:43:10 fetching corpus: 2800, signal 130190/186385 (executing program) 2023/06/08 08:43:10 fetching corpus: 2850, signal 131493/188101 (executing program) 2023/06/08 08:43:10 fetching corpus: 2900, signal 132877/189858 (executing program) 2023/06/08 08:43:10 fetching corpus: 2950, signal 133355/191061 (executing program) 2023/06/08 08:43:10 fetching corpus: 3000, signal 134836/192789 (executing program) 2023/06/08 08:43:10 fetching corpus: 3050, signal 135836/194272 (executing program) 2023/06/08 08:43:10 fetching corpus: 3100, signal 136647/195655 (executing program) 2023/06/08 08:43:10 fetching corpus: 3150, signal 137526/197090 (executing program) 2023/06/08 08:43:11 fetching corpus: 3200, signal 138209/198324 (executing program) 2023/06/08 08:43:11 fetching corpus: 3250, signal 138781/199526 (executing program) 2023/06/08 08:43:11 fetching corpus: 3300, signal 139634/200825 (executing program) 2023/06/08 08:43:11 fetching corpus: 3350, signal 140151/202008 (executing program) 2023/06/08 08:43:11 fetching corpus: 3400, signal 141034/203299 (executing program) 2023/06/08 08:43:11 fetching corpus: 3450, signal 141979/204608 (executing program) 2023/06/08 08:43:11 fetching corpus: 3500, signal 142659/205756 (executing program) 2023/06/08 08:43:11 fetching corpus: 3550, signal 143344/206961 (executing program) 2023/06/08 08:43:11 fetching corpus: 3600, signal 143800/208038 (executing program) 2023/06/08 08:43:11 fetching corpus: 3650, signal 144402/209170 (executing program) 2023/06/08 08:43:11 fetching corpus: 3700, signal 145129/210363 (executing program) 2023/06/08 08:43:11 fetching corpus: 3750, signal 145913/211554 (executing program) 2023/06/08 08:43:11 fetching corpus: 3800, signal 146754/212789 (executing program) 2023/06/08 08:43:11 fetching corpus: 3850, signal 147740/214062 (executing program) 2023/06/08 08:43:11 fetching corpus: 3900, signal 148621/215216 (executing program) 2023/06/08 08:43:11 fetching corpus: 3950, signal 149164/216306 (executing program) 2023/06/08 08:43:11 fetching corpus: 4000, signal 149894/217354 (executing program) 2023/06/08 08:43:11 fetching corpus: 4050, signal 150563/218401 (executing program) 2023/06/08 08:43:11 fetching corpus: 4100, signal 151423/219485 (executing program) 2023/06/08 08:43:11 fetching corpus: 4150, signal 151993/220470 (executing program) 2023/06/08 08:43:11 fetching corpus: 4200, signal 152763/221505 (executing program) 2023/06/08 08:43:11 fetching corpus: 4250, signal 153609/222564 (executing program) 2023/06/08 08:43:12 fetching corpus: 4300, signal 154232/223568 (executing program) 2023/06/08 08:43:12 fetching corpus: 4350, signal 155125/224641 (executing program) 2023/06/08 08:43:12 fetching corpus: 4400, signal 155760/225662 (executing program) 2023/06/08 08:43:12 fetching corpus: 4450, signal 156396/226660 (executing program) 2023/06/08 08:43:12 fetching corpus: 4500, signal 157095/227653 (executing program) 2023/06/08 08:43:12 fetching corpus: 4550, signal 157782/228632 (executing program) 2023/06/08 08:43:12 fetching corpus: 4600, signal 158454/229576 (executing program) 2023/06/08 08:43:12 fetching corpus: 4650, signal 159056/230494 (executing program) 2023/06/08 08:43:12 fetching corpus: 4700, signal 159708/231397 (executing program) 2023/06/08 08:43:12 fetching corpus: 4750, signal 160238/232285 (executing program) 2023/06/08 08:43:12 fetching corpus: 4800, signal 161038/233268 (executing program) 2023/06/08 08:43:12 fetching corpus: 4850, signal 161671/234179 (executing program) 2023/06/08 08:43:12 fetching corpus: 4900, signal 162196/235033 (executing program) 2023/06/08 08:43:12 fetching corpus: 4950, signal 162627/235884 (executing program) 2023/06/08 08:43:12 fetching corpus: 5000, signal 163436/236769 (executing program) 2023/06/08 08:43:12 fetching corpus: 5050, signal 164025/237562 (executing program) 2023/06/08 08:43:12 fetching corpus: 5100, signal 164436/238340 (executing program) 2023/06/08 08:43:12 fetching corpus: 5150, signal 165085/239180 (executing program) 2023/06/08 08:43:12 fetching corpus: 5200, signal 165460/239982 (executing program) 2023/06/08 08:43:12 fetching corpus: 5250, signal 165825/240761 (executing program) 2023/06/08 08:43:12 fetching corpus: 5300, signal 166292/241526 (executing program) 2023/06/08 08:43:12 fetching corpus: 5350, signal 166905/242301 (executing program) 2023/06/08 08:43:13 fetching corpus: 5400, signal 167591/243127 (executing program) 2023/06/08 08:43:13 fetching corpus: 5450, signal 168162/243929 (executing program) 2023/06/08 08:43:13 fetching corpus: 5500, signal 168770/244690 (executing program) 2023/06/08 08:43:13 fetching corpus: 5550, signal 169679/245496 (executing program) 2023/06/08 08:43:13 fetching corpus: 5600, signal 170468/246307 (executing program) 2023/06/08 08:43:13 fetching corpus: 5650, signal 171196/247063 (executing program) 2023/06/08 08:43:13 fetching corpus: 5700, signal 172094/247798 (executing program) 2023/06/08 08:43:13 fetching corpus: 5750, signal 173002/248543 (executing program) 2023/06/08 08:43:13 fetching corpus: 5800, signal 173471/249250 (executing program) 2023/06/08 08:43:13 fetching corpus: 5850, signal 173913/249930 (executing program) 2023/06/08 08:43:13 fetching corpus: 5900, signal 174824/250630 (executing program) 2023/06/08 08:43:13 fetching corpus: 5950, signal 175390/251287 (executing program) 2023/06/08 08:43:13 fetching corpus: 6000, signal 175859/251963 (executing program) 2023/06/08 08:43:13 fetching corpus: 6050, signal 176434/252596 (executing program) 2023/06/08 08:43:13 fetching corpus: 6100, signal 176912/253257 (executing program) 2023/06/08 08:43:13 fetching corpus: 6150, signal 177546/253855 (executing program) 2023/06/08 08:43:13 fetching corpus: 6200, signal 178136/254545 (executing program) 2023/06/08 08:43:13 fetching corpus: 6250, signal 178607/255183 (executing program) 2023/06/08 08:43:13 fetching corpus: 6300, signal 179070/255803 (executing program) 2023/06/08 08:43:13 fetching corpus: 6350, signal 179559/256397 (executing program) 2023/06/08 08:43:13 fetching corpus: 6400, signal 179963/256551 (executing program) 2023/06/08 08:43:13 fetching corpus: 6450, signal 180424/256554 (executing program) 2023/06/08 08:43:14 fetching corpus: 6500, signal 180971/256554 (executing program) 2023/06/08 08:43:14 fetching corpus: 6550, signal 181341/256554 (executing program) 2023/06/08 08:43:14 fetching corpus: 6600, signal 181915/256554 (executing program) 2023/06/08 08:43:14 fetching corpus: 6650, signal 182389/256554 (executing program) 2023/06/08 08:43:14 fetching corpus: 6700, signal 182767/256554 (executing program) 2023/06/08 08:43:14 fetching corpus: 6750, signal 183569/256554 (executing program) 2023/06/08 08:43:14 fetching corpus: 6800, signal 183911/256554 (executing program) 2023/06/08 08:43:14 fetching corpus: 6850, signal 184302/256554 (executing program) 2023/06/08 08:43:14 fetching corpus: 6900, signal 184651/256554 (executing program) 2023/06/08 08:43:14 fetching corpus: 6950, signal 185163/256554 (executing program) 2023/06/08 08:43:14 fetching corpus: 7000, signal 185582/256554 (executing program) 2023/06/08 08:43:14 fetching corpus: 7050, signal 186167/256554 (executing program) 2023/06/08 08:43:14 fetching corpus: 7100, signal 186534/256554 (executing program) 2023/06/08 08:43:14 fetching corpus: 7150, signal 187018/256554 (executing program) 2023/06/08 08:43:14 fetching corpus: 7200, signal 187569/256554 (executing program) 2023/06/08 08:43:14 fetching corpus: 7250, signal 187982/256554 (executing program) 2023/06/08 08:43:14 fetching corpus: 7300, signal 188599/256554 (executing program) 2023/06/08 08:43:14 fetching corpus: 7350, signal 189070/256554 (executing program) 2023/06/08 08:43:14 fetching corpus: 7400, signal 189397/256554 (executing program) 2023/06/08 08:43:14 fetching corpus: 7450, signal 189725/256555 (executing program) 2023/06/08 08:43:14 fetching corpus: 7500, signal 190149/256555 (executing program) 2023/06/08 08:43:14 fetching corpus: 7550, signal 190602/256555 (executing program) 2023/06/08 08:43:14 fetching corpus: 7600, signal 190954/256555 (executing program) 2023/06/08 08:43:15 fetching corpus: 7650, signal 191467/256555 (executing program) 2023/06/08 08:43:15 fetching corpus: 7700, signal 192096/256555 (executing program) 2023/06/08 08:43:15 fetching corpus: 7750, signal 192598/256555 (executing program) 2023/06/08 08:43:15 fetching corpus: 7800, signal 193249/256555 (executing program) 2023/06/08 08:43:15 fetching corpus: 7850, signal 193699/256555 (executing program) 2023/06/08 08:43:15 fetching corpus: 7900, signal 194046/256555 (executing program) 2023/06/08 08:43:15 fetching corpus: 7950, signal 194460/256555 (executing program) 2023/06/08 08:43:15 fetching corpus: 8000, signal 195022/256556 (executing program) 2023/06/08 08:43:15 fetching corpus: 8050, signal 195441/256556 (executing program) 2023/06/08 08:43:15 fetching corpus: 8100, signal 195851/256556 (executing program) 2023/06/08 08:43:15 fetching corpus: 8150, signal 196128/256556 (executing program) 2023/06/08 08:43:15 fetching corpus: 8200, signal 196399/256556 (executing program) 2023/06/08 08:43:15 fetching corpus: 8250, signal 196842/256556 (executing program) 2023/06/08 08:43:15 fetching corpus: 8300, signal 197281/256557 (executing program) 2023/06/08 08:43:15 fetching corpus: 8349, signal 198187/256557 (executing program) 2023/06/08 08:43:15 fetching corpus: 8399, signal 198459/256557 (executing program) 2023/06/08 08:43:15 fetching corpus: 8449, signal 198869/256557 (executing program) 2023/06/08 08:43:15 fetching corpus: 8499, signal 199172/256559 (executing program) 2023/06/08 08:43:15 fetching corpus: 8549, signal 199547/256575 (executing program) 2023/06/08 08:43:15 fetching corpus: 8599, signal 199895/256575 (executing program) 2023/06/08 08:43:15 fetching corpus: 8649, signal 200198/256575 (executing program) 2023/06/08 08:43:15 fetching corpus: 8699, signal 200829/256575 (executing program) 2023/06/08 08:43:16 fetching corpus: 8749, signal 201123/256575 (executing program) 2023/06/08 08:43:16 fetching corpus: 8799, signal 201436/256575 (executing program) 2023/06/08 08:43:16 fetching corpus: 8849, signal 201784/256575 (executing program) 2023/06/08 08:43:16 fetching corpus: 8899, signal 202133/256575 (executing program) 2023/06/08 08:43:16 fetching corpus: 8949, signal 202589/256575 (executing program) 2023/06/08 08:43:16 fetching corpus: 8999, signal 203581/256575 (executing program) 2023/06/08 08:43:16 fetching corpus: 9049, signal 203978/256575 (executing program) 2023/06/08 08:43:16 fetching corpus: 9099, signal 204363/256575 (executing program) 2023/06/08 08:43:16 fetching corpus: 9149, signal 204689/256575 (executing program) 2023/06/08 08:43:16 fetching corpus: 9199, signal 205180/256575 (executing program) 2023/06/08 08:43:16 fetching corpus: 9249, signal 205534/256575 (executing program) 2023/06/08 08:43:16 fetching corpus: 9299, signal 206000/256575 (executing program) 2023/06/08 08:43:16 fetching corpus: 9349, signal 206415/256575 (executing program) 2023/06/08 08:43:16 fetching corpus: 9399, signal 206906/256575 (executing program) 2023/06/08 08:43:16 fetching corpus: 9449, signal 207340/256575 (executing program) 2023/06/08 08:43:16 fetching corpus: 9499, signal 207908/256575 (executing program) 2023/06/08 08:43:16 fetching corpus: 9549, signal 208260/256575 (executing program) 2023/06/08 08:43:16 fetching corpus: 9599, signal 208657/256575 (executing program) 2023/06/08 08:43:16 fetching corpus: 9649, signal 208975/256575 (executing program) 2023/06/08 08:43:16 fetching corpus: 9699, signal 209294/256575 (executing program) 2023/06/08 08:43:16 fetching corpus: 9749, signal 209694/256575 (executing program) 2023/06/08 08:43:16 fetching corpus: 9799, signal 210674/256575 (executing program) 2023/06/08 08:43:16 fetching corpus: 9849, signal 210971/256575 (executing program) 2023/06/08 08:43:16 fetching corpus: 9899, signal 211375/256575 (executing program) 2023/06/08 08:43:17 fetching corpus: 9949, signal 211898/256575 (executing program) 2023/06/08 08:43:17 fetching corpus: 9999, signal 212166/256575 (executing program) 2023/06/08 08:43:17 fetching corpus: 10049, signal 212459/256575 (executing program) 2023/06/08 08:43:17 fetching corpus: 10099, signal 212848/256575 (executing program) 2023/06/08 08:43:17 fetching corpus: 10149, signal 213825/256575 (executing program) 2023/06/08 08:43:17 fetching corpus: 10199, signal 214185/256575 (executing program) 2023/06/08 08:43:17 fetching corpus: 10249, signal 214775/256575 (executing program) 2023/06/08 08:43:17 fetching corpus: 10299, signal 215107/256575 (executing program) 2023/06/08 08:43:17 fetching corpus: 10349, signal 215439/256576 (executing program) 2023/06/08 08:43:17 fetching corpus: 10399, signal 215707/256576 (executing program) 2023/06/08 08:43:17 fetching corpus: 10449, signal 216021/256576 (executing program) 2023/06/08 08:43:17 fetching corpus: 10499, signal 216318/256576 (executing program) 2023/06/08 08:43:17 fetching corpus: 10549, signal 216641/256576 (executing program) 2023/06/08 08:43:17 fetching corpus: 10599, signal 217072/256576 (executing program) 2023/06/08 08:43:17 fetching corpus: 10649, signal 217454/256576 (executing program) 2023/06/08 08:43:17 fetching corpus: 10699, signal 217823/256576 (executing program) 2023/06/08 08:43:17 fetching corpus: 10749, signal 218143/256576 (executing program) 2023/06/08 08:43:17 fetching corpus: 10799, signal 218520/256576 (executing program) 2023/06/08 08:43:17 fetching corpus: 10849, signal 218985/256576 (executing program) 2023/06/08 08:43:17 fetching corpus: 10899, signal 219357/256576 (executing program) 2023/06/08 08:43:17 fetching corpus: 10949, signal 219620/256576 (executing program) 2023/06/08 08:43:17 fetching corpus: 10999, signal 219886/256576 (executing program) 2023/06/08 08:43:17 fetching corpus: 11049, signal 220152/256576 (executing program) 2023/06/08 08:43:18 fetching corpus: 11099, signal 220807/256576 (executing program) 2023/06/08 08:43:18 fetching corpus: 11149, signal 221140/256576 (executing program) 2023/06/08 08:43:18 fetching corpus: 11199, signal 221468/256576 (executing program) 2023/06/08 08:43:18 fetching corpus: 11249, signal 221831/256576 (executing program) 2023/06/08 08:43:18 fetching corpus: 11299, signal 222111/256576 (executing program) 2023/06/08 08:43:18 fetching corpus: 11349, signal 222496/256576 (executing program) 2023/06/08 08:43:18 fetching corpus: 11399, signal 222716/256576 (executing program) 2023/06/08 08:43:18 fetching corpus: 11449, signal 223007/256576 (executing program) 2023/06/08 08:43:18 fetching corpus: 11499, signal 223310/256576 (executing program) 2023/06/08 08:43:18 fetching corpus: 11549, signal 223660/256576 (executing program) 2023/06/08 08:43:18 fetching corpus: 11599, signal 223945/256576 (executing program) 2023/06/08 08:43:18 fetching corpus: 11649, signal 224237/256577 (executing program) 2023/06/08 08:43:18 fetching corpus: 11699, signal 224592/256577 (executing program) 2023/06/08 08:43:18 fetching corpus: 11749, signal 224821/256577 (executing program) 2023/06/08 08:43:18 fetching corpus: 11799, signal 225113/256577 (executing program) 2023/06/08 08:43:18 fetching corpus: 11849, signal 225459/256577 (executing program) 2023/06/08 08:43:18 fetching corpus: 11899, signal 225644/256577 (executing program) 2023/06/08 08:43:18 fetching corpus: 11949, signal 226059/256577 (executing program) 2023/06/08 08:43:18 fetching corpus: 11999, signal 226421/256577 (executing program) 2023/06/08 08:43:18 fetching corpus: 12049, signal 226645/256577 (executing program) 2023/06/08 08:43:18 fetching corpus: 12099, signal 226850/256577 (executing program) 2023/06/08 08:43:18 fetching corpus: 12149, signal 227128/256577 (executing program) 2023/06/08 08:43:18 fetching corpus: 12199, signal 227362/256577 (executing program) 2023/06/08 08:43:18 fetching corpus: 12249, signal 227767/256577 (executing program) 2023/06/08 08:43:19 fetching corpus: 12299, signal 228176/256577 (executing program) 2023/06/08 08:43:19 fetching corpus: 12349, signal 228597/256577 (executing program) 2023/06/08 08:43:19 fetching corpus: 12399, signal 229157/256577 (executing program) 2023/06/08 08:43:19 fetching corpus: 12449, signal 229427/256577 (executing program) 2023/06/08 08:43:19 fetching corpus: 12499, signal 229756/256577 (executing program) 2023/06/08 08:43:19 fetching corpus: 12549, signal 230126/256577 (executing program) 2023/06/08 08:43:19 fetching corpus: 12599, signal 230330/256577 (executing program) 2023/06/08 08:43:19 fetching corpus: 12649, signal 230548/256577 (executing program) 2023/06/08 08:43:19 fetching corpus: 12699, signal 230835/256577 (executing program) 2023/06/08 08:43:19 fetching corpus: 12749, signal 231054/256577 (executing program) 2023/06/08 08:43:19 fetching corpus: 12799, signal 231367/256577 (executing program) 2023/06/08 08:43:19 fetching corpus: 12849, signal 231666/256577 (executing program) 2023/06/08 08:43:19 fetching corpus: 12899, signal 232045/256577 (executing program) 2023/06/08 08:43:19 fetching corpus: 12949, signal 232387/256577 (executing program) 2023/06/08 08:43:19 fetching corpus: 12999, signal 232670/256577 (executing program) 2023/06/08 08:43:19 fetching corpus: 13049, signal 233115/256577 (executing program) 2023/06/08 08:43:19 fetching corpus: 13099, signal 233376/256577 (executing program) 2023/06/08 08:43:19 fetching corpus: 13149, signal 233645/256577 (executing program) 2023/06/08 08:43:19 fetching corpus: 13199, signal 233850/256577 (executing program) 2023/06/08 08:43:19 fetching corpus: 13249, signal 234215/256580 (executing program) 2023/06/08 08:43:19 fetching corpus: 13299, signal 234404/256580 (executing program) 2023/06/08 08:43:19 fetching corpus: 13348, signal 234657/256580 (executing program) 2023/06/08 08:43:19 fetching corpus: 13398, signal 235099/256580 (executing program) 2023/06/08 08:43:19 fetching corpus: 13448, signal 235362/256580 (executing program) 2023/06/08 08:43:20 fetching corpus: 13498, signal 235592/256580 (executing program) 2023/06/08 08:43:20 fetching corpus: 13548, signal 235879/256580 (executing program) 2023/06/08 08:43:20 fetching corpus: 13598, signal 236100/256580 (executing program) 2023/06/08 08:43:20 fetching corpus: 13648, signal 236468/256580 (executing program) 2023/06/08 08:43:20 fetching corpus: 13698, signal 236747/256580 (executing program) 2023/06/08 08:43:20 fetching corpus: 13748, signal 237112/256580 (executing program) 2023/06/08 08:43:20 fetching corpus: 13798, signal 237336/256580 (executing program) 2023/06/08 08:43:20 fetching corpus: 13848, signal 237566/256580 (executing program) 2023/06/08 08:43:20 fetching corpus: 13898, signal 237868/256583 (executing program) 2023/06/08 08:43:20 fetching corpus: 13948, signal 238155/256583 (executing program) 2023/06/08 08:43:20 fetching corpus: 13998, signal 238444/256589 (executing program) 2023/06/08 08:43:20 fetching corpus: 14048, signal 238685/256589 (executing program) 2023/06/08 08:43:20 fetching corpus: 14098, signal 239151/256590 (executing program) 2023/06/08 08:43:20 fetching corpus: 14148, signal 239493/256593 (executing program) 2023/06/08 08:43:20 fetching corpus: 14198, signal 239731/256593 (executing program) 2023/06/08 08:43:20 fetching corpus: 14248, signal 239979/256593 (executing program) 2023/06/08 08:43:20 fetching corpus: 14298, signal 240176/256593 (executing program) 2023/06/08 08:43:20 fetching corpus: 14348, signal 240503/256594 (executing program) 2023/06/08 08:43:20 fetching corpus: 14398, signal 240795/256594 (executing program) 2023/06/08 08:43:20 fetching corpus: 14448, signal 241026/256594 (executing program) 2023/06/08 08:43:20 fetching corpus: 14498, signal 241338/256594 (executing program) 2023/06/08 08:43:20 fetching corpus: 14548, signal 241637/256594 (executing program) 2023/06/08 08:43:21 fetching corpus: 14598, signal 241899/256594 (executing program) 2023/06/08 08:43:21 fetching corpus: 14648, signal 242351/256601 (executing program) 2023/06/08 08:43:21 fetching corpus: 14698, signal 242615/256607 (executing program) 2023/06/08 08:43:21 fetching corpus: 14748, signal 243045/256607 (executing program) 2023/06/08 08:43:21 fetching corpus: 14798, signal 243253/256607 (executing program) 2023/06/08 08:43:21 fetching corpus: 14848, signal 243519/256607 (executing program) 2023/06/08 08:43:21 fetching corpus: 14898, signal 243906/256607 (executing program) 2023/06/08 08:43:21 fetching corpus: 14948, signal 244228/256607 (executing program) 2023/06/08 08:43:21 fetching corpus: 14998, signal 244507/256607 (executing program) 2023/06/08 08:43:21 fetching corpus: 15048, signal 244862/256607 (executing program) 2023/06/08 08:43:21 fetching corpus: 15098, signal 245229/256607 (executing program) 2023/06/08 08:43:21 fetching corpus: 15148, signal 245443/256607 (executing program) 2023/06/08 08:43:21 fetching corpus: 15198, signal 245890/256607 (executing program) 2023/06/08 08:43:21 fetching corpus: 15248, signal 246129/256607 (executing program) 2023/06/08 08:43:21 fetching corpus: 15298, signal 246328/256607 (executing program) 2023/06/08 08:43:21 fetching corpus: 15348, signal 246707/256607 (executing program) 2023/06/08 08:43:21 fetching corpus: 15398, signal 246949/256607 (executing program) 2023/06/08 08:43:21 fetching corpus: 15448, signal 247212/256607 (executing program) 2023/06/08 08:43:21 fetching corpus: 15498, signal 247625/256607 (executing program) 2023/06/08 08:43:21 fetching corpus: 15548, signal 247814/256607 (executing program) 2023/06/08 08:43:21 fetching corpus: 15598, signal 248058/256607 (executing program) 2023/06/08 08:43:21 fetching corpus: 15648, signal 248270/256631 (executing program) 2023/06/08 08:43:21 fetching corpus: 15698, signal 248613/256631 (executing program) 2023/06/08 08:43:21 fetching corpus: 15748, signal 248840/256631 (executing program) 2023/06/08 08:43:22 fetching corpus: 15798, signal 249125/256631 (executing program) 2023/06/08 08:43:22 fetching corpus: 15848, signal 249365/256631 (executing program) 2023/06/08 08:43:22 fetching corpus: 15898, signal 249648/256631 (executing program) 2023/06/08 08:43:22 fetching corpus: 15948, signal 250001/256631 (executing program) 2023/06/08 08:43:22 fetching corpus: 15998, signal 250193/256631 (executing program) 2023/06/08 08:43:22 fetching corpus: 16048, signal 250559/256631 (executing program) 2023/06/08 08:43:22 fetching corpus: 16098, signal 250756/256631 (executing program) 2023/06/08 08:43:22 fetching corpus: 16148, signal 250993/256631 (executing program) 2023/06/08 08:43:22 fetching corpus: 16198, signal 251183/256631 (executing program) 2023/06/08 08:43:22 fetching corpus: 16248, signal 251572/256631 (executing program) 2023/06/08 08:43:22 fetching corpus: 16298, signal 251863/256631 (executing program) 2023/06/08 08:43:22 fetching corpus: 16348, signal 252180/256633 (executing program) 2023/06/08 08:43:22 fetching corpus: 16398, signal 252468/256633 (executing program) 2023/06/08 08:43:22 fetching corpus: 16448, signal 252643/256633 (executing program) 2023/06/08 08:43:22 fetching corpus: 16498, signal 252829/256633 (executing program) 2023/06/08 08:43:22 fetching corpus: 16548, signal 253044/256633 (executing program) 2023/06/08 08:43:22 fetching corpus: 16590, signal 253378/256633 (executing program) 2023/06/08 08:43:22 fetching corpus: 16590, signal 253378/256633 (executing program) 2023/06/08 08:43:24 starting 6 fuzzer processes 08:43:24 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f0000001580)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r0}, 0x10) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r1}, 0x8) close(r2) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000040)={0x0, 0x0}, 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$ITER_CREATE(0xb, 0x0, 0x0) close(0xffffffffffffffff) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000080)=r3, 0x4) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r4}, 0x10) r6 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r5}, 0x8) close(r6) 08:43:24 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') read$usbfs(r0, &(0x7f0000000100)=""/164, 0xa4) 08:43:24 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0x14, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_DEBUG_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}]}]}, 0x40}}, 0x0) 08:43:24 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=@newsa={0x138, 0x18, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@empty}, {@in=@dev}, @in6=@private2}, [@algo_comp={0x48, 0x3, {{'deflate\x00'}}}]}, 0x138}}, 0x0) 08:43:24 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x3, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0xce}, @jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 08:43:24 executing program 5: syz_emit_ethernet(0x42, &(0x7f00000006c0)={@local, @random='agm.6B', @val={@void}, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "0fc62f", 0x4, 0x2c, 0x0, @loopback={0x1000000}, @rand_addr=' \x01\x00', {[], @echo_reply}}}}}, 0x0) [ 44.503047][ T3043] memfd_create() without MFD_EXEC nor MFD_NOEXEC_SEAL, pid=3043 'syz-fuzzer' [ 44.564365][ T25] audit: type=1400 audit(1686213804.690:90): avc: denied { execmem } for pid=3051 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 44.646932][ T25] audit: type=1400 audit(1686213804.780:91): avc: denied { read } for pid=3059 comm="syz-executor.3" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 44.690038][ T25] audit: type=1400 audit(1686213804.800:92): avc: denied { open } for pid=3059 comm="syz-executor.3" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 44.713484][ T25] audit: type=1400 audit(1686213804.800:93): avc: denied { mounton } for pid=3059 comm="syz-executor.3" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 44.735102][ T25] audit: type=1400 audit(1686213804.800:94): avc: denied { module_request } for pid=3059 comm="syz-executor.3" kmod="netdev-nr3" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 44.756959][ T25] audit: type=1400 audit(1686213804.820:95): avc: denied { sys_module } for pid=3059 comm="syz-executor.3" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 45.119463][ T3059] chnl_net:caif_netlink_parms(): no params data found [ 45.138739][ T25] audit: type=1400 audit(1686213805.270:96): avc: denied { append } for pid=2727 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 45.160951][ T25] audit: type=1400 audit(1686213805.270:97): avc: denied { open } for pid=2727 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 45.183370][ T25] audit: type=1400 audit(1686213805.270:98): avc: denied { getattr } for pid=2727 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 45.206392][ T3065] chnl_net:caif_netlink_parms(): no params data found [ 45.267240][ T3062] chnl_net:caif_netlink_parms(): no params data found [ 45.314565][ T3059] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.321755][ T3059] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.329011][ T3059] bridge_slave_0: entered allmulticast mode [ 45.335373][ T3059] bridge_slave_0: entered promiscuous mode [ 45.356334][ T3065] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.363492][ T3065] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.370764][ T3065] bridge_slave_0: entered allmulticast mode [ 45.377125][ T3065] bridge_slave_0: entered promiscuous mode [ 45.385587][ T3069] chnl_net:caif_netlink_parms(): no params data found [ 45.400219][ T3059] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.407290][ T3059] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.414442][ T3059] bridge_slave_1: entered allmulticast mode [ 45.420917][ T3059] bridge_slave_1: entered promiscuous mode [ 45.431648][ T3082] chnl_net:caif_netlink_parms(): no params data found [ 45.440245][ T3065] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.447304][ T3065] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.454606][ T3065] bridge_slave_1: entered allmulticast mode [ 45.461008][ T3065] bridge_slave_1: entered promiscuous mode [ 45.490283][ T3062] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.497396][ T3062] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.504514][ T3062] bridge_slave_0: entered allmulticast mode [ 45.510914][ T3062] bridge_slave_0: entered promiscuous mode [ 45.532879][ T3065] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 45.553094][ T3062] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.560200][ T3062] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.567332][ T3062] bridge_slave_1: entered allmulticast mode [ 45.573575][ T3062] bridge_slave_1: entered promiscuous mode [ 45.591510][ T3065] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 45.601607][ T3059] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 45.628451][ T3059] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 45.646600][ T3062] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 45.665419][ T3065] team0: Port device team_slave_0 added [ 45.677111][ T3062] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 45.686395][ T3069] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.693422][ T3069] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.700587][ T3069] bridge_slave_0: entered allmulticast mode [ 45.707193][ T3069] bridge_slave_0: entered promiscuous mode [ 45.713543][ T3078] chnl_net:caif_netlink_parms(): no params data found [ 45.727872][ T3065] team0: Port device team_slave_1 added [ 45.742643][ T3069] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.749698][ T3069] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.757002][ T3069] bridge_slave_1: entered allmulticast mode [ 45.763359][ T3069] bridge_slave_1: entered promiscuous mode [ 45.772664][ T3059] team0: Port device team_slave_0 added [ 45.783383][ T3082] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.790519][ T3082] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.797678][ T3082] bridge_slave_0: entered allmulticast mode [ 45.803980][ T3082] bridge_slave_0: entered promiscuous mode [ 45.822433][ T3059] team0: Port device team_slave_1 added [ 45.832733][ T3082] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.839899][ T3082] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.847101][ T3082] bridge_slave_1: entered allmulticast mode [ 45.853501][ T3082] bridge_slave_1: entered promiscuous mode [ 45.860313][ T3062] team0: Port device team_slave_0 added [ 45.882616][ T3065] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 45.889761][ T3065] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 45.915740][ T3065] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 45.931885][ T3062] team0: Port device team_slave_1 added [ 45.938827][ T3069] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 45.949112][ T3069] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 45.969967][ T3065] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 45.976960][ T3065] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 46.002875][ T3065] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 46.037788][ T3059] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 46.044758][ T3059] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 46.070735][ T3059] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 46.084912][ T3082] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 46.094379][ T3062] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 46.101405][ T3062] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 46.127369][ T3062] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 46.138455][ T3062] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 46.145488][ T3062] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 46.171421][ T3062] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 46.187161][ T3078] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.194293][ T3078] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.201429][ T3078] bridge_slave_0: entered allmulticast mode [ 46.207743][ T3078] bridge_slave_0: entered promiscuous mode [ 46.214889][ T3069] team0: Port device team_slave_0 added [ 46.224177][ T3059] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 46.231217][ T3059] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 46.257118][ T3059] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 46.277278][ T3082] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 46.298016][ T3078] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.305087][ T3078] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.312504][ T3078] bridge_slave_1: entered allmulticast mode [ 46.318876][ T3078] bridge_slave_1: entered promiscuous mode [ 46.325807][ T3069] team0: Port device team_slave_1 added [ 46.339251][ T3065] hsr_slave_0: entered promiscuous mode [ 46.345511][ T3065] hsr_slave_1: entered promiscuous mode [ 46.353334][ T3082] team0: Port device team_slave_0 added [ 46.379318][ T3082] team0: Port device team_slave_1 added [ 46.393748][ T3069] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 46.400692][ T3069] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 46.426665][ T3069] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 46.450967][ T3078] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 46.464693][ T3069] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 46.471659][ T3069] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 46.497636][ T3069] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 46.510000][ T3062] hsr_slave_0: entered promiscuous mode [ 46.516205][ T3062] hsr_slave_1: entered promiscuous mode [ 46.522079][ T3062] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 46.529632][ T3062] Cannot create hsr debugfs directory [ 46.541982][ T3059] hsr_slave_0: entered promiscuous mode [ 46.548025][ T3059] hsr_slave_1: entered promiscuous mode [ 46.554326][ T3059] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 46.561985][ T3059] Cannot create hsr debugfs directory [ 46.568402][ T3078] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 46.584748][ T3082] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 46.591710][ T3082] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 46.617621][ T3082] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 46.628757][ T3082] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 46.635708][ T3082] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 46.661712][ T3082] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 46.701258][ T3078] team0: Port device team_slave_0 added [ 46.709287][ T3078] team0: Port device team_slave_1 added [ 46.752315][ T3069] hsr_slave_0: entered promiscuous mode [ 46.758411][ T3069] hsr_slave_1: entered promiscuous mode [ 46.764296][ T3069] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 46.771981][ T3069] Cannot create hsr debugfs directory [ 46.788411][ T3078] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 46.795372][ T3078] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 46.821338][ T3078] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 46.833929][ T3082] hsr_slave_0: entered promiscuous mode [ 46.840016][ T3082] hsr_slave_1: entered promiscuous mode [ 46.846052][ T3082] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 46.853623][ T3082] Cannot create hsr debugfs directory [ 46.870618][ T3078] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 46.877660][ T3078] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 46.903610][ T3078] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 46.958164][ T3078] hsr_slave_0: entered promiscuous mode [ 46.964142][ T3078] hsr_slave_1: entered promiscuous mode [ 46.970116][ T3078] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 46.977687][ T3078] Cannot create hsr debugfs directory [ 47.018768][ T3059] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 47.035699][ T3059] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 47.051258][ T3059] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 47.065359][ T3059] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 47.091783][ T3065] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 47.100265][ T3065] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 47.111226][ T3065] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 47.123783][ T3065] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 47.146854][ T3062] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 47.163777][ T3062] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 47.172370][ T3062] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 47.182096][ T3069] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 47.190723][ T3069] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 47.207422][ T3062] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 47.222104][ T25] audit: type=1400 audit(1686213807.350:99): avc: denied { remove_name } for pid=2727 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 47.249355][ T3069] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 47.285837][ T3069] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 47.296590][ T3082] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 47.318982][ T3082] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 47.329122][ T3082] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 47.343372][ T3059] 8021q: adding VLAN 0 to HW filter on device bond0 [ 47.356752][ T3062] 8021q: adding VLAN 0 to HW filter on device bond0 [ 47.369424][ T3082] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 47.380357][ T3116] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 47.388263][ T3116] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 47.399065][ T3059] 8021q: adding VLAN 0 to HW filter on device team0 [ 47.406591][ T3078] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 47.426078][ T3062] 8021q: adding VLAN 0 to HW filter on device team0 [ 47.437747][ T3078] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 47.448155][ T3078] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 47.456546][ T3116] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 47.464906][ T3116] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 47.474322][ T3116] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.481378][ T3116] bridge0: port 1(bridge_slave_0) entered forwarding state [ 47.489488][ T3116] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 47.497162][ T3116] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 47.504739][ T3116] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 47.513402][ T3116] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 47.521749][ T3116] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.528848][ T3116] bridge0: port 2(bridge_slave_1) entered forwarding state [ 47.536614][ T3116] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 47.554054][ T3065] 8021q: adding VLAN 0 to HW filter on device bond0 [ 47.578169][ T3078] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 47.588148][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 47.596074][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 47.605169][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 47.613903][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 47.622539][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 47.630899][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 47.639465][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 47.647850][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 47.656296][ T34] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.663408][ T34] bridge0: port 1(bridge_slave_0) entered forwarding state [ 47.671068][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 47.679471][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 47.688026][ T34] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.695129][ T34] bridge0: port 2(bridge_slave_1) entered forwarding state [ 47.702942][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 47.712051][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 47.720660][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 47.729048][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 47.737700][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 47.746061][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 47.760659][ T3065] 8021q: adding VLAN 0 to HW filter on device team0 [ 47.788793][ T3059] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 47.800086][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 47.808097][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 47.817890][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 47.825818][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 47.833552][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 47.841254][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 47.848897][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 47.857725][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 47.866331][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 47.874880][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 47.883250][ T34] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.890298][ T34] bridge0: port 1(bridge_slave_0) entered forwarding state [ 47.898081][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 47.906529][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 47.914818][ T34] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.921927][ T34] bridge0: port 2(bridge_slave_1) entered forwarding state [ 47.929753][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 47.938533][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 47.947363][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 47.955841][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 47.964568][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 47.973125][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 47.981750][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 47.990043][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 47.998468][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 48.006762][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 48.016264][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 48.024246][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 48.032149][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 48.040379][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 48.052531][ T3065] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 48.063647][ T3065] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 48.075529][ T3069] 8021q: adding VLAN 0 to HW filter on device bond0 [ 48.091554][ T3062] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 48.103693][ T3062] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 48.115483][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 48.123843][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 48.132322][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 48.140012][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 48.147943][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 48.156210][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 48.171853][ T3069] 8021q: adding VLAN 0 to HW filter on device team0 [ 48.194895][ T3082] 8021q: adding VLAN 0 to HW filter on device bond0 [ 48.217597][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 48.227615][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 48.236718][ T3162] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.243834][ T3162] bridge0: port 1(bridge_slave_0) entered forwarding state [ 48.264635][ T3059] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 48.272396][ T3163] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 48.280641][ T3163] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 48.289496][ T3163] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 48.298004][ T3163] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.305032][ T3163] bridge0: port 2(bridge_slave_1) entered forwarding state [ 48.312871][ T3163] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 48.321750][ T3163] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 48.329220][ T3163] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 48.336764][ T3163] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 48.345451][ T3163] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 48.353890][ T3163] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 48.366690][ T3078] 8021q: adding VLAN 0 to HW filter on device bond0 [ 48.379110][ T3078] 8021q: adding VLAN 0 to HW filter on device team0 [ 48.387742][ T3082] 8021q: adding VLAN 0 to HW filter on device team0 [ 48.395968][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 48.403896][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 48.411533][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 48.419286][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 48.427766][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 48.436534][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 48.444200][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 48.457116][ T3065] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 48.473593][ T3062] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 48.484574][ T3069] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 48.495058][ T3069] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 48.521870][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 48.530874][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 48.538752][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 48.547299][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 48.555509][ T3165] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.562616][ T3165] bridge0: port 1(bridge_slave_0) entered forwarding state [ 48.570681][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 48.579286][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 48.587545][ T3165] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.594687][ T3165] bridge0: port 2(bridge_slave_1) entered forwarding state [ 48.602571][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 48.610158][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 48.617648][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 48.626592][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 48.635449][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 48.643753][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 48.652358][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 48.660872][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 48.669108][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 48.677586][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 48.686040][ T3165] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.693129][ T3165] bridge0: port 1(bridge_slave_0) entered forwarding state [ 48.701009][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 48.709750][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 48.718208][ T3165] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.725238][ T3165] bridge0: port 2(bridge_slave_1) entered forwarding state [ 48.733062][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 48.741797][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 48.750852][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 48.759543][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 48.768197][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 48.776658][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 48.785340][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 48.793745][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 48.802014][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 48.810245][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 48.818363][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 48.827061][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 48.836535][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 48.844354][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 48.851967][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 48.859985][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 48.868133][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 48.876725][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 48.887021][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 48.898764][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 48.915459][ T3078] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 48.925861][ T3078] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 48.944115][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 48.953565][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 48.984777][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 48.996214][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 49.004691][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 49.013289][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 49.021569][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 49.030138][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 49.039207][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 49.061470][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 49.070643][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 49.096521][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 49.114807][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 49.124739][ T3069] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 49.143913][ T3059] veth0_vlan: entered promiscuous mode [ 49.161660][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 49.172207][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 49.186104][ T3082] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 49.203278][ T3065] veth0_vlan: entered promiscuous mode [ 49.210583][ T3059] veth1_vlan: entered promiscuous mode [ 49.217751][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 49.225595][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 49.233591][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 49.241648][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 49.249341][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 49.256842][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 49.264389][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 49.271798][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 49.279743][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 49.291387][ T3078] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 49.304417][ T3065] veth1_vlan: entered promiscuous mode [ 49.312329][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 49.321938][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 49.329708][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 49.337482][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 49.345494][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 49.360606][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 49.369432][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 49.378247][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 49.386770][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 49.410563][ T3065] veth0_macvtap: entered promiscuous mode [ 49.418484][ T3059] veth0_macvtap: entered promiscuous mode [ 49.429624][ T3062] veth0_vlan: entered promiscuous mode [ 49.437925][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 49.451578][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 49.460621][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 49.469186][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 49.477937][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 49.486081][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 49.496092][ T3065] veth1_macvtap: entered promiscuous mode [ 49.503296][ T3059] veth1_macvtap: entered promiscuous mode [ 49.513144][ T3062] veth1_vlan: entered promiscuous mode [ 49.519420][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 49.536519][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 49.544859][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 49.552769][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 49.560625][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 49.574937][ T3065] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 49.594163][ T3062] veth0_macvtap: entered promiscuous mode [ 49.601602][ T3062] veth1_macvtap: entered promiscuous mode [ 49.613867][ T3078] veth0_vlan: entered promiscuous mode [ 49.620221][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 49.629552][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 49.638348][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 49.647216][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 49.655477][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 49.664258][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 49.672645][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 49.681043][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 49.689037][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 49.697191][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 49.705866][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 49.713918][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 49.721626][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 49.731144][ T3065] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 49.738758][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 49.747497][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 49.761921][ T3062] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 49.772506][ T3062] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 49.783491][ T3062] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 49.793713][ T3062] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 49.804161][ T3062] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 49.815108][ T3062] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 49.822953][ T3059] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 49.833515][ T3059] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 49.843324][ T3059] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 49.853844][ T3059] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 49.866455][ T3059] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 49.875110][ T3065] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 49.883872][ T3065] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 49.892579][ T3065] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 49.901359][ T3065] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 49.915836][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 49.924607][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 49.933372][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 49.941984][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 49.950664][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 49.959241][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 49.969079][ T3078] veth1_vlan: entered promiscuous mode [ 49.980592][ T3059] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 49.991115][ T3059] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 50.000975][ T3059] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 50.011462][ T3059] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 50.022458][ T3059] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 50.035441][ T3062] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 50.044209][ T3062] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 50.052978][ T3062] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 50.061770][ T3062] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 50.074216][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 50.082356][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 50.090357][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 50.099039][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 50.107770][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 50.116033][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 50.130504][ T3059] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 50.139339][ T3059] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 50.148079][ T3059] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 50.156813][ T3059] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 50.175679][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 50.183440][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 50.191387][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 50.199554][ T3160] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 50.208367][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 50.216381][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 50.230372][ T3078] veth0_macvtap: entered promiscuous mode [ 50.240011][ T3078] veth1_macvtap: entered promiscuous mode [ 50.251873][ T3078] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 50.262388][ T3078] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 50.272211][ T3078] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 50.282704][ T3078] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 50.292510][ T3078] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 50.302965][ T3078] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 50.314018][ T3078] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 50.324042][ T3082] veth0_vlan: entered promiscuous mode [ 50.324121][ T25] kauditd_printk_skb: 2 callbacks suppressed [ 50.324133][ T25] audit: type=1400 audit(1686213810.450:102): avc: denied { mounton } for pid=3065 comm="syz-executor.0" path="/dev/binderfs" dev="devtmpfs" ino=452 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 50.333120][ T3082] veth1_vlan: entered promiscuous mode [ 50.365220][ T3069] veth0_vlan: entered promiscuous mode [ 50.371934][ T3163] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 50.382599][ T3163] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 50.391019][ T3163] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 50.399723][ T3163] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 50.407546][ T3163] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 50.415936][ T3163] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 50.428557][ T3078] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 50.439036][ T3078] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 50.448849][ T3078] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 50.459431][ T3078] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 50.469253][ T3078] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 50.479715][ T3078] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 50.490502][ T3078] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 50.504650][ T3069] veth1_vlan: entered promiscuous mode [ 50.513007][ T3163] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 50.524090][ T25] audit: type=1400 audit(1686213810.640:103): avc: denied { read write } for pid=3065 comm="syz-executor.0" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 50.548433][ T25] audit: type=1400 audit(1686213810.640:104): avc: denied { open } for pid=3065 comm="syz-executor.0" path="/dev/loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 50.572833][ T25] audit: type=1400 audit(1686213810.640:105): avc: denied { ioctl } for pid=3065 comm="syz-executor.0" path="/dev/loop0" dev="devtmpfs" ino=100 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 50.599496][ T3163] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 50.608024][ T3163] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 50.617206][ T3163] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 50.618031][ T25] audit: type=1400 audit(1686213810.730:106): avc: denied { bpf } for pid=3242 comm="syz-executor.0" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 50.646140][ T25] audit: type=1400 audit(1686213810.730:107): avc: denied { prog_load } for pid=3242 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 50.665591][ T25] audit: type=1400 audit(1686213810.730:108): avc: denied { perfmon } for pid=3242 comm="syz-executor.0" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 50.686792][ T25] audit: type=1400 audit(1686213810.740:109): avc: denied { prog_run } for pid=3242 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 50.716972][ T3078] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 50.725871][ T3078] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 08:43:30 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4001, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000240)=0x40) 08:43:30 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4001, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000240)=0x40) [ 50.734579][ T3078] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 50.743364][ T3078] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 08:43:30 executing program 5: syz_emit_ethernet(0x42, &(0x7f00000006c0)={@local, @random='agm.6B', @val={@void}, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "0fc62f", 0x4, 0x2c, 0x0, @loopback={0x1000000}, @rand_addr=' \x01\x00', {[], @echo_reply}}}}}, 0x0) [ 50.791192][ T3082] veth0_macvtap: entered promiscuous mode [ 50.806111][ T3069] veth0_macvtap: entered promiscuous mode [ 50.813695][ T3178] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 50.822777][ T3178] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready 08:43:30 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') read$usbfs(r0, &(0x7f0000000100)=""/164, 0xa4) 08:43:30 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4001, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000240)=0x40) 08:43:31 executing program 5: syz_emit_ethernet(0x42, &(0x7f00000006c0)={@local, @random='agm.6B', @val={@void}, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "0fc62f", 0x4, 0x2c, 0x0, @loopback={0x1000000}, @rand_addr=' \x01\x00', {[], @echo_reply}}}}}, 0x0) 08:43:31 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4001, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000240)=0x40) [ 50.836436][ T3178] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 50.855921][ T3178] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready 08:43:31 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') read$usbfs(r0, &(0x7f0000000100)=""/164, 0xa4) [ 50.884028][ T3069] veth1_macvtap: entered promiscuous mode [ 50.895663][ T3082] veth1_macvtap: entered promiscuous mode [ 50.904281][ T3178] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 50.914913][ T3178] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 50.925272][ T3178] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 50.933483][ T3178] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 50.962199][ T3082] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 50.972753][ T3082] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 50.982577][ T3082] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 50.992996][ T3082] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 51.002954][ T3082] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 51.013534][ T3082] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 51.023355][ T3082] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 51.033791][ T3082] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 51.046777][ T3082] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 51.058318][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 51.067347][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 51.081799][ T3069] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 51.088104][ T25] audit: type=1400 audit(1686213811.220:110): avc: denied { create } for pid=3268 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 51.092293][ T3069] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 51.092302][ T3069] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 51.119423][ T3269] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.1'. [ 51.122655][ T3069] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 51.151083][ T25] audit: type=1400 audit(1686213811.250:111): avc: denied { write } for pid=3268 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 51.152087][ T3069] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 51.183066][ T3069] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 51.192874][ T3069] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 51.203350][ T3069] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 51.213280][ T3069] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 51.223718][ T3069] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 51.235270][ T3069] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 51.244078][ T3069] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 51.254547][ T3069] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 51.264603][ T3069] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 51.275125][ T3069] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 51.284939][ T3069] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 51.295397][ T3069] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 51.305216][ T3069] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 51.315659][ T3069] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 51.327184][ T3069] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 51.334487][ T3178] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 51.343191][ T3178] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 51.352311][ T3178] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 51.361007][ T3178] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 51.371664][ T3082] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 51.382106][ T3082] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 51.391930][ T3082] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 51.402361][ T3082] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 51.412190][ T3082] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 51.422982][ T3082] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 51.432867][ T3082] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 51.443473][ T3082] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 51.453293][ T3082] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 51.463727][ T3082] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 51.475092][ T3082] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 51.483977][ T3069] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 51.492768][ T3069] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 51.501573][ T3069] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 51.510360][ T3069] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 51.525850][ T3116] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 51.534526][ T3116] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 51.547553][ T3082] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 51.556313][ T3082] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 51.565077][ T3082] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 51.573862][ T3082] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 08:43:31 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') read$usbfs(r0, &(0x7f0000000100)=""/164, 0xa4) 08:43:31 executing program 5: syz_emit_ethernet(0x42, &(0x7f00000006c0)={@local, @random='agm.6B', @val={@void}, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "0fc62f", 0x4, 0x2c, 0x0, @loopback={0x1000000}, @rand_addr=' \x01\x00', {[], @echo_reply}}}}}, 0x0) 08:43:31 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4001, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000240)=0x40) 08:43:31 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0x14, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_DEBUG_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}]}]}, 0x40}}, 0x0) 08:43:31 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=@newsa={0x138, 0x18, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@empty}, {@in=@dev}, @in6=@private2}, [@algo_comp={0x48, 0x3, {{'deflate\x00'}}}]}, 0x138}}, 0x0) 08:43:31 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x3, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0xce}, @jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 08:43:31 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0x40286608, &(0x7f0000000080)={@desc={0x1, 0x0, @desc3}}) 08:43:31 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e20}, 0x1c) set_mempolicy(0x2, &(0x7f0000000000)=0x1ff, 0x6) listen(r0, 0x200007) r1 = getpid() pidfd_open(r1, 0x0) r2 = open(&(0x7f0000001100)='./bus\x00', 0x14d27e, 0x0) close_range(r2, 0xffffffffffffffff, 0x2) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000080)=r2, 0x4) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x1f, 0x8, 0x80, 0x9, 0x0, 0x7, 0x8850, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f00000000c0), 0x7}, 0x81010, 0x32, 0x0, 0x6, 0x9, 0x5, 0x2413, 0x0, 0x3, 0x0, 0xb74}, r1, 0xa, r2, 0x8) r3 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_LIST(r3, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={0x0, 0x14}}, 0x0) getsockname$packet(r3, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) setsockopt$TIPC_CONN_TIMEOUT(r3, 0x10f, 0x82, &(0x7f0000000200)=0x60000000, 0x4) openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x8000, 0x0) r4 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r4, &(0x7f0000000180)={0x2, 0x4e20, @loopback}, 0x10) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000040)={0x0, 'vlan0\x00', {0x4}, 0x6}) 08:43:31 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=@newsa={0x138, 0x18, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@empty}, {@in=@dev}, @in6=@private2}, [@algo_comp={0x48, 0x3, {{'deflate\x00'}}}]}, 0x138}}, 0x0) 08:43:31 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4001, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000240)=0x40) 08:43:31 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0x14, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_DEBUG_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}]}]}, 0x40}}, 0x0) 08:43:31 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x3, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0xce}, @jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 08:43:31 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0x40286608, &(0x7f0000000080)={@desc={0x1, 0x0, @desc3}}) [ 51.706066][ T3284] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.1'. 08:43:31 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0x40286608, &(0x7f0000000080)={@desc={0x1, 0x0, @desc3}}) 08:43:31 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0x14, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_DEBUG_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}]}]}, 0x40}}, 0x0) 08:43:31 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x3, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0xce}, @jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 08:43:31 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e20}, 0x1c) set_mempolicy(0x2, &(0x7f0000000000)=0x1ff, 0x6) listen(r0, 0x200007) r1 = getpid() pidfd_open(r1, 0x0) r2 = open(&(0x7f0000001100)='./bus\x00', 0x14d27e, 0x0) close_range(r2, 0xffffffffffffffff, 0x2) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000080)=r2, 0x4) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x1f, 0x8, 0x80, 0x9, 0x0, 0x7, 0x8850, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f00000000c0), 0x7}, 0x81010, 0x32, 0x0, 0x6, 0x9, 0x5, 0x2413, 0x0, 0x3, 0x0, 0xb74}, r1, 0xa, r2, 0x8) r3 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_LIST(r3, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={0x0, 0x14}}, 0x0) getsockname$packet(r3, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) setsockopt$TIPC_CONN_TIMEOUT(r3, 0x10f, 0x82, &(0x7f0000000200)=0x60000000, 0x4) openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x8000, 0x0) r4 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r4, &(0x7f0000000180)={0x2, 0x4e20, @loopback}, 0x10) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000040)={0x0, 'vlan0\x00', {0x4}, 0x6}) [ 51.778515][ T3298] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.1'. 08:43:31 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4001, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000240)=0x40) 08:43:31 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=@newsa={0x138, 0x18, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@empty}, {@in=@dev}, @in6=@private2}, [@algo_comp={0x48, 0x3, {{'deflate\x00'}}}]}, 0x138}}, 0x0) 08:43:31 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e20}, 0x1c) set_mempolicy(0x2, &(0x7f0000000000)=0x1ff, 0x6) listen(r0, 0x200007) r1 = getpid() pidfd_open(r1, 0x0) r2 = open(&(0x7f0000001100)='./bus\x00', 0x14d27e, 0x0) close_range(r2, 0xffffffffffffffff, 0x2) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000080)=r2, 0x4) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x1f, 0x8, 0x80, 0x9, 0x0, 0x7, 0x8850, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f00000000c0), 0x7}, 0x81010, 0x32, 0x0, 0x6, 0x9, 0x5, 0x2413, 0x0, 0x3, 0x0, 0xb74}, r1, 0xa, r2, 0x8) r3 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_LIST(r3, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={0x0, 0x14}}, 0x0) getsockname$packet(r3, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) setsockopt$TIPC_CONN_TIMEOUT(r3, 0x10f, 0x82, &(0x7f0000000200)=0x60000000, 0x4) openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x8000, 0x0) r4 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r4, &(0x7f0000000180)={0x2, 0x4e20, @loopback}, 0x10) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000040)={0x0, 'vlan0\x00', {0x4}, 0x6}) 08:43:32 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e20}, 0x1c) set_mempolicy(0x2, &(0x7f0000000000)=0x1ff, 0x6) listen(r0, 0x200007) r1 = getpid() pidfd_open(r1, 0x0) r2 = open(&(0x7f0000001100)='./bus\x00', 0x14d27e, 0x0) close_range(r2, 0xffffffffffffffff, 0x2) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000080)=r2, 0x4) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x1f, 0x8, 0x80, 0x9, 0x0, 0x7, 0x8850, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f00000000c0), 0x7}, 0x81010, 0x32, 0x0, 0x6, 0x9, 0x5, 0x2413, 0x0, 0x3, 0x0, 0xb74}, r1, 0xa, r2, 0x8) r3 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_LIST(r3, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={0x0, 0x14}}, 0x0) getsockname$packet(r3, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) setsockopt$TIPC_CONN_TIMEOUT(r3, 0x10f, 0x82, &(0x7f0000000200)=0x60000000, 0x4) openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x8000, 0x0) r4 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r4, &(0x7f0000000180)={0x2, 0x4e20, @loopback}, 0x10) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000040)={0x0, 'vlan0\x00', {0x4}, 0x6}) 08:43:32 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0x40286608, &(0x7f0000000080)={@desc={0x1, 0x0, @desc3}}) 08:43:32 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e20}, 0x1c) set_mempolicy(0x2, &(0x7f0000000000)=0x1ff, 0x6) listen(r0, 0x200007) r1 = getpid() pidfd_open(r1, 0x0) r2 = open(&(0x7f0000001100)='./bus\x00', 0x14d27e, 0x0) close_range(r2, 0xffffffffffffffff, 0x2) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000080)=r2, 0x4) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x1f, 0x8, 0x80, 0x9, 0x0, 0x7, 0x8850, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f00000000c0), 0x7}, 0x81010, 0x32, 0x0, 0x6, 0x9, 0x5, 0x2413, 0x0, 0x3, 0x0, 0xb74}, r1, 0xa, r2, 0x8) r3 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_LIST(r3, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={0x0, 0x14}}, 0x0) getsockname$packet(r3, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) setsockopt$TIPC_CONN_TIMEOUT(r3, 0x10f, 0x82, &(0x7f0000000200)=0x60000000, 0x4) openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x8000, 0x0) r4 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r4, &(0x7f0000000180)={0x2, 0x4e20, @loopback}, 0x10) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000040)={0x0, 'vlan0\x00', {0x4}, 0x6}) 08:43:32 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e20}, 0x1c) set_mempolicy(0x2, &(0x7f0000000000)=0x1ff, 0x6) listen(r0, 0x200007) r1 = getpid() pidfd_open(r1, 0x0) r2 = open(&(0x7f0000001100)='./bus\x00', 0x14d27e, 0x0) close_range(r2, 0xffffffffffffffff, 0x2) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000080)=r2, 0x4) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x1f, 0x8, 0x80, 0x9, 0x0, 0x7, 0x8850, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f00000000c0), 0x7}, 0x81010, 0x32, 0x0, 0x6, 0x9, 0x5, 0x2413, 0x0, 0x3, 0x0, 0xb74}, r1, 0xa, r2, 0x8) r3 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_LIST(r3, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={0x0, 0x14}}, 0x0) getsockname$packet(r3, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) setsockopt$TIPC_CONN_TIMEOUT(r3, 0x10f, 0x82, &(0x7f0000000200)=0x60000000, 0x4) openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x8000, 0x0) r4 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r4, &(0x7f0000000180)={0x2, 0x4e20, @loopback}, 0x10) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000040)={0x0, 'vlan0\x00', {0x4}, 0x6}) 08:43:32 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e20}, 0x1c) set_mempolicy(0x2, &(0x7f0000000000)=0x1ff, 0x6) listen(r0, 0x200007) r1 = getpid() pidfd_open(r1, 0x0) r2 = open(&(0x7f0000001100)='./bus\x00', 0x14d27e, 0x0) close_range(r2, 0xffffffffffffffff, 0x2) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000080)=r2, 0x4) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x1f, 0x8, 0x80, 0x9, 0x0, 0x7, 0x8850, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f00000000c0), 0x7}, 0x81010, 0x32, 0x0, 0x6, 0x9, 0x5, 0x2413, 0x0, 0x3, 0x0, 0xb74}, r1, 0xa, r2, 0x8) r3 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_LIST(r3, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={0x0, 0x14}}, 0x0) getsockname$packet(r3, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) setsockopt$TIPC_CONN_TIMEOUT(r3, 0x10f, 0x82, &(0x7f0000000200)=0x60000000, 0x4) openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x8000, 0x0) r4 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r4, &(0x7f0000000180)={0x2, 0x4e20, @loopback}, 0x10) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000040)={0x0, 'vlan0\x00', {0x4}, 0x6}) 08:43:32 executing program 1: unshare(0x40400) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$PTP_SYS_OFFSET_EXTENDED(r0, 0x40603d07, 0x0) 08:43:32 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = dup2(r0, r0) write$cgroup_type(r1, 0x0, 0x0) [ 51.893123][ T3317] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.1'. 08:43:32 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e20}, 0x1c) set_mempolicy(0x2, &(0x7f0000000000)=0x1ff, 0x6) listen(r0, 0x200007) r1 = getpid() pidfd_open(r1, 0x0) r2 = open(&(0x7f0000001100)='./bus\x00', 0x14d27e, 0x0) close_range(r2, 0xffffffffffffffff, 0x2) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000080)=r2, 0x4) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x1f, 0x8, 0x80, 0x9, 0x0, 0x7, 0x8850, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f00000000c0), 0x7}, 0x81010, 0x32, 0x0, 0x6, 0x9, 0x5, 0x2413, 0x0, 0x3, 0x0, 0xb74}, r1, 0xa, r2, 0x8) r3 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_LIST(r3, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={0x0, 0x14}}, 0x0) getsockname$packet(r3, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) setsockopt$TIPC_CONN_TIMEOUT(r3, 0x10f, 0x82, &(0x7f0000000200)=0x60000000, 0x4) openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x8000, 0x0) r4 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r4, &(0x7f0000000180)={0x2, 0x4e20, @loopback}, 0x10) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000040)={0x0, 'vlan0\x00', {0x4}, 0x6}) 08:43:32 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = dup2(r0, r0) write$cgroup_type(r1, 0x0, 0x0) 08:43:32 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e20}, 0x1c) set_mempolicy(0x2, &(0x7f0000000000)=0x1ff, 0x6) listen(r0, 0x200007) r1 = getpid() pidfd_open(r1, 0x0) r2 = open(&(0x7f0000001100)='./bus\x00', 0x14d27e, 0x0) close_range(r2, 0xffffffffffffffff, 0x2) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000080)=r2, 0x4) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x1f, 0x8, 0x80, 0x9, 0x0, 0x7, 0x8850, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f00000000c0), 0x7}, 0x81010, 0x32, 0x0, 0x6, 0x9, 0x5, 0x2413, 0x0, 0x3, 0x0, 0xb74}, r1, 0xa, r2, 0x8) r3 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_LIST(r3, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={0x0, 0x14}}, 0x0) getsockname$packet(r3, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) setsockopt$TIPC_CONN_TIMEOUT(r3, 0x10f, 0x82, &(0x7f0000000200)=0x60000000, 0x4) openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x8000, 0x0) r4 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r4, &(0x7f0000000180)={0x2, 0x4e20, @loopback}, 0x10) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000040)={0x0, 'vlan0\x00', {0x4}, 0x6}) 08:43:32 executing program 1: unshare(0x40400) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$PTP_SYS_OFFSET_EXTENDED(r0, 0x40603d07, 0x0) 08:43:32 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e20}, 0x1c) set_mempolicy(0x2, &(0x7f0000000000)=0x1ff, 0x6) listen(r0, 0x200007) r1 = getpid() pidfd_open(r1, 0x0) r2 = open(&(0x7f0000001100)='./bus\x00', 0x14d27e, 0x0) close_range(r2, 0xffffffffffffffff, 0x2) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000080)=r2, 0x4) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x1f, 0x8, 0x80, 0x9, 0x0, 0x7, 0x8850, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f00000000c0), 0x7}, 0x81010, 0x32, 0x0, 0x6, 0x9, 0x5, 0x2413, 0x0, 0x3, 0x0, 0xb74}, r1, 0xa, r2, 0x8) r3 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_LIST(r3, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={0x0, 0x14}}, 0x0) getsockname$packet(r3, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) setsockopt$TIPC_CONN_TIMEOUT(r3, 0x10f, 0x82, &(0x7f0000000200)=0x60000000, 0x4) openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x8000, 0x0) r4 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r4, &(0x7f0000000180)={0x2, 0x4e20, @loopback}, 0x10) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000040)={0x0, 'vlan0\x00', {0x4}, 0x6}) 08:43:32 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e20}, 0x1c) set_mempolicy(0x2, &(0x7f0000000000)=0x1ff, 0x6) listen(r0, 0x200007) r1 = getpid() pidfd_open(r1, 0x0) r2 = open(&(0x7f0000001100)='./bus\x00', 0x14d27e, 0x0) close_range(r2, 0xffffffffffffffff, 0x2) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000080)=r2, 0x4) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x1f, 0x8, 0x80, 0x9, 0x0, 0x7, 0x8850, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f00000000c0), 0x7}, 0x81010, 0x32, 0x0, 0x6, 0x9, 0x5, 0x2413, 0x0, 0x3, 0x0, 0xb74}, r1, 0xa, r2, 0x8) r3 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_LIST(r3, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={0x0, 0x14}}, 0x0) getsockname$packet(r3, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) setsockopt$TIPC_CONN_TIMEOUT(r3, 0x10f, 0x82, &(0x7f0000000200)=0x60000000, 0x4) openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x8000, 0x0) r4 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r4, &(0x7f0000000180)={0x2, 0x4e20, @loopback}, 0x10) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000040)={0x0, 'vlan0\x00', {0x4}, 0x6}) 08:43:32 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = dup2(r0, r0) write$cgroup_type(r1, 0x0, 0x0) 08:43:32 executing program 1: unshare(0x40400) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$PTP_SYS_OFFSET_EXTENDED(r0, 0x40603d07, 0x0) 08:43:32 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e20}, 0x1c) set_mempolicy(0x2, &(0x7f0000000000)=0x1ff, 0x6) listen(r0, 0x200007) r1 = getpid() pidfd_open(r1, 0x0) r2 = open(&(0x7f0000001100)='./bus\x00', 0x14d27e, 0x0) close_range(r2, 0xffffffffffffffff, 0x2) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000080)=r2, 0x4) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x1f, 0x8, 0x80, 0x9, 0x0, 0x7, 0x8850, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f00000000c0), 0x7}, 0x81010, 0x32, 0x0, 0x6, 0x9, 0x5, 0x2413, 0x0, 0x3, 0x0, 0xb74}, r1, 0xa, r2, 0x8) r3 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_LIST(r3, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={0x0, 0x14}}, 0x0) getsockname$packet(r3, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) setsockopt$TIPC_CONN_TIMEOUT(r3, 0x10f, 0x82, &(0x7f0000000200)=0x60000000, 0x4) openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x8000, 0x0) r4 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r4, &(0x7f0000000180)={0x2, 0x4e20, @loopback}, 0x10) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000040)={0x0, 'vlan0\x00', {0x4}, 0x6}) 08:43:32 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000180), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000240)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_DEL_SEC_DEVKEY(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000001e00000008000300", @ANYRES32=r2, @ANYBLOB="1c002d"], 0x38}}, 0x0) 08:43:32 executing program 2: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0xa) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace(0x4207, r0) syz_clone(0x330e000, 0x0, 0x0, 0x0, 0x0, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) socket$unix(0x1, 0x5, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x180000) 08:43:32 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = dup2(r0, r0) write$cgroup_type(r1, 0x0, 0x0) 08:43:32 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e20}, 0x1c) set_mempolicy(0x2, &(0x7f0000000000)=0x1ff, 0x6) listen(r0, 0x200007) r1 = getpid() pidfd_open(r1, 0x0) r2 = open(&(0x7f0000001100)='./bus\x00', 0x14d27e, 0x0) close_range(r2, 0xffffffffffffffff, 0x2) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000080)=r2, 0x4) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x1f, 0x8, 0x80, 0x9, 0x0, 0x7, 0x8850, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f00000000c0), 0x7}, 0x81010, 0x32, 0x0, 0x6, 0x9, 0x5, 0x2413, 0x0, 0x3, 0x0, 0xb74}, r1, 0xa, r2, 0x8) r3 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_LIST(r3, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={0x0, 0x14}}, 0x0) getsockname$packet(r3, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) setsockopt$TIPC_CONN_TIMEOUT(r3, 0x10f, 0x82, &(0x7f0000000200)=0x60000000, 0x4) openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x8000, 0x0) r4 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r4, &(0x7f0000000180)={0x2, 0x4e20, @loopback}, 0x10) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000040)={0x0, 'vlan0\x00', {0x4}, 0x6}) 08:43:32 executing program 1: unshare(0x40400) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$PTP_SYS_OFFSET_EXTENDED(r0, 0x40603d07, 0x0) 08:43:32 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000180), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000240)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_DEL_SEC_DEVKEY(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000001e00000008000300", @ANYRES32=r2, @ANYBLOB="1c002d"], 0x38}}, 0x0) 08:43:32 executing program 5: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x54, 0x13, 0x234c07679e023121, 0x0, 0x0, {}, [@INET_DIAG_REQ_BYTECODE={0x8, 0x1, "050862e1"}]}, 0x54}}, 0x0) [ 52.092384][ T3347] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 08:43:32 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x200, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x12, 0x4, 0x4, 0x7}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESDEC=r3]) 08:43:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x1008002, &(0x7f0000000200)={[{@user_xattr}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x82}}, {@nodiscard}, {@nojournal_checksum}, {@data_ordered}, {@init_itable_val={'init_itable', 0x3d, 0x3}}, {@noload}, {@minixdf}]}, 0x1, 0x5d8, &(0x7f0000000c00)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='pids.events\x00', 0x275a, 0x0) fstatfs(r0, 0x0) 08:43:32 executing program 0: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, &(0x7f00000002c0)=@in4={0x21, 0x0, 0x3, 0x10, {0x2, 0x0, @empty}}, 0x24) 08:43:32 executing program 5: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x54, 0x13, 0x234c07679e023121, 0x0, 0x0, {}, [@INET_DIAG_REQ_BYTECODE={0x8, 0x1, "050862e1"}]}, 0x54}}, 0x0) [ 52.158847][ T3362] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 08:43:32 executing program 5: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x54, 0x13, 0x234c07679e023121, 0x0, 0x0, {}, [@INET_DIAG_REQ_BYTECODE={0x8, 0x1, "050862e1"}]}, 0x54}}, 0x0) 08:43:32 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000180), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000240)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_DEL_SEC_DEVKEY(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000001e00000008000300", @ANYRES32=r2, @ANYBLOB="1c002d"], 0x38}}, 0x0) [ 52.204518][ T3369] loop1: detected capacity change from 0 to 1024 08:43:32 executing program 5: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x54, 0x13, 0x234c07679e023121, 0x0, 0x0, {}, [@INET_DIAG_REQ_BYTECODE={0x8, 0x1, "050862e1"}]}, 0x54}}, 0x0) 08:43:32 executing program 0: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, &(0x7f00000002c0)=@in4={0x21, 0x0, 0x3, 0x10, {0x2, 0x0, @empty}}, 0x24) 08:43:32 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000180), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000240)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_DEL_SEC_DEVKEY(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000001e00000008000300", @ANYRES32=r2, @ANYBLOB="1c002d"], 0x38}}, 0x0) 08:43:32 executing program 2: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0xa) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace(0x4207, r0) syz_clone(0x330e000, 0x0, 0x0, 0x0, 0x0, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) socket$unix(0x1, 0x5, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x180000) 08:43:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x1008002, &(0x7f0000000200)={[{@user_xattr}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x82}}, {@nodiscard}, {@nojournal_checksum}, {@data_ordered}, {@init_itable_val={'init_itable', 0x3d, 0x3}}, {@noload}, {@minixdf}]}, 0x1, 0x5d8, &(0x7f0000000c00)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='pids.events\x00', 0x275a, 0x0) fstatfs(r0, 0x0) [ 52.244086][ T3369] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 52.244192][ T3380] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 52.294410][ T3078] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 08:43:32 executing program 0: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, &(0x7f00000002c0)=@in4={0x21, 0x0, 0x3, 0x10, {0x2, 0x0, @empty}}, 0x24) [ 52.297533][ T3387] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 52.379419][ T3397] loop1: detected capacity change from 0 to 1024 [ 52.388609][ T3397] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 52.412027][ T3078] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 08:43:33 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x200, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x12, 0x4, 0x4, 0x7}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESDEC=r3]) 08:43:33 executing program 3: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0xa) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace(0x4207, r0) syz_clone(0x330e000, 0x0, 0x0, 0x0, 0x0, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) socket$unix(0x1, 0x5, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x180000) 08:43:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x1008002, &(0x7f0000000200)={[{@user_xattr}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x82}}, {@nodiscard}, {@nojournal_checksum}, {@data_ordered}, {@init_itable_val={'init_itable', 0x3d, 0x3}}, {@noload}, {@minixdf}]}, 0x1, 0x5d8, &(0x7f0000000c00)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='pids.events\x00', 0x275a, 0x0) fstatfs(r0, 0x0) 08:43:33 executing program 0: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, &(0x7f00000002c0)=@in4={0x21, 0x0, 0x3, 0x10, {0x2, 0x0, @empty}}, 0x24) 08:43:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x1008002, &(0x7f0000000200)={[{@user_xattr}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x82}}, {@nodiscard}, {@nojournal_checksum}, {@data_ordered}, {@init_itable_val={'init_itable', 0x3d, 0x3}}, {@noload}, {@minixdf}]}, 0x1, 0x5d8, &(0x7f0000000c00)="$eJzs3c9vFFUcAPDvbH/QUrSFGBUP0sQYSJSWFjDEeICrIQ3+iBcvVloQKdDQGi2aUBK8mBgvxph48iD+F0rkyklPHrx4MiREDUcT18x2pnTb2ZYubacyn0+y9M17O7w33X773r6+NxtAZQ2m/9Qi9kbEdBLRn8wvlnVGVji48Lx7f39yOn0kUa+/8WcSSZaXPz/JvvZlJ/dExM8/JbGnY2W9M3NXzo9PTU1ezo6HZy9MD8/MXTl47sL42cmzkxdHXxo9dvTI0WMjh9q6rqsFeSevv/9h/2djb3/3zT/JyPe/jSVxPF7Nnrj0OjbKYAw2vifJyqK+YxtdWUk6sp+TpS9x0llig1iX/PXrioinoj864v6L1x+fvlZq44BNVU8i6kBFJeIfKiofB+Tv7Ze/D66VMioBtsLdEwsTACvjv3NhbjB6GnMDO+8lsXRaJ4mI9mbmmu2KiNu3xq6fuTV2PTZpHg4oNn8tIp4uiv+kEf8D0RMDjfivNcV/Oi44lX1N819vs/7lU8XiH7bOQvz3rBr/0SL+31kS/++2Wf/g/eR7vU3x39vuJQEAAAAAAEBl3TwRES8W/f2/trj+JwrW//RFxPENqH9w2fHKv//X7mxANUCBuyciXilc/1vLV/8OdGSpxxrrAbqSM+emJg9FxOMRcSC6dqTHI6vUcfDzPV+3KhvM1v/lj7T+29lawKwddzp3NJ8zMT47/rDXDUTcvRbxTOH632Sx/08K+v/098H0A9ax5/kbp1qVrR3/wGapfxuxv7D/v3/XimT1+3MMN8YDw/moYKVnP/7ih1b1txv/bjEBDy/t/3euHv8DydL79cysv47Dc531VmXtjv+7kzcbt5zpzvI+Gp+dvTwS0Z2c7Ehzm/JH199meBTl8ZDHSxr/B55bff6vaPzfGxHzy/7v5K/mPcW5J//t+71Ve4z/oTxp/E+sq/9ff2L0xsCPrep/sP7/SKOvP5DlmP+DBV/lYdrdnF8Qjp1FRVvdXgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4FNQiYlcktaHFdK02NBTRFxFPxM7a1KWZ2RfOXPrg4kRa1vj8/1r+Sb/9C8dJ/vn/A0uOR5cdH46I3RHxZUdv43jo9KWpibIvHgAAAAAAAAAAAAAAAAAAALaJvhb7/1N/dJTdOmDTdZbdAKA0BfH/SxntALae/h+qS/xDdYl/qC7xD9Ul/qG6xD9Ul/iH6hL/AAAAAADwSNm97+avSUTMv9zbeKS6s7KuUlsGbLZa2Q0ASuMWP1Bdlv5AdXmPDyRrlPe0PGmtM1czffohTgYAAAAAAAAAAACAytm/1/5/qCr7/6G67P+H6sr3/+8ruR3A1vMeH4g1dvIX7v9f8ywAAAAAAAAAAAAAYCPNzF05Pz41NXlZ4q3t0YytTNTr9avpT8F2ac//PJEvhd8u7VmWyPf6PdhZ5f1OAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAmv0XAAD//xYSJMU=") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='pids.events\x00', 0x275a, 0x0) fstatfs(r0, 0x0) 08:43:33 executing program 2: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0xa) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace(0x4207, r0) syz_clone(0x330e000, 0x0, 0x0, 0x0, 0x0, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) socket$unix(0x1, 0x5, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x180000) 08:43:33 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x8, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) dup(0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$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") 08:43:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x1008002, &(0x7f0000000200)={[{@user_xattr}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x82}}, {@nodiscard}, {@nojournal_checksum}, {@data_ordered}, {@init_itable_val={'init_itable', 0x3d, 0x3}}, {@noload}, {@minixdf}]}, 0x1, 0x5d8, &(0x7f0000000c00)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='pids.events\x00', 0x275a, 0x0) fstatfs(r0, 0x0) [ 53.053246][ T3408] loop5: detected capacity change from 0 to 1024 [ 53.054443][ T3405] loop1: detected capacity change from 0 to 1024 [ 53.071724][ T3408] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. 08:43:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x1008002, &(0x7f0000000200)={[{@user_xattr}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x82}}, {@nodiscard}, {@nojournal_checksum}, {@data_ordered}, {@init_itable_val={'init_itable', 0x3d, 0x3}}, {@noload}, {@minixdf}]}, 0x1, 0x5d8, &(0x7f0000000c00)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='pids.events\x00', 0x275a, 0x0) fstatfs(r0, 0x0) [ 53.100116][ T3062] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 53.114472][ T3405] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 53.124636][ T3419] loop0: detected capacity change from 0 to 2048 08:43:33 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x8, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) dup(0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$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") [ 53.151716][ T3078] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 53.175352][ T3424] loop5: detected capacity change from 0 to 1024 08:43:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x1008002, &(0x7f0000000200)={[{@user_xattr}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x82}}, {@nodiscard}, {@nojournal_checksum}, {@data_ordered}, {@init_itable_val={'init_itable', 0x3d, 0x3}}, {@noload}, {@minixdf}]}, 0x1, 0x5d8, &(0x7f0000000c00)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='pids.events\x00', 0x275a, 0x0) fstatfs(r0, 0x0) [ 53.198275][ T3424] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 53.209264][ T3426] loop0: detected capacity change from 0 to 2048 [ 53.217070][ T3429] loop1: detected capacity change from 0 to 1024 [ 53.237209][ T3062] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. 08:43:33 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x8, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) dup(0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$eJzs1b1u01AYBuCvaSiBqTNiOBILU1XYmAhCqVRhCQmUASYiNSwxQooXJ1MvgQvgwhi4CJSpW1BlF2jFWP+oeZ4ln/LaPuc9g/3p8ZfF2dfi849v32M03ovBOB4MLvbiMAZx5TwAgLvkYruNX9tK13sBANrh+w8Au+f9h49vXmXZ5F1Ko4jNeTktp9VvlZ+cZpPjdOngn7s2ZTnd/5M/S5Xr+b14WOfP/5sfxNMnVX6ZvX6b3cjvx1nj7QEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYLcdpTSMiJRSOvz776Ysp/tVfpSu3Mir6eQ0mxzXF1zPh/Fo2FoNAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4BYUq/Vilufz5R0bIn5Gy4uO6iNtuem4XrYvJ9/k8LKJJ7+IiL4U7NHQ4UsJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADoVLFaL2Z5Pl8WXe8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOiLYrVezPJ8vmxw6LojAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0I3fAQAA///PCC46") [ 53.239869][ T3429] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 53.315036][ T3434] loop5: detected capacity change from 0 to 1024 [ 53.325024][ T3078] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 53.328351][ T3433] loop0: detected capacity change from 0 to 2048 [ 53.355191][ T3434] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 53.387781][ T3062] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. 08:43:34 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x200, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x12, 0x4, 0x4, 0x7}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESDEC=r3]) 08:43:34 executing program 3: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0xa) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace(0x4207, r0) syz_clone(0x330e000, 0x0, 0x0, 0x0, 0x0, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) socket$unix(0x1, 0x5, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x180000) 08:43:34 executing program 2: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0xa) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace(0x4207, r0) syz_clone(0x330e000, 0x0, 0x0, 0x0, 0x0, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) socket$unix(0x1, 0x5, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x180000) 08:43:34 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.freeze\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$WPAN_WANTACK(r1, 0x0, 0x0, 0x0, &(0x7f0000000040)) 08:43:34 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x8, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) dup(0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$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") 08:43:34 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x2, &(0x7f0000000200)=@raw=[@call={0x85, 0x0, 0x0, 0x24}, @exit], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 08:43:34 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x2, &(0x7f0000000200)=@raw=[@call={0x85, 0x0, 0x0, 0x24}, @exit], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 08:43:34 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.freeze\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$WPAN_WANTACK(r1, 0x0, 0x0, 0x0, &(0x7f0000000040)) 08:43:34 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x2, &(0x7f0000000200)=@raw=[@call={0x85, 0x0, 0x0, 0x24}, @exit], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 53.924147][ T3445] syz-executor.5[3445] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 53.952596][ T3443] loop0: detected capacity change from 0 to 2048 08:43:34 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.freeze\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$WPAN_WANTACK(r1, 0x0, 0x0, 0x0, &(0x7f0000000040)) 08:43:34 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x2, &(0x7f0000000200)=@raw=[@call={0x85, 0x0, 0x0, 0x24}, @exit], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 08:43:34 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000000)=[{0x5c}, {0x4}, {0x6, 0x0, 0x0, 0x7ffffdbe}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000001a40), 0x0, 0x0) [ 53.960079][ T3452] syz-executor.5[3452] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 53.994190][ T3458] syz-executor.5[3458] is installing a program with bpf_probe_write_user helper that may corrupt user memory! 08:43:34 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x200, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x12, 0x4, 0x4, 0x7}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESDEC=r3]) 08:43:34 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.freeze\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$WPAN_WANTACK(r1, 0x0, 0x0, 0x0, &(0x7f0000000040)) 08:43:34 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000bc0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000080)=[{0x2b}], r1, 0x1, 0x1, 0x48}}, 0x20) 08:43:34 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000000)=[{0x5c}, {0x4}, {0x6, 0x0, 0x0, 0x7ffffdbe}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000001a40), 0x0, 0x0) 08:43:34 executing program 3: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0xa) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace(0x4207, r0) syz_clone(0x330e000, 0x0, 0x0, 0x0, 0x0, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) socket$unix(0x1, 0x5, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x180000) 08:43:34 executing program 2: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x0, 0x103382) r1 = memfd_create(&(0x7f0000000300)='U\xffA\x05\xd6\xe7\xfc\xa3\xb0\x04\xe2\x1b\\by\xdc2\xe3ZoL\x14\xa7\x8c\'\xa7\xcf\xff\xf0+9\xac\\\xa4\xa5=\\\xcc\xf6\xc4R\x88A\x94\xe0\xff\xff\xffX\x91\x1au\x83V\xc1H\xd3\rZ\x01!b\xc0\xaeW\xc5\x1f\xec\xfd\xe3\xc1\a\xeb\\,\x98P \xf2\xfe\xc5\xf9\xd4\x9a\x16\xa6\xb2\xde\x82\xa8\xf9\xcb{\xa9m\x83\xfb\x84\x8e\xef\xe3#\xcf$Df\x89\xe2?`\x96E=-\xd6\x91,4yEE\x1d\x81\x9c\x00\x00\x00\x00\x00\x001N\x1a\xff\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\xcc\xb8o7\t\x0e4$Lb\xf9e\x8dv\xd0Y\x86\x18\v\xd6\xf9\\-\xdc\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a4\xf2\x8c\x19\x1e\xf0\xb5_\x93\x98\xb8\xcc\xc2\xc6\x15?\xa44\xd4\x12\xed\xa1\xf1!\xbch\x94\xd6\xf0\x98u\xd0#\x95y\x10\x06^\xdf\x0563\x9dX\xdcI\x06\xfe6\x1e^\"\x90\xbf\xa7&\xa3\xb5\x8d\\\xcf\xa1T\v\xd1\x92oV\x8d\xbcGd\x82\xaeD\xe0D\x10\xa9\xdb[\\eN\xbc\xb26-\xcd\xeat\xfa)\xc8\x00\x91<0\xbcf\x8b\xd5\xdb\xd9AC\xf5Z4h\x1a', 0x0) unshare(0x22000400) unshare(0x722cdcaace7d584f) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000040)="3f9ebe239545703482", 0x9}], 0x1, 0x81806, 0x2) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x100000000000042) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r2 = syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_CHANNEL(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000440)=ANY=[@ANYRESDEC, @ANYRES16=r2, @ANYBLOB="1dafec3a5fd6fc1146ab4c5451697ec48de9a527cd0c0c8f667c2d9088051c84adc236defb5c6d5e1d0d02f76acfd8e2dad4f20ee15fdbc568194459573b7417c9", @ANYRES32, @ANYBLOB], 0x2c}}, 0x0) sendmsg$NL80211_CMD_GET_WOWLAN(0xffffffffffffffff, 0x0, 0x20000052) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x1f000000, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xb9c, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9"}) ioctl$LOOP_CLR_FD(r0, 0x4c01) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x4008011) memfd_secret(0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000e80)={0x0, 0x0, &(0x7f0000000d00)=[{&(0x7f0000000840)="2563c2ec0ff3afb4690e51a4f981f1070ac05e06798bae178d717aa692886927c2418321", 0x24}, {0x0}, {&(0x7f0000000a00)}, {0x0}, {0x0}, {&(0x7f0000000bc0)="8e298826bd3aca9e682c13207037eea2", 0x10}, {&(0x7f00000000c0)="1cb32bf749fce7f9", 0x8}, {&(0x7f0000000c40)}], 0x8, 0x0, 0x0, 0x800}, 0x4010000) 08:43:34 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000000)=[{0x5c}, {0x4}, {0x6, 0x0, 0x0, 0x7ffffdbe}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000001a40), 0x0, 0x0) 08:43:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x3000480, &(0x7f0000000080)=ANY=[], 0x1, 0x786, &(0x7f00000016c0)="$eJzs3d9rW2UfAPDvSX93e9/2hRd0XhUELYyldtZNwYuJFyI4GOi1W0mzMps2o0nHWgpuiOCNoOKFoDe79se889Yft/pfeCEbU7vhxAupnDRZszXpkq1J5vb5wGme5zwnfZ5vnnOe8yTnkATwyJpI/2QiDkTEB0nEWHV9EhEDlVR/xLGt7W5urOfSJYnNzdd/Syrb3NhYz0Xdc1L7qpnHI+L7dyMOZnbWW1pdW5gtFPLL1fxUefHsVGl17dCZxdn5/Hx+6cj0zMzho88dPbJ3sf7x09r+qx++8vRXx/5657HL7/+QxLHYXy2rj2OvTMRE9TUZSF/C27y815X1WLJ7cYM9gAdB2jF9W0d5HIix6KukmhjpZssAgE55OyI2m+lrWgIA/Kslzc//AMBDqfY5wI2N9Vxt6e0nEt117aWIGN6Kv3Z9c6ukv3rNbrhyHXT0RnLblZEkIsb3oP6JiPjsmze/SJfo0HVIgEYuXIyIU+MTO8f/ZMc9C+16poVtJu7IG/+ge75N5z/PN5r/ZW7Nf6LB/GeowbF7L+5+/Geu7EE1TaXzvxfr7m27WRd/1XhfNfefypxvIDl9ppBPx7b/RsRkDAyl+eld6pi8/vf1ZmX187/fP3rr87T+9HF7i8yV/qHbnzM3W569n5jrXbsY8UR/o/iTW/2fNJn/nmixjldfeO/TZmVp/Gm8tWVn/J21eSniqYb9v31HW7Lr/YlTld1hqrZTNPD1z5+MNqu/vv/TJa2/9l6gG9L+H909/vGk/n7NUvt1/Hhp7LtmZXePv/H+P5i8UUkPVtedny2Xl6cjBpPXdq4/vP3cWr62fRr/5JONj//d9v/0PeGpFuPvv/rrl/cef2el8c+11f/tJy7fXOhrVn9r/T9TSU1W17Qy/rXawPt57QAAAAAAAAAAAAAAAAAAAAAAAACgVZmI2B9JJnsrnclks1u/4f3/GM0UiqXywdPFlaW5qPxW9ngMZGpfdTlW932o09Xvw6/lD9+RfzYi/hcRHw+NVPLZXLEw1+vgAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAKBqX5Pf/0/9MtTr1gEAHTPc1+sWAADdNtzf6xYAAN023NbWIx1rBwDQPe2d/wGAh4HzPwA8epz/AQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA6LATx4+ny+afG+u5ND93bnVloXju0Fy+tJBdXMllc8Xls9n5YnG+kM/miotN/9GFrYdCsXh2JpZWzk+V86XyVGl17eRicWWpfPLM4ux8/mR+oGuRAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEDrSqtrC7OFQn5ZQkKi7URc2DqOHpT27F0iBrdHiZGejU8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD7p/AgAA//+mAybn") r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000000)="06", 0x1}], 0x1) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000280)={0x0, 0x101}) 08:43:34 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000bc0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000080)=[{0x2b}], r1, 0x1, 0x1, 0x48}}, 0x20) 08:43:35 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000000)=[{0x5c}, {0x4}, {0x6, 0x0, 0x0, 0x7ffffdbe}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000001a40), 0x0, 0x0) [ 54.044564][ T3463] syz-executor.5[3463] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 54.838292][ T3475] loop0: detected capacity change from 0 to 1036 08:43:35 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000bc0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000080)=[{0x2b}], r1, 0x1, 0x1, 0x48}}, 0x20) 08:43:35 executing program 0: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) bind$802154_dgram(r0, &(0x7f0000000080)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0102}}}, 0x14) sendmsg$802154_dgram(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x24, @short}, 0xfdd5, &(0x7f0000000100)={0x0}}, 0x0) [ 54.899380][ T3487] loop1: detected capacity change from 0 to 2048 [ 54.942434][ T3487] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 55.002507][ T3078] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 08:43:35 executing program 0: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) bind$802154_dgram(r0, &(0x7f0000000080)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0102}}}, 0x14) sendmsg$802154_dgram(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x24, @short}, 0xfdd5, &(0x7f0000000100)={0x0}}, 0x0) 08:43:35 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000bc0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000080)=[{0x2b}], r1, 0x1, 0x1, 0x48}}, 0x20) 08:43:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x3000480, &(0x7f0000000080)=ANY=[], 0x1, 0x786, &(0x7f00000016c0)="$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") r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000000)="06", 0x1}], 0x1) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000280)={0x0, 0x101}) 08:43:35 executing program 3: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x3000480, &(0x7f0000000080)=ANY=[], 0x1, 0x786, &(0x7f00000016c0)="$eJzs3d9rW2UfAPDvSX93e9/2hRd0XhUELYyldtZNwYuJFyI4GOi1W0mzMps2o0nHWgpuiOCNoOKFoDe79se889Yft/pfeCEbU7vhxAupnDRZszXpkq1J5vb5wGme5zwnfZ5vnnOe8yTnkATwyJpI/2QiDkTEB0nEWHV9EhEDlVR/xLGt7W5urOfSJYnNzdd/Syrb3NhYz0Xdc1L7qpnHI+L7dyMOZnbWW1pdW5gtFPLL1fxUefHsVGl17dCZxdn5/Hx+6cj0zMzho88dPbJ3sf7x09r+qx++8vRXx/5657HL7/+QxLHYXy2rj2OvTMRE9TUZSF/C27y815X1WLJ7cYM9gAdB2jF9W0d5HIix6KukmhjpZssAgE55OyI2m+lrWgIA/Kslzc//AMBDqfY5wI2N9Vxt6e0nEt117aWIGN6Kv3Z9c6ukv3rNbrhyHXT0RnLblZEkIsb3oP6JiPjsmze/SJfo0HVIgEYuXIyIU+MTO8f/ZMc9C+16poVtJu7IG/+ge75N5z/PN5r/ZW7Nf6LB/GeowbF7L+5+/Geu7EE1TaXzvxfr7m27WRd/1XhfNfefypxvIDl9ppBPx7b/RsRkDAyl+eld6pi8/vf1ZmX187/fP3rr87T+9HF7i8yV/qHbnzM3W569n5jrXbsY8UR/o/iTW/2fNJn/nmixjldfeO/TZmVp/Gm8tWVn/J21eSniqYb9v31HW7Lr/YlTld1hqrZTNPD1z5+MNqu/vv/TJa2/9l6gG9L+H909/vGk/n7NUvt1/Hhp7LtmZXePv/H+P5i8UUkPVtedny2Xl6cjBpPXdq4/vP3cWr62fRr/5JONj//d9v/0PeGpFuPvv/rrl/cef2el8c+11f/tJy7fXOhrVn9r/T9TSU1W17Qy/rXawPt57QAAAAAAAAAAAAAAAAAAAAAAAACgVZmI2B9JJnsrnclks1u/4f3/GM0UiqXywdPFlaW5qPxW9ngMZGpfdTlW932o09Xvw6/lD9+RfzYi/hcRHw+NVPLZXLEw1+vgAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAKBqX5Pf/0/9MtTr1gEAHTPc1+sWAADdNtzf6xYAAN023NbWIx1rBwDQPe2d/wGAh4HzPwA8epz/AQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA6LATx4+ny+afG+u5ND93bnVloXju0Fy+tJBdXMllc8Xls9n5YnG+kM/miotN/9GFrYdCsXh2JpZWzk+V86XyVGl17eRicWWpfPLM4ux8/mR+oGuRAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEDrSqtrC7OFQn5ZQkKi7URc2DqOHpT27F0iBrdHiZGejU8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD7p/AgAA//+mAybn") r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000000)="06", 0x1}], 0x1) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000280)={0x0, 0x101}) 08:43:35 executing program 2: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x0, 0x103382) r1 = memfd_create(&(0x7f0000000300)='U\xffA\x05\xd6\xe7\xfc\xa3\xb0\x04\xe2\x1b\\by\xdc2\xe3ZoL\x14\xa7\x8c\'\xa7\xcf\xff\xf0+9\xac\\\xa4\xa5=\\\xcc\xf6\xc4R\x88A\x94\xe0\xff\xff\xffX\x91\x1au\x83V\xc1H\xd3\rZ\x01!b\xc0\xaeW\xc5\x1f\xec\xfd\xe3\xc1\a\xeb\\,\x98P \xf2\xfe\xc5\xf9\xd4\x9a\x16\xa6\xb2\xde\x82\xa8\xf9\xcb{\xa9m\x83\xfb\x84\x8e\xef\xe3#\xcf$Df\x89\xe2?`\x96E=-\xd6\x91,4yEE\x1d\x81\x9c\x00\x00\x00\x00\x00\x001N\x1a\xff\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\xcc\xb8o7\t\x0e4$Lb\xf9e\x8dv\xd0Y\x86\x18\v\xd6\xf9\\-\xdc\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a4\xf2\x8c\x19\x1e\xf0\xb5_\x93\x98\xb8\xcc\xc2\xc6\x15?\xa44\xd4\x12\xed\xa1\xf1!\xbch\x94\xd6\xf0\x98u\xd0#\x95y\x10\x06^\xdf\x0563\x9dX\xdcI\x06\xfe6\x1e^\"\x90\xbf\xa7&\xa3\xb5\x8d\\\xcf\xa1T\v\xd1\x92oV\x8d\xbcGd\x82\xaeD\xe0D\x10\xa9\xdb[\\eN\xbc\xb26-\xcd\xeat\xfa)\xc8\x00\x91<0\xbcf\x8b\xd5\xdb\xd9AC\xf5Z4h\x1a', 0x0) unshare(0x22000400) unshare(0x722cdcaace7d584f) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000040)="3f9ebe239545703482", 0x9}], 0x1, 0x81806, 0x2) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x100000000000042) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r2 = syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_CHANNEL(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000440)=ANY=[@ANYRESDEC, @ANYRES16=r2, @ANYBLOB="1dafec3a5fd6fc1146ab4c5451697ec48de9a527cd0c0c8f667c2d9088051c84adc236defb5c6d5e1d0d02f76acfd8e2dad4f20ee15fdbc568194459573b7417c9", @ANYRES32, @ANYBLOB], 0x2c}}, 0x0) sendmsg$NL80211_CMD_GET_WOWLAN(0xffffffffffffffff, 0x0, 0x20000052) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x1f000000, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xb9c, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9"}) ioctl$LOOP_CLR_FD(r0, 0x4c01) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x4008011) memfd_secret(0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000e80)={0x0, 0x0, &(0x7f0000000d00)=[{&(0x7f0000000840)="2563c2ec0ff3afb4690e51a4f981f1070ac05e06798bae178d717aa692886927c2418321", 0x24}, {0x0}, {&(0x7f0000000a00)}, {0x0}, {0x0}, {&(0x7f0000000bc0)="8e298826bd3aca9e682c13207037eea2", 0x10}, {&(0x7f00000000c0)="1cb32bf749fce7f9", 0x8}, {&(0x7f0000000c40)}], 0x8, 0x0, 0x0, 0x800}, 0x4010000) 08:43:35 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x0, 0x103382) r1 = memfd_create(&(0x7f0000000300)='U\xffA\x05\xd6\xe7\xfc\xa3\xb0\x04\xe2\x1b\\by\xdc2\xe3ZoL\x14\xa7\x8c\'\xa7\xcf\xff\xf0+9\xac\\\xa4\xa5=\\\xcc\xf6\xc4R\x88A\x94\xe0\xff\xff\xffX\x91\x1au\x83V\xc1H\xd3\rZ\x01!b\xc0\xaeW\xc5\x1f\xec\xfd\xe3\xc1\a\xeb\\,\x98P \xf2\xfe\xc5\xf9\xd4\x9a\x16\xa6\xb2\xde\x82\xa8\xf9\xcb{\xa9m\x83\xfb\x84\x8e\xef\xe3#\xcf$Df\x89\xe2?`\x96E=-\xd6\x91,4yEE\x1d\x81\x9c\x00\x00\x00\x00\x00\x001N\x1a\xff\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\xcc\xb8o7\t\x0e4$Lb\xf9e\x8dv\xd0Y\x86\x18\v\xd6\xf9\\-\xdc\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a4\xf2\x8c\x19\x1e\xf0\xb5_\x93\x98\xb8\xcc\xc2\xc6\x15?\xa44\xd4\x12\xed\xa1\xf1!\xbch\x94\xd6\xf0\x98u\xd0#\x95y\x10\x06^\xdf\x0563\x9dX\xdcI\x06\xfe6\x1e^\"\x90\xbf\xa7&\xa3\xb5\x8d\\\xcf\xa1T\v\xd1\x92oV\x8d\xbcGd\x82\xaeD\xe0D\x10\xa9\xdb[\\eN\xbc\xb26-\xcd\xeat\xfa)\xc8\x00\x91<0\xbcf\x8b\xd5\xdb\xd9AC\xf5Z4h\x1a', 0x0) unshare(0x22000400) unshare(0x722cdcaace7d584f) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000040)="3f9ebe239545703482", 0x9}], 0x1, 0x81806, 0x2) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x100000000000042) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r2 = syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_CHANNEL(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000440)=ANY=[@ANYRESDEC, @ANYRES16=r2, @ANYBLOB="1dafec3a5fd6fc1146ab4c5451697ec48de9a527cd0c0c8f667c2d9088051c84adc236defb5c6d5e1d0d02f76acfd8e2dad4f20ee15fdbc568194459573b7417c9", @ANYRES32, @ANYBLOB], 0x2c}}, 0x0) sendmsg$NL80211_CMD_GET_WOWLAN(0xffffffffffffffff, 0x0, 0x20000052) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x1f000000, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xb9c, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9"}) ioctl$LOOP_CLR_FD(r0, 0x4c01) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x4008011) memfd_secret(0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000e80)={0x0, 0x0, &(0x7f0000000d00)=[{&(0x7f0000000840)="2563c2ec0ff3afb4690e51a4f981f1070ac05e06798bae178d717aa692886927c2418321", 0x24}, {0x0}, {&(0x7f0000000a00)}, {0x0}, {0x0}, {&(0x7f0000000bc0)="8e298826bd3aca9e682c13207037eea2", 0x10}, {&(0x7f00000000c0)="1cb32bf749fce7f9", 0x8}, {&(0x7f0000000c40)}], 0x8, 0x0, 0x0, 0x800}, 0x4010000) 08:43:35 executing program 0: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) bind$802154_dgram(r0, &(0x7f0000000080)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0102}}}, 0x14) sendmsg$802154_dgram(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x24, @short}, 0xfdd5, &(0x7f0000000100)={0x0}}, 0x0) [ 55.702645][ T3507] loop0: detected capacity change from 0 to 1036 [ 55.709048][ T25] kauditd_printk_skb: 49 callbacks suppressed [ 55.709061][ T25] audit: type=1400 audit(1686213815.830:161): avc: denied { read } for pid=3499 comm="syz-executor.0" dev="nsfs" ino=4026532645 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 55.715119][ T3504] loop3: detected capacity change from 0 to 2048 08:43:35 executing program 5: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x0, 0x103382) r1 = memfd_create(&(0x7f0000000300)='U\xffA\x05\xd6\xe7\xfc\xa3\xb0\x04\xe2\x1b\\by\xdc2\xe3ZoL\x14\xa7\x8c\'\xa7\xcf\xff\xf0+9\xac\\\xa4\xa5=\\\xcc\xf6\xc4R\x88A\x94\xe0\xff\xff\xffX\x91\x1au\x83V\xc1H\xd3\rZ\x01!b\xc0\xaeW\xc5\x1f\xec\xfd\xe3\xc1\a\xeb\\,\x98P \xf2\xfe\xc5\xf9\xd4\x9a\x16\xa6\xb2\xde\x82\xa8\xf9\xcb{\xa9m\x83\xfb\x84\x8e\xef\xe3#\xcf$Df\x89\xe2?`\x96E=-\xd6\x91,4yEE\x1d\x81\x9c\x00\x00\x00\x00\x00\x001N\x1a\xff\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\xcc\xb8o7\t\x0e4$Lb\xf9e\x8dv\xd0Y\x86\x18\v\xd6\xf9\\-\xdc\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a4\xf2\x8c\x19\x1e\xf0\xb5_\x93\x98\xb8\xcc\xc2\xc6\x15?\xa44\xd4\x12\xed\xa1\xf1!\xbch\x94\xd6\xf0\x98u\xd0#\x95y\x10\x06^\xdf\x0563\x9dX\xdcI\x06\xfe6\x1e^\"\x90\xbf\xa7&\xa3\xb5\x8d\\\xcf\xa1T\v\xd1\x92oV\x8d\xbcGd\x82\xaeD\xe0D\x10\xa9\xdb[\\eN\xbc\xb26-\xcd\xeat\xfa)\xc8\x00\x91<0\xbcf\x8b\xd5\xdb\xd9AC\xf5Z4h\x1a', 0x0) unshare(0x22000400) unshare(0x722cdcaace7d584f) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000040)="3f9ebe239545703482", 0x9}], 0x1, 0x81806, 0x2) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x100000000000042) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r2 = syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_CHANNEL(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000440)=ANY=[@ANYRESDEC, @ANYRES16=r2, @ANYBLOB="1dafec3a5fd6fc1146ab4c5451697ec48de9a527cd0c0c8f667c2d9088051c84adc236defb5c6d5e1d0d02f76acfd8e2dad4f20ee15fdbc568194459573b7417c9", @ANYRES32, @ANYBLOB], 0x2c}}, 0x0) sendmsg$NL80211_CMD_GET_WOWLAN(0xffffffffffffffff, 0x0, 0x20000052) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x1f000000, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xb9c, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9"}) ioctl$LOOP_CLR_FD(r0, 0x4c01) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x4008011) memfd_secret(0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000e80)={0x0, 0x0, &(0x7f0000000d00)=[{&(0x7f0000000840)="2563c2ec0ff3afb4690e51a4f981f1070ac05e06798bae178d717aa692886927c2418321", 0x24}, {0x0}, {&(0x7f0000000a00)}, {0x0}, {0x0}, {&(0x7f0000000bc0)="8e298826bd3aca9e682c13207037eea2", 0x10}, {&(0x7f00000000c0)="1cb32bf749fce7f9", 0x8}, {&(0x7f0000000c40)}], 0x8, 0x0, 0x0, 0x800}, 0x4010000) 08:43:35 executing program 0: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) bind$802154_dgram(r0, &(0x7f0000000080)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0102}}}, 0x14) sendmsg$802154_dgram(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x24, @short}, 0xfdd5, &(0x7f0000000100)={0x0}}, 0x0) 08:43:35 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x0, 0x103382) r1 = memfd_create(&(0x7f0000000300)='U\xffA\x05\xd6\xe7\xfc\xa3\xb0\x04\xe2\x1b\\by\xdc2\xe3ZoL\x14\xa7\x8c\'\xa7\xcf\xff\xf0+9\xac\\\xa4\xa5=\\\xcc\xf6\xc4R\x88A\x94\xe0\xff\xff\xffX\x91\x1au\x83V\xc1H\xd3\rZ\x01!b\xc0\xaeW\xc5\x1f\xec\xfd\xe3\xc1\a\xeb\\,\x98P \xf2\xfe\xc5\xf9\xd4\x9a\x16\xa6\xb2\xde\x82\xa8\xf9\xcb{\xa9m\x83\xfb\x84\x8e\xef\xe3#\xcf$Df\x89\xe2?`\x96E=-\xd6\x91,4yEE\x1d\x81\x9c\x00\x00\x00\x00\x00\x001N\x1a\xff\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\xcc\xb8o7\t\x0e4$Lb\xf9e\x8dv\xd0Y\x86\x18\v\xd6\xf9\\-\xdc\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a4\xf2\x8c\x19\x1e\xf0\xb5_\x93\x98\xb8\xcc\xc2\xc6\x15?\xa44\xd4\x12\xed\xa1\xf1!\xbch\x94\xd6\xf0\x98u\xd0#\x95y\x10\x06^\xdf\x0563\x9dX\xdcI\x06\xfe6\x1e^\"\x90\xbf\xa7&\xa3\xb5\x8d\\\xcf\xa1T\v\xd1\x92oV\x8d\xbcGd\x82\xaeD\xe0D\x10\xa9\xdb[\\eN\xbc\xb26-\xcd\xeat\xfa)\xc8\x00\x91<0\xbcf\x8b\xd5\xdb\xd9AC\xf5Z4h\x1a', 0x0) unshare(0x22000400) unshare(0x722cdcaace7d584f) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000040)="3f9ebe239545703482", 0x9}], 0x1, 0x81806, 0x2) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x100000000000042) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r2 = syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_CHANNEL(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000440)=ANY=[@ANYRESDEC, @ANYRES16=r2, @ANYBLOB="1dafec3a5fd6fc1146ab4c5451697ec48de9a527cd0c0c8f667c2d9088051c84adc236defb5c6d5e1d0d02f76acfd8e2dad4f20ee15fdbc568194459573b7417c9", @ANYRES32, @ANYBLOB], 0x2c}}, 0x0) sendmsg$NL80211_CMD_GET_WOWLAN(0xffffffffffffffff, 0x0, 0x20000052) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x1f000000, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xb9c, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9"}) ioctl$LOOP_CLR_FD(r0, 0x4c01) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x4008011) memfd_secret(0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000e80)={0x0, 0x0, &(0x7f0000000d00)=[{&(0x7f0000000840)="2563c2ec0ff3afb4690e51a4f981f1070ac05e06798bae178d717aa692886927c2418321", 0x24}, {0x0}, {&(0x7f0000000a00)}, {0x0}, {0x0}, {&(0x7f0000000bc0)="8e298826bd3aca9e682c13207037eea2", 0x10}, {&(0x7f00000000c0)="1cb32bf749fce7f9", 0x8}, {&(0x7f0000000c40)}], 0x8, 0x0, 0x0, 0x800}, 0x4010000) [ 55.715187][ T25] audit: type=1400 audit(1686213815.830:162): avc: denied { open } for pid=3499 comm="syz-executor.0" path="net:[4026532645]" dev="nsfs" ino=4026532645 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 55.762467][ T3505] loop1: detected capacity change from 0 to 2048 08:43:35 executing program 5: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x0, 0x103382) r1 = memfd_create(&(0x7f0000000300)='U\xffA\x05\xd6\xe7\xfc\xa3\xb0\x04\xe2\x1b\\by\xdc2\xe3ZoL\x14\xa7\x8c\'\xa7\xcf\xff\xf0+9\xac\\\xa4\xa5=\\\xcc\xf6\xc4R\x88A\x94\xe0\xff\xff\xffX\x91\x1au\x83V\xc1H\xd3\rZ\x01!b\xc0\xaeW\xc5\x1f\xec\xfd\xe3\xc1\a\xeb\\,\x98P \xf2\xfe\xc5\xf9\xd4\x9a\x16\xa6\xb2\xde\x82\xa8\xf9\xcb{\xa9m\x83\xfb\x84\x8e\xef\xe3#\xcf$Df\x89\xe2?`\x96E=-\xd6\x91,4yEE\x1d\x81\x9c\x00\x00\x00\x00\x00\x001N\x1a\xff\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\xcc\xb8o7\t\x0e4$Lb\xf9e\x8dv\xd0Y\x86\x18\v\xd6\xf9\\-\xdc\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a4\xf2\x8c\x19\x1e\xf0\xb5_\x93\x98\xb8\xcc\xc2\xc6\x15?\xa44\xd4\x12\xed\xa1\xf1!\xbch\x94\xd6\xf0\x98u\xd0#\x95y\x10\x06^\xdf\x0563\x9dX\xdcI\x06\xfe6\x1e^\"\x90\xbf\xa7&\xa3\xb5\x8d\\\xcf\xa1T\v\xd1\x92oV\x8d\xbcGd\x82\xaeD\xe0D\x10\xa9\xdb[\\eN\xbc\xb26-\xcd\xeat\xfa)\xc8\x00\x91<0\xbcf\x8b\xd5\xdb\xd9AC\xf5Z4h\x1a', 0x0) unshare(0x22000400) unshare(0x722cdcaace7d584f) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000040)="3f9ebe239545703482", 0x9}], 0x1, 0x81806, 0x2) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x100000000000042) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r2 = syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_CHANNEL(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000440)=ANY=[@ANYRESDEC, @ANYRES16=r2, @ANYBLOB="1dafec3a5fd6fc1146ab4c5451697ec48de9a527cd0c0c8f667c2d9088051c84adc236defb5c6d5e1d0d02f76acfd8e2dad4f20ee15fdbc568194459573b7417c9", @ANYRES32, @ANYBLOB], 0x2c}}, 0x0) sendmsg$NL80211_CMD_GET_WOWLAN(0xffffffffffffffff, 0x0, 0x20000052) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x1f000000, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xb9c, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9"}) ioctl$LOOP_CLR_FD(r0, 0x4c01) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x4008011) memfd_secret(0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000e80)={0x0, 0x0, &(0x7f0000000d00)=[{&(0x7f0000000840)="2563c2ec0ff3afb4690e51a4f981f1070ac05e06798bae178d717aa692886927c2418321", 0x24}, {0x0}, {&(0x7f0000000a00)}, {0x0}, {0x0}, {&(0x7f0000000bc0)="8e298826bd3aca9e682c13207037eea2", 0x10}, {&(0x7f00000000c0)="1cb32bf749fce7f9", 0x8}, {&(0x7f0000000c40)}], 0x8, 0x0, 0x0, 0x800}, 0x4010000) 08:43:35 executing program 5: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x0, 0x103382) r1 = memfd_create(&(0x7f0000000300)='U\xffA\x05\xd6\xe7\xfc\xa3\xb0\x04\xe2\x1b\\by\xdc2\xe3ZoL\x14\xa7\x8c\'\xa7\xcf\xff\xf0+9\xac\\\xa4\xa5=\\\xcc\xf6\xc4R\x88A\x94\xe0\xff\xff\xffX\x91\x1au\x83V\xc1H\xd3\rZ\x01!b\xc0\xaeW\xc5\x1f\xec\xfd\xe3\xc1\a\xeb\\,\x98P \xf2\xfe\xc5\xf9\xd4\x9a\x16\xa6\xb2\xde\x82\xa8\xf9\xcb{\xa9m\x83\xfb\x84\x8e\xef\xe3#\xcf$Df\x89\xe2?`\x96E=-\xd6\x91,4yEE\x1d\x81\x9c\x00\x00\x00\x00\x00\x001N\x1a\xff\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\xcc\xb8o7\t\x0e4$Lb\xf9e\x8dv\xd0Y\x86\x18\v\xd6\xf9\\-\xdc\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a4\xf2\x8c\x19\x1e\xf0\xb5_\x93\x98\xb8\xcc\xc2\xc6\x15?\xa44\xd4\x12\xed\xa1\xf1!\xbch\x94\xd6\xf0\x98u\xd0#\x95y\x10\x06^\xdf\x0563\x9dX\xdcI\x06\xfe6\x1e^\"\x90\xbf\xa7&\xa3\xb5\x8d\\\xcf\xa1T\v\xd1\x92oV\x8d\xbcGd\x82\xaeD\xe0D\x10\xa9\xdb[\\eN\xbc\xb26-\xcd\xeat\xfa)\xc8\x00\x91<0\xbcf\x8b\xd5\xdb\xd9AC\xf5Z4h\x1a', 0x0) unshare(0x22000400) unshare(0x722cdcaace7d584f) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000040)="3f9ebe239545703482", 0x9}], 0x1, 0x81806, 0x2) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x100000000000042) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r2 = syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_CHANNEL(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000440)=ANY=[@ANYRESDEC, @ANYRES16=r2, @ANYBLOB="1dafec3a5fd6fc1146ab4c5451697ec48de9a527cd0c0c8f667c2d9088051c84adc236defb5c6d5e1d0d02f76acfd8e2dad4f20ee15fdbc568194459573b7417c9", @ANYRES32, @ANYBLOB], 0x2c}}, 0x0) sendmsg$NL80211_CMD_GET_WOWLAN(0xffffffffffffffff, 0x0, 0x20000052) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x1f000000, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xb9c, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9"}) ioctl$LOOP_CLR_FD(r0, 0x4c01) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x4008011) memfd_secret(0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000e80)={0x0, 0x0, &(0x7f0000000d00)=[{&(0x7f0000000840)="2563c2ec0ff3afb4690e51a4f981f1070ac05e06798bae178d717aa692886927c2418321", 0x24}, {0x0}, {&(0x7f0000000a00)}, {0x0}, {0x0}, {&(0x7f0000000bc0)="8e298826bd3aca9e682c13207037eea2", 0x10}, {&(0x7f00000000c0)="1cb32bf749fce7f9", 0x8}, {&(0x7f0000000c40)}], 0x8, 0x0, 0x0, 0x800}, 0x4010000) 08:43:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x3000480, &(0x7f0000000080)=ANY=[], 0x1, 0x786, &(0x7f00000016c0)="$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") r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000000)="06", 0x1}], 0x1) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000280)={0x0, 0x101}) 08:43:35 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x0, 0x103382) r1 = memfd_create(&(0x7f0000000300)='U\xffA\x05\xd6\xe7\xfc\xa3\xb0\x04\xe2\x1b\\by\xdc2\xe3ZoL\x14\xa7\x8c\'\xa7\xcf\xff\xf0+9\xac\\\xa4\xa5=\\\xcc\xf6\xc4R\x88A\x94\xe0\xff\xff\xffX\x91\x1au\x83V\xc1H\xd3\rZ\x01!b\xc0\xaeW\xc5\x1f\xec\xfd\xe3\xc1\a\xeb\\,\x98P \xf2\xfe\xc5\xf9\xd4\x9a\x16\xa6\xb2\xde\x82\xa8\xf9\xcb{\xa9m\x83\xfb\x84\x8e\xef\xe3#\xcf$Df\x89\xe2?`\x96E=-\xd6\x91,4yEE\x1d\x81\x9c\x00\x00\x00\x00\x00\x001N\x1a\xff\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\xcc\xb8o7\t\x0e4$Lb\xf9e\x8dv\xd0Y\x86\x18\v\xd6\xf9\\-\xdc\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a4\xf2\x8c\x19\x1e\xf0\xb5_\x93\x98\xb8\xcc\xc2\xc6\x15?\xa44\xd4\x12\xed\xa1\xf1!\xbch\x94\xd6\xf0\x98u\xd0#\x95y\x10\x06^\xdf\x0563\x9dX\xdcI\x06\xfe6\x1e^\"\x90\xbf\xa7&\xa3\xb5\x8d\\\xcf\xa1T\v\xd1\x92oV\x8d\xbcGd\x82\xaeD\xe0D\x10\xa9\xdb[\\eN\xbc\xb26-\xcd\xeat\xfa)\xc8\x00\x91<0\xbcf\x8b\xd5\xdb\xd9AC\xf5Z4h\x1a', 0x0) unshare(0x22000400) unshare(0x722cdcaace7d584f) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000040)="3f9ebe239545703482", 0x9}], 0x1, 0x81806, 0x2) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x100000000000042) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r2 = syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_CHANNEL(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000440)=ANY=[@ANYRESDEC, @ANYRES16=r2, @ANYBLOB="1dafec3a5fd6fc1146ab4c5451697ec48de9a527cd0c0c8f667c2d9088051c84adc236defb5c6d5e1d0d02f76acfd8e2dad4f20ee15fdbc568194459573b7417c9", @ANYRES32, @ANYBLOB], 0x2c}}, 0x0) sendmsg$NL80211_CMD_GET_WOWLAN(0xffffffffffffffff, 0x0, 0x20000052) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x1f000000, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xb9c, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9"}) ioctl$LOOP_CLR_FD(r0, 0x4c01) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x4008011) memfd_secret(0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000e80)={0x0, 0x0, &(0x7f0000000d00)=[{&(0x7f0000000840)="2563c2ec0ff3afb4690e51a4f981f1070ac05e06798bae178d717aa692886927c2418321", 0x24}, {0x0}, {&(0x7f0000000a00)}, {0x0}, {0x0}, {&(0x7f0000000bc0)="8e298826bd3aca9e682c13207037eea2", 0x10}, {&(0x7f00000000c0)="1cb32bf749fce7f9", 0x8}, {&(0x7f0000000c40)}], 0x8, 0x0, 0x0, 0x800}, 0x4010000) 08:43:36 executing program 0: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x3004000, &(0x7f0000000080)={[{@abort}, {@resuid}, {@block_validity}, {@errors_remount}, {@dioread_lock}, {@stripe={'stripe', 0x3d, 0x4}}, {@noload}]}, 0x1, 0x77b, &(0x7f0000000800)="$eJzs3ctrXFUYAPDv3swkfScVBauoARctiHlZ8IFCCy5FBHXlpiFJS+n0QRPBhggtYlcuC4IbEQQ37hQ3gpSuFHHTjfQ/kEqRILSKi8i9uTOZNjPJxMzkUuf3g9uec89Mz7kN3z33cXJOAH1rNPsjjTgUEZeTiOFifxIR1TxViTi2+rl7y0szfy0vzSSxsvL2H0n+mbvLSzPR9J3M3uJruyLi5o0kHhlYX+/8pcUz07Xa3MUiP75w9sL4/KXF50+fnT41d2ru3NTU1MtTRydfnJjq2rF+9NTP3/xz9c2PPz1w69rvN787kMSx2FeUNR9Ht4zGaOP/pFklIl7vdmUlGSiOJ23al1RKbBBbkjb9DB+P4RiItR/ecNz4ttTGAQA9sZJtAECfSfT/ANBn6s8B7i4vzdS3cp9IADvlzvHIX9RncX+v2FZLKnEs/3tXPg5gz59JNL/WTepjB7Yp+ze+fq/6ebZFj97DA61dvpK/+G/R/yd5/I/ko3jWx/9ARHF+2J4HzyHiH3bOduL/rS7UL/4BAAAAAACge64fj4iXWr3/Sxvjf6LF+7+hiJjoQv2bv/9Lb3ehGqCFO8cjXi3m9rl//F9jRpeRgSK3PyIei2py8nRtLov9AxFxJKpDWX5ygzrevTr5Q7uy5vF/2ZbVXx8LWLTjdmXo/u/MTi9Mb+eYgVV3rkQ8UWkV/0mj/0/ajP890WEd3y999XS7ss3jH+iVlS8iDrfs/9dmrks2np9vPL8eGK9fFay3eOK1D9vV31H8r/2aEtBFWf+/Z+P4H0ma5+uc33odn9yd+Kxd2X+9/h9M3slnFR0s9n0wvbBwcTJiMHlj/f7uTSEKD7V6PNTjJYv/I8+2vv/f6Pq/GhEXOqzzyx+rv7YrG80j1fU/lCGL/9kt9f9bT/z9y5NtTxWd9f9H8z79SLHH8z/YWKcBWnY7AQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACgm9KI2BdJOtZIp+nYWMTeiHg09qS18/MLz508//652awsYiSq6cnTtbmJiBhezSdZfjJPr+WnHsi/EBEHI+La0O48PzZzvjZb9sEDAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAQGFvm/X/M78Nld06AKBndpXdAABgx+n/AaD/6P8BoP9suf//aX9vGgIA7Bj3/wDQf/T/AAAAAAAAAAAAAAAAAAAAAAAAANBTB5+5fiuJiMuv7M63zGBRVi21ZUCvpWU3ACjNQNkNAEpT6eRDSdL7hgA7zj0+sFkP336JEE8QAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADoH4cPWf8f+pXV+6B/Wf8f+ldH6/8D/0vu8QHr/wMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwObmLy2ema7V5i5KSEhINBJln5kAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgY/BsAAP//JpcRZA==") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.io_service_bytes_recursive\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[], 0x208e24b) creat(0x0, 0x0) [ 55.819918][ T3505] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 55.857936][ T3078] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 08:43:36 executing program 3: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x3000480, &(0x7f0000000080)=ANY=[], 0x1, 0x786, &(0x7f00000016c0)="$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") r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000000)="06", 0x1}], 0x1) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000280)={0x0, 0x101}) [ 55.883126][ T3504] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. 08:43:36 executing program 2: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x0, 0x103382) r1 = memfd_create(&(0x7f0000000300)='U\xffA\x05\xd6\xe7\xfc\xa3\xb0\x04\xe2\x1b\\by\xdc2\xe3ZoL\x14\xa7\x8c\'\xa7\xcf\xff\xf0+9\xac\\\xa4\xa5=\\\xcc\xf6\xc4R\x88A\x94\xe0\xff\xff\xffX\x91\x1au\x83V\xc1H\xd3\rZ\x01!b\xc0\xaeW\xc5\x1f\xec\xfd\xe3\xc1\a\xeb\\,\x98P \xf2\xfe\xc5\xf9\xd4\x9a\x16\xa6\xb2\xde\x82\xa8\xf9\xcb{\xa9m\x83\xfb\x84\x8e\xef\xe3#\xcf$Df\x89\xe2?`\x96E=-\xd6\x91,4yEE\x1d\x81\x9c\x00\x00\x00\x00\x00\x001N\x1a\xff\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\xcc\xb8o7\t\x0e4$Lb\xf9e\x8dv\xd0Y\x86\x18\v\xd6\xf9\\-\xdc\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a4\xf2\x8c\x19\x1e\xf0\xb5_\x93\x98\xb8\xcc\xc2\xc6\x15?\xa44\xd4\x12\xed\xa1\xf1!\xbch\x94\xd6\xf0\x98u\xd0#\x95y\x10\x06^\xdf\x0563\x9dX\xdcI\x06\xfe6\x1e^\"\x90\xbf\xa7&\xa3\xb5\x8d\\\xcf\xa1T\v\xd1\x92oV\x8d\xbcGd\x82\xaeD\xe0D\x10\xa9\xdb[\\eN\xbc\xb26-\xcd\xeat\xfa)\xc8\x00\x91<0\xbcf\x8b\xd5\xdb\xd9AC\xf5Z4h\x1a', 0x0) unshare(0x22000400) unshare(0x722cdcaace7d584f) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000040)="3f9ebe239545703482", 0x9}], 0x1, 0x81806, 0x2) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x100000000000042) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r2 = syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_CHANNEL(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000440)=ANY=[@ANYRESDEC, @ANYRES16=r2, @ANYBLOB="1dafec3a5fd6fc1146ab4c5451697ec48de9a527cd0c0c8f667c2d9088051c84adc236defb5c6d5e1d0d02f76acfd8e2dad4f20ee15fdbc568194459573b7417c9", @ANYRES32, @ANYBLOB], 0x2c}}, 0x0) sendmsg$NL80211_CMD_GET_WOWLAN(0xffffffffffffffff, 0x0, 0x20000052) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x1f000000, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xb9c, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9"}) ioctl$LOOP_CLR_FD(r0, 0x4c01) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x4008011) memfd_secret(0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000e80)={0x0, 0x0, &(0x7f0000000d00)=[{&(0x7f0000000840)="2563c2ec0ff3afb4690e51a4f981f1070ac05e06798bae178d717aa692886927c2418321", 0x24}, {0x0}, {&(0x7f0000000a00)}, {0x0}, {0x0}, {&(0x7f0000000bc0)="8e298826bd3aca9e682c13207037eea2", 0x10}, {&(0x7f00000000c0)="1cb32bf749fce7f9", 0x8}, {&(0x7f0000000c40)}], 0x8, 0x0, 0x0, 0x800}, 0x4010000) 08:43:36 executing program 5: r0 = socket(0x18, 0x0, 0x0) getsockopt$sock_buf(r0, 0x1, 0x7, &(0x7f0000000000)=""/247, &(0x7f0000000100)=0xf7) 08:43:36 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x1e, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x8, 0x1, 0xb}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 55.932278][ T3059] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 55.941731][ T3533] loop1: detected capacity change from 0 to 2048 [ 55.948384][ T3371] I/O error, dev loop0, sector 24 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 08:43:36 executing program 5: r0 = socket(0x18, 0x0, 0x0) getsockopt$sock_buf(r0, 0x1, 0x7, &(0x7f0000000000)=""/247, &(0x7f0000000100)=0xf7) [ 55.994990][ T25] audit: type=1400 audit(1686213816.120:163): avc: denied { create } for pid=3536 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 08:43:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x3000480, &(0x7f0000000080)=ANY=[], 0x1, 0x786, &(0x7f00000016c0)="$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") r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000000)="06", 0x1}], 0x1) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000280)={0x0, 0x101}) [ 56.037737][ T3541] loop0: detected capacity change from 0 to 1036 [ 56.044856][ T25] audit: type=1400 audit(1686213816.150:164): avc: denied { getopt } for pid=3536 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 56.054172][ T3544] loop3: detected capacity change from 0 to 2048 [ 56.075531][ T3533] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. 08:43:36 executing program 5: r0 = socket(0x18, 0x0, 0x0) getsockopt$sock_buf(r0, 0x1, 0x7, &(0x7f0000000000)=""/247, &(0x7f0000000100)=0xf7) 08:43:36 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x1e, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x8, 0x1, 0xb}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 08:43:36 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x1e, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x8, 0x1, 0xb}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 56.118263][ T3078] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 08:43:36 executing program 5: r0 = socket(0x18, 0x0, 0x0) getsockopt$sock_buf(r0, 0x1, 0x7, &(0x7f0000000000)=""/247, &(0x7f0000000100)=0xf7) 08:43:36 executing program 2: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x0, 0x103382) r1 = memfd_create(&(0x7f0000000300)='U\xffA\x05\xd6\xe7\xfc\xa3\xb0\x04\xe2\x1b\\by\xdc2\xe3ZoL\x14\xa7\x8c\'\xa7\xcf\xff\xf0+9\xac\\\xa4\xa5=\\\xcc\xf6\xc4R\x88A\x94\xe0\xff\xff\xffX\x91\x1au\x83V\xc1H\xd3\rZ\x01!b\xc0\xaeW\xc5\x1f\xec\xfd\xe3\xc1\a\xeb\\,\x98P \xf2\xfe\xc5\xf9\xd4\x9a\x16\xa6\xb2\xde\x82\xa8\xf9\xcb{\xa9m\x83\xfb\x84\x8e\xef\xe3#\xcf$Df\x89\xe2?`\x96E=-\xd6\x91,4yEE\x1d\x81\x9c\x00\x00\x00\x00\x00\x001N\x1a\xff\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\xcc\xb8o7\t\x0e4$Lb\xf9e\x8dv\xd0Y\x86\x18\v\xd6\xf9\\-\xdc\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a4\xf2\x8c\x19\x1e\xf0\xb5_\x93\x98\xb8\xcc\xc2\xc6\x15?\xa44\xd4\x12\xed\xa1\xf1!\xbch\x94\xd6\xf0\x98u\xd0#\x95y\x10\x06^\xdf\x0563\x9dX\xdcI\x06\xfe6\x1e^\"\x90\xbf\xa7&\xa3\xb5\x8d\\\xcf\xa1T\v\xd1\x92oV\x8d\xbcGd\x82\xaeD\xe0D\x10\xa9\xdb[\\eN\xbc\xb26-\xcd\xeat\xfa)\xc8\x00\x91<0\xbcf\x8b\xd5\xdb\xd9AC\xf5Z4h\x1a', 0x0) unshare(0x22000400) unshare(0x722cdcaace7d584f) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000040)="3f9ebe239545703482", 0x9}], 0x1, 0x81806, 0x2) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x100000000000042) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r2 = syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_CHANNEL(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000440)=ANY=[@ANYRESDEC, @ANYRES16=r2, @ANYBLOB="1dafec3a5fd6fc1146ab4c5451697ec48de9a527cd0c0c8f667c2d9088051c84adc236defb5c6d5e1d0d02f76acfd8e2dad4f20ee15fdbc568194459573b7417c9", @ANYRES32, @ANYBLOB], 0x2c}}, 0x0) sendmsg$NL80211_CMD_GET_WOWLAN(0xffffffffffffffff, 0x0, 0x20000052) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x1f000000, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xb9c, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9"}) ioctl$LOOP_CLR_FD(r0, 0x4c01) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x4008011) memfd_secret(0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000e80)={0x0, 0x0, &(0x7f0000000d00)=[{&(0x7f0000000840)="2563c2ec0ff3afb4690e51a4f981f1070ac05e06798bae178d717aa692886927c2418321", 0x24}, {0x0}, {&(0x7f0000000a00)}, {0x0}, {0x0}, {&(0x7f0000000bc0)="8e298826bd3aca9e682c13207037eea2", 0x10}, {&(0x7f00000000c0)="1cb32bf749fce7f9", 0x8}, {&(0x7f0000000c40)}], 0x8, 0x0, 0x0, 0x800}, 0x4010000) [ 56.183926][ T3544] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 56.278364][ T3562] loop0: detected capacity change from 0 to 1036 [ 56.299989][ T3059] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 56.311775][ T3556] loop1: detected capacity change from 0 to 2048 08:43:36 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r2, 0x8, &(0x7f0000000300)=0x6) sched_setaffinity(0x0, 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00f2ffffffffffff1f000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000280), &(0x7f0000000340)=0xc) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x89f0, &(0x7f0000001440)={'bridge0\x00', &(0x7f0000000100)=@ethtool_ringparam={0xb}}) r7 = socket(0x0, 0x0, 0x0) r8 = socket(0x0, 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001940)=[{{&(0x7f0000000400)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f00000015c0)=[{0x0}, {&(0x7f0000000580)}, {0x0}], 0x3, &(0x7f0000001640)=[@cred={{0x1c}}], 0x20, 0x4000000}}, {{0x0, 0x0, &(0x7f00000018c0)=[{&(0x7f00000017c0)="0fd003373b72ed088153d96f287898d1e57a89998c7c787a2f006640eda4aa5aa84aea73f77fd1961b56c9d61f62cf11a8a241862bc888548c8aa25b26a031a7b83b8ab210470009ca120fb80e9a836207f4b3c6ba215c26768af131ce1730b9a144ca8a7ae0d90b491658c465bcc1408cb8a3e75081edd36392196cdc83c0760556585f803a9ea8879fc61f8a2d5b4660b6c363268eb8bf37cef8bcda07f087b2ee0bb1fd7f39edf12316eb0efbdfcce65d20099f915f04eb77453e5b252c23b462995c6df6e199988e60f4978d7f8b", 0xd0}], 0x1, &(0x7f0000001900)=[@rights={{0x1c, 0x1, 0x1, [r7, r8, 0xffffffffffffffff]}}], 0x20, 0x4000000}}], 0x2, 0x0) ioctl$TIOCMIWAIT(r6, 0x5453, 0x700) 08:43:36 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x1e, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x8, 0x1, 0xb}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 08:43:36 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f00000000c0)=[{0x3d}, {0x35, 0x0, 0x0, 0x8}, {0x6, 0x0, 0x0, 0x7ffffff5}]}) socket(0x10, 0x80002, 0x0) 08:43:36 executing program 3: syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x3000480, &(0x7f0000000080)=ANY=[], 0x1, 0x786, &(0x7f00000016c0)="$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") r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000000)="06", 0x1}], 0x1) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000280)={0x0, 0x101}) 08:43:36 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000001580), 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x68, r1, 0x1, 0x0, 0x0, {{}, {}, {0x4c, 0x18, {0x0, @media='udp\x00'}}}}, 0x68}}, 0x0) [ 56.354836][ T3556] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 56.377676][ T3078] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 08:43:36 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f00000000c0)=[{0x3d}, {0x35, 0x0, 0x0, 0x8}, {0x6, 0x0, 0x0, 0x7ffffff5}]}) socket(0x10, 0x80002, 0x0) 08:43:36 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, 0x0, 0x0) 08:43:36 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000001580), 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x68, r1, 0x1, 0x0, 0x0, {{}, {}, {0x4c, 0x18, {0x0, @media='udp\x00'}}}}, 0x68}}, 0x0) 08:43:36 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f00000000c0)=[{0x3d}, {0x35, 0x0, 0x0, 0x8}, {0x6, 0x0, 0x0, 0x7ffffff5}]}) socket(0x10, 0x80002, 0x0) [ 56.440886][ T3562] I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 56.450189][ T3562] Buffer I/O error on dev loop0, logical block 0, async page read [ 56.458052][ T3562] loop0: unable to read partition table 08:43:36 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, 0x0, 0x0) [ 56.481346][ T25] audit: type=1400 audit(1686213816.610:165): avc: denied { bind } for pid=3577 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 56.506249][ T3562] loop0: partition table beyond EOD, truncated [ 56.512480][ T3562] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 08:43:36 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000001580), 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x68, r1, 0x1, 0x0, 0x0, {{}, {}, {0x4c, 0x18, {0x0, @media='udp\x00'}}}}, 0x68}}, 0x0) [ 56.538706][ T3573] loop3: detected capacity change from 0 to 2048 08:43:36 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, 0x0, 0x0) [ 56.580768][ T3573] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 56.627264][ T3059] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 56.697437][ T3594] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 56.704961][ T3594] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 56.719152][ T3594] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 08:43:37 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000001580), 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x68, r1, 0x1, 0x0, 0x0, {{}, {}, {0x4c, 0x18, {0x0, @media='udp\x00'}}}}, 0x68}}, 0x0) 08:43:37 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f00000000c0)=[{0x3d}, {0x35, 0x0, 0x0, 0x8}, {0x6, 0x0, 0x0, 0x7ffffff5}]}) socket(0x10, 0x80002, 0x0) 08:43:37 executing program 2: mlockall(0x1) mlockall(0x0) brk(0x55555ede5ffe) mlockall(0x1) mlockall(0x2) brk(0x0) 08:43:37 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, 0x0, 0x0) 08:43:37 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r2, 0x8, &(0x7f0000000300)=0x6) sched_setaffinity(0x0, 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00f2ffffffffffff1f000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000280), &(0x7f0000000340)=0xc) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x89f0, &(0x7f0000001440)={'bridge0\x00', &(0x7f0000000100)=@ethtool_ringparam={0xb}}) r7 = socket(0x0, 0x0, 0x0) r8 = socket(0x0, 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001940)=[{{&(0x7f0000000400)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f00000015c0)=[{0x0}, {&(0x7f0000000580)}, {0x0}], 0x3, &(0x7f0000001640)=[@cred={{0x1c}}], 0x20, 0x4000000}}, {{0x0, 0x0, &(0x7f00000018c0)=[{&(0x7f00000017c0)="0fd003373b72ed088153d96f287898d1e57a89998c7c787a2f006640eda4aa5aa84aea73f77fd1961b56c9d61f62cf11a8a241862bc888548c8aa25b26a031a7b83b8ab210470009ca120fb80e9a836207f4b3c6ba215c26768af131ce1730b9a144ca8a7ae0d90b491658c465bcc1408cb8a3e75081edd36392196cdc83c0760556585f803a9ea8879fc61f8a2d5b4660b6c363268eb8bf37cef8bcda07f087b2ee0bb1fd7f39edf12316eb0efbdfcce65d20099f915f04eb77453e5b252c23b462995c6df6e199988e60f4978d7f8b", 0xd0}], 0x1, &(0x7f0000001900)=[@rights={{0x1c, 0x1, 0x1, [r7, r8, 0xffffffffffffffff]}}], 0x20, 0x4000000}}], 0x2, 0x0) ioctl$TIOCMIWAIT(r6, 0x5453, 0x700) 08:43:37 executing program 3: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) listen(r0, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) 08:43:37 executing program 5: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r2, 0x8, &(0x7f0000000300)=0x6) sched_setaffinity(0x0, 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00f2ffffffffffff1f000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000280), &(0x7f0000000340)=0xc) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x89f0, &(0x7f0000001440)={'bridge0\x00', &(0x7f0000000100)=@ethtool_ringparam={0xb}}) r7 = socket(0x0, 0x0, 0x0) r8 = socket(0x0, 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001940)=[{{&(0x7f0000000400)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f00000015c0)=[{0x0}, {&(0x7f0000000580)}, {0x0}], 0x3, &(0x7f0000001640)=[@cred={{0x1c}}], 0x20, 0x4000000}}, {{0x0, 0x0, &(0x7f00000018c0)=[{&(0x7f00000017c0)="0fd003373b72ed088153d96f287898d1e57a89998c7c787a2f006640eda4aa5aa84aea73f77fd1961b56c9d61f62cf11a8a241862bc888548c8aa25b26a031a7b83b8ab210470009ca120fb80e9a836207f4b3c6ba215c26768af131ce1730b9a144ca8a7ae0d90b491658c465bcc1408cb8a3e75081edd36392196cdc83c0760556585f803a9ea8879fc61f8a2d5b4660b6c363268eb8bf37cef8bcda07f087b2ee0bb1fd7f39edf12316eb0efbdfcce65d20099f915f04eb77453e5b252c23b462995c6df6e199988e60f4978d7f8b", 0xd0}], 0x1, &(0x7f0000001900)=[@rights={{0x1c, 0x1, 0x1, [r7, r8, 0xffffffffffffffff]}}], 0x20, 0x4000000}}], 0x2, 0x0) ioctl$TIOCMIWAIT(r6, 0x5453, 0x700) 08:43:37 executing program 3: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) listen(r0, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) 08:43:37 executing program 1: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r2, 0x8, &(0x7f0000000300)=0x6) sched_setaffinity(0x0, 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00f2ffffffffffff1f000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000280), &(0x7f0000000340)=0xc) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x89f0, &(0x7f0000001440)={'bridge0\x00', &(0x7f0000000100)=@ethtool_ringparam={0xb}}) r7 = socket(0x0, 0x0, 0x0) r8 = socket(0x0, 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001940)=[{{&(0x7f0000000400)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f00000015c0)=[{0x0}, {&(0x7f0000000580)}, {0x0}], 0x3, &(0x7f0000001640)=[@cred={{0x1c}}], 0x20, 0x4000000}}, {{0x0, 0x0, &(0x7f00000018c0)=[{&(0x7f00000017c0)="0fd003373b72ed088153d96f287898d1e57a89998c7c787a2f006640eda4aa5aa84aea73f77fd1961b56c9d61f62cf11a8a241862bc888548c8aa25b26a031a7b83b8ab210470009ca120fb80e9a836207f4b3c6ba215c26768af131ce1730b9a144ca8a7ae0d90b491658c465bcc1408cb8a3e75081edd36392196cdc83c0760556585f803a9ea8879fc61f8a2d5b4660b6c363268eb8bf37cef8bcda07f087b2ee0bb1fd7f39edf12316eb0efbdfcce65d20099f915f04eb77453e5b252c23b462995c6df6e199988e60f4978d7f8b", 0xd0}], 0x1, &(0x7f0000001900)=[@rights={{0x1c, 0x1, 0x1, [r7, r8, 0xffffffffffffffff]}}], 0x20, 0x4000000}}], 0x2, 0x0) ioctl$TIOCMIWAIT(r6, 0x5453, 0x700) 08:43:37 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x1001}) ioctl$TUNSETOFFLOAD(r0, 0x400454c9, 0xd4047922f591fe37) ioctl$TUNSETLINK(r0, 0x400454cd, 0xfffffffe) 08:43:37 executing program 3: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) listen(r0, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) 08:43:37 executing program 3: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) listen(r0, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) [ 57.514330][ T3616] tun0: tun_chr_ioctl cmd 1074025677 [ 57.519816][ T3616] tun0: linktype set to 65534 08:43:38 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x1001}) ioctl$TUNSETOFFLOAD(r0, 0x400454c9, 0xd4047922f591fe37) ioctl$TUNSETLINK(r0, 0x400454cd, 0xfffffffe) [ 58.472252][ T3619] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 08:43:38 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000001c00)={'ipvlan0\x00', &(0x7f0000001b40)=@ethtool_wolinfo={0x6, 0x0, 0x0, "237a3a7174ef"}}) [ 58.534846][ C0] sched: RT throttling activated [ 58.549878][ T25] audit: type=1400 audit(1686213818.680:166): avc: denied { create } for pid=3631 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 58.580035][ T3619] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 58.612239][ T3625] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 58.619702][ T3625] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 58.654053][ T3625] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 58.713607][ T3624] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 58.721239][ T3624] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 58.735096][ T3624] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 58.753429][ T3643] tun0: tun_chr_ioctl cmd 1074025677 [ 58.771276][ T3643] tun0: linktype set to 65534 [ 58.851603][ T25] audit: type=1400 audit(1686213818.700:167): avc: denied { ioctl } for pid=3631 comm="syz-executor.3" path="socket:[19213]" dev="sockfs" ino=19213 ioctlcmd=0x8946 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 08:43:39 executing program 2: mlockall(0x1) mlockall(0x0) brk(0x55555ede5ffe) mlockall(0x1) mlockall(0x2) brk(0x0) 08:43:39 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r2, 0x8, &(0x7f0000000300)=0x6) sched_setaffinity(0x0, 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00f2ffffffffffff1f000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000280), &(0x7f0000000340)=0xc) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x89f0, &(0x7f0000001440)={'bridge0\x00', &(0x7f0000000100)=@ethtool_ringparam={0xb}}) r7 = socket(0x0, 0x0, 0x0) r8 = socket(0x0, 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001940)=[{{&(0x7f0000000400)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f00000015c0)=[{0x0}, {&(0x7f0000000580)}, {0x0}], 0x3, &(0x7f0000001640)=[@cred={{0x1c}}], 0x20, 0x4000000}}, {{0x0, 0x0, &(0x7f00000018c0)=[{&(0x7f00000017c0)="0fd003373b72ed088153d96f287898d1e57a89998c7c787a2f006640eda4aa5aa84aea73f77fd1961b56c9d61f62cf11a8a241862bc888548c8aa25b26a031a7b83b8ab210470009ca120fb80e9a836207f4b3c6ba215c26768af131ce1730b9a144ca8a7ae0d90b491658c465bcc1408cb8a3e75081edd36392196cdc83c0760556585f803a9ea8879fc61f8a2d5b4660b6c363268eb8bf37cef8bcda07f087b2ee0bb1fd7f39edf12316eb0efbdfcce65d20099f915f04eb77453e5b252c23b462995c6df6e199988e60f4978d7f8b", 0xd0}], 0x1, &(0x7f0000001900)=[@rights={{0x1c, 0x1, 0x1, [r7, r8, 0xffffffffffffffff]}}], 0x20, 0x4000000}}], 0x2, 0x0) ioctl$TIOCMIWAIT(r6, 0x5453, 0x700) 08:43:39 executing program 5: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r2, 0x8, &(0x7f0000000300)=0x6) sched_setaffinity(0x0, 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00f2ffffffffffff1f000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000280), &(0x7f0000000340)=0xc) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x89f0, &(0x7f0000001440)={'bridge0\x00', &(0x7f0000000100)=@ethtool_ringparam={0xb}}) r7 = socket(0x0, 0x0, 0x0) r8 = socket(0x0, 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001940)=[{{&(0x7f0000000400)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f00000015c0)=[{0x0}, {&(0x7f0000000580)}, {0x0}], 0x3, &(0x7f0000001640)=[@cred={{0x1c}}], 0x20, 0x4000000}}, {{0x0, 0x0, &(0x7f00000018c0)=[{&(0x7f00000017c0)="0fd003373b72ed088153d96f287898d1e57a89998c7c787a2f006640eda4aa5aa84aea73f77fd1961b56c9d61f62cf11a8a241862bc888548c8aa25b26a031a7b83b8ab210470009ca120fb80e9a836207f4b3c6ba215c26768af131ce1730b9a144ca8a7ae0d90b491658c465bcc1408cb8a3e75081edd36392196cdc83c0760556585f803a9ea8879fc61f8a2d5b4660b6c363268eb8bf37cef8bcda07f087b2ee0bb1fd7f39edf12316eb0efbdfcce65d20099f915f04eb77453e5b252c23b462995c6df6e199988e60f4978d7f8b", 0xd0}], 0x1, &(0x7f0000001900)=[@rights={{0x1c, 0x1, 0x1, [r7, r8, 0xffffffffffffffff]}}], 0x20, 0x4000000}}], 0x2, 0x0) ioctl$TIOCMIWAIT(r6, 0x5453, 0x700) 08:43:39 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000001c00)={'ipvlan0\x00', &(0x7f0000001b40)=@ethtool_wolinfo={0x6, 0x0, 0x0, "237a3a7174ef"}}) 08:43:39 executing program 1: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r2, 0x8, &(0x7f0000000300)=0x6) sched_setaffinity(0x0, 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00f2ffffffffffff1f000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000280), &(0x7f0000000340)=0xc) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x89f0, &(0x7f0000001440)={'bridge0\x00', &(0x7f0000000100)=@ethtool_ringparam={0xb}}) r7 = socket(0x0, 0x0, 0x0) r8 = socket(0x0, 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001940)=[{{&(0x7f0000000400)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f00000015c0)=[{0x0}, {&(0x7f0000000580)}, {0x0}], 0x3, &(0x7f0000001640)=[@cred={{0x1c}}], 0x20, 0x4000000}}, {{0x0, 0x0, &(0x7f00000018c0)=[{&(0x7f00000017c0)="0fd003373b72ed088153d96f287898d1e57a89998c7c787a2f006640eda4aa5aa84aea73f77fd1961b56c9d61f62cf11a8a241862bc888548c8aa25b26a031a7b83b8ab210470009ca120fb80e9a836207f4b3c6ba215c26768af131ce1730b9a144ca8a7ae0d90b491658c465bcc1408cb8a3e75081edd36392196cdc83c0760556585f803a9ea8879fc61f8a2d5b4660b6c363268eb8bf37cef8bcda07f087b2ee0bb1fd7f39edf12316eb0efbdfcce65d20099f915f04eb77453e5b252c23b462995c6df6e199988e60f4978d7f8b", 0xd0}], 0x1, &(0x7f0000001900)=[@rights={{0x1c, 0x1, 0x1, [r7, r8, 0xffffffffffffffff]}}], 0x20, 0x4000000}}], 0x2, 0x0) ioctl$TIOCMIWAIT(r6, 0x5453, 0x700) 08:43:39 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x1001}) ioctl$TUNSETOFFLOAD(r0, 0x400454c9, 0xd4047922f591fe37) ioctl$TUNSETLINK(r0, 0x400454cd, 0xfffffffe) 08:43:39 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000001c00)={'ipvlan0\x00', &(0x7f0000001b40)=@ethtool_wolinfo={0x6, 0x0, 0x0, "237a3a7174ef"}}) 08:43:39 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000001c00)={'ipvlan0\x00', &(0x7f0000001b40)=@ethtool_wolinfo={0x6, 0x0, 0x0, "237a3a7174ef"}}) [ 59.504201][ T3653] tun0: tun_chr_ioctl cmd 1074025677 [ 59.509932][ T3653] tun0: linktype set to 65534 08:43:40 executing program 3: mlockall(0x1) mlockall(0x0) brk(0x55555ede5ffe) mlockall(0x1) mlockall(0x2) brk(0x0) [ 60.402603][ T3662] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 08:43:40 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x1001}) ioctl$TUNSETOFFLOAD(r0, 0x400454c9, 0xd4047922f591fe37) ioctl$TUNSETLINK(r0, 0x400454cd, 0xfffffffe) [ 60.579990][ T3662] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 60.622864][ T3663] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 08:43:40 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r2, 0x8, &(0x7f0000000300)=0x6) sched_setaffinity(0x0, 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00f2ffffffffffff1f000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000280), &(0x7f0000000340)=0xc) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x89f0, &(0x7f0000001440)={'bridge0\x00', &(0x7f0000000100)=@ethtool_ringparam={0xb}}) r7 = socket(0x0, 0x0, 0x0) r8 = socket(0x0, 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001940)=[{{&(0x7f0000000400)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f00000015c0)=[{0x0}, {&(0x7f0000000580)}, {0x0}], 0x3, &(0x7f0000001640)=[@cred={{0x1c}}], 0x20, 0x4000000}}, {{0x0, 0x0, &(0x7f00000018c0)=[{&(0x7f00000017c0)="0fd003373b72ed088153d96f287898d1e57a89998c7c787a2f006640eda4aa5aa84aea73f77fd1961b56c9d61f62cf11a8a241862bc888548c8aa25b26a031a7b83b8ab210470009ca120fb80e9a836207f4b3c6ba215c26768af131ce1730b9a144ca8a7ae0d90b491658c465bcc1408cb8a3e75081edd36392196cdc83c0760556585f803a9ea8879fc61f8a2d5b4660b6c363268eb8bf37cef8bcda07f087b2ee0bb1fd7f39edf12316eb0efbdfcce65d20099f915f04eb77453e5b252c23b462995c6df6e199988e60f4978d7f8b", 0xd0}], 0x1, &(0x7f0000001900)=[@rights={{0x1c, 0x1, 0x1, [r7, r8, 0xffffffffffffffff]}}], 0x20, 0x4000000}}], 0x2, 0x0) ioctl$TIOCMIWAIT(r6, 0x5453, 0x700) 08:43:40 executing program 1: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r2, 0x8, &(0x7f0000000300)=0x6) sched_setaffinity(0x0, 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00f2ffffffffffff1f000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000280), &(0x7f0000000340)=0xc) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x89f0, &(0x7f0000001440)={'bridge0\x00', &(0x7f0000000100)=@ethtool_ringparam={0xb}}) r7 = socket(0x0, 0x0, 0x0) r8 = socket(0x0, 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001940)=[{{&(0x7f0000000400)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f00000015c0)=[{0x0}, {&(0x7f0000000580)}, {0x0}], 0x3, &(0x7f0000001640)=[@cred={{0x1c}}], 0x20, 0x4000000}}, {{0x0, 0x0, &(0x7f00000018c0)=[{&(0x7f00000017c0)="0fd003373b72ed088153d96f287898d1e57a89998c7c787a2f006640eda4aa5aa84aea73f77fd1961b56c9d61f62cf11a8a241862bc888548c8aa25b26a031a7b83b8ab210470009ca120fb80e9a836207f4b3c6ba215c26768af131ce1730b9a144ca8a7ae0d90b491658c465bcc1408cb8a3e75081edd36392196cdc83c0760556585f803a9ea8879fc61f8a2d5b4660b6c363268eb8bf37cef8bcda07f087b2ee0bb1fd7f39edf12316eb0efbdfcce65d20099f915f04eb77453e5b252c23b462995c6df6e199988e60f4978d7f8b", 0xd0}], 0x1, &(0x7f0000001900)=[@rights={{0x1c, 0x1, 0x1, [r7, r8, 0xffffffffffffffff]}}], 0x20, 0x4000000}}], 0x2, 0x0) ioctl$TIOCMIWAIT(r6, 0x5453, 0x700) [ 60.708898][ T3663] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 60.731308][ T3667] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 60.742098][ T3667] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 60.773180][ T3681] tun0: tun_chr_ioctl cmd 1074025677 [ 60.791113][ T3681] tun0: linktype set to 65534 [ 61.359206][ T3693] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 61.371270][ T3693] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 61.393693][ T3695] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 61.424108][ T3695] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 08:43:42 executing program 2: mlockall(0x1) mlockall(0x0) brk(0x55555ede5ffe) mlockall(0x1) mlockall(0x2) brk(0x0) 08:43:42 executing program 5: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(r2, 0x8, &(0x7f0000000300)=0x6) sched_setaffinity(0x0, 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00f2ffffffffffff1f000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008001b"], 0x28}}, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000280), &(0x7f0000000340)=0xc) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x89f0, &(0x7f0000001440)={'bridge0\x00', &(0x7f0000000100)=@ethtool_ringparam={0xb}}) r7 = socket(0x0, 0x0, 0x0) r8 = socket(0x0, 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001940)=[{{&(0x7f0000000400)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f00000015c0)=[{0x0}, {&(0x7f0000000580)}, {0x0}], 0x3, &(0x7f0000001640)=[@cred={{0x1c}}], 0x20, 0x4000000}}, {{0x0, 0x0, &(0x7f00000018c0)=[{&(0x7f00000017c0)="0fd003373b72ed088153d96f287898d1e57a89998c7c787a2f006640eda4aa5aa84aea73f77fd1961b56c9d61f62cf11a8a241862bc888548c8aa25b26a031a7b83b8ab210470009ca120fb80e9a836207f4b3c6ba215c26768af131ce1730b9a144ca8a7ae0d90b491658c465bcc1408cb8a3e75081edd36392196cdc83c0760556585f803a9ea8879fc61f8a2d5b4660b6c363268eb8bf37cef8bcda07f087b2ee0bb1fd7f39edf12316eb0efbdfcce65d20099f915f04eb77453e5b252c23b462995c6df6e199988e60f4978d7f8b", 0xd0}], 0x1, &(0x7f0000001900)=[@rights={{0x1c, 0x1, 0x1, [r7, r8, 0xffffffffffffffff]}}], 0x20, 0x4000000}}], 0x2, 0x0) ioctl$TIOCMIWAIT(r6, 0x5453, 0x700) 08:43:42 executing program 4: r0 = socket(0x25, 0x5, 0x0) recvfrom$phonet(r0, 0x0, 0x0, 0x40002140, 0x0, 0x0) 08:43:42 executing program 0: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed, 0x7}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = socket$rxrpc(0x21, 0x2, 0x2) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r1, 0x110, 0x4, 0x0, 0x100000004) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x15, 0x1ffffffffffffd7e, &(0x7f0000000640)=ANY=[@ANYRES16=r0, @ANYBLOB="000400109e338f3b4d2bb883627799fe60feb2706adb35e72ff1dfca8c5408ebb1f87acc2a14402140b548263ec445c5ffb74e9449b7f109f089572886f998ccccb8b2b6ab2258a4a41b65956aea8228a32931241d13c6299a64a1190e20df457a8fec030029553d50241df96958176c8220259c92c2bf57dfd44483edd32e110feb04a5f9723e574b3399828f5ed795bb623f", @ANYRESOCT=r1, @ANYRESHEX=r1], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0xa}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x402}, 0x10}, 0x80) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000008c0)={&(0x7f0000000740)=@getlink={0x158, 0x12, 0x708, 0x70bd2a, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x21109, 0x810}, [@IFLA_BROADCAST={0xa, 0x2, @random="fc12f04e3b5c"}, @IFLA_AF_SPEC={0xf8, 0x1a, 0x0, 0x1, [@AF_INET6={0x44, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @IFLA_INET6_TOKEN={0x14, 0x7, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x1f}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0xff}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x8}]}, @AF_BRIDGE={0x4}, @AF_BRIDGE={0x4}, @AF_INET={0x28, 0x2, 0x0, 0x1, {0x24, 0x1, 0x0, 0x1, [{0x8, 0x7, 0x0, 0x0, 0x10}, {0x8, 0x18, 0x0, 0x0, 0x5}, {0x8, 0xf, 0x0, 0x0, 0x1}, {0x8, 0xf, 0x0, 0x0, 0x3f}]}}, @AF_BRIDGE={0x4}, @AF_INET={0x28, 0x2, 0x0, 0x1, {0x24, 0x1, 0x0, 0x1, [{0x8, 0x9}, {0x8, 0xe, 0x0, 0x0, 0x6c}, {0x8, 0x1c, 0x0, 0x0, 0xc9c0}, {0x8, 0x7, 0x0, 0x0, 0x8}]}}, @AF_INET={0x38, 0x2, 0x0, 0x1, {0x34, 0x1, 0x0, 0x1, [{0x8, 0x12, 0x0, 0x0, 0x4}, {0x8, 0x1c, 0x0, 0x0, 0x8}, {0x8, 0x1b}, {0x8}, {0x8, 0xf, 0x0, 0x0, 0x7}, {0x8, 0x11, 0x0, 0x0, 0x8}]}}, @AF_INET={0x18, 0x2, 0x0, 0x1, {0x14, 0x1, 0x0, 0x1, [{0x8, 0x4, 0x0, 0x0, 0x3ec}, {0x8, 0x12, 0x0, 0x0, 0x1f}]}}, @AF_BRIDGE={0x4}]}, @IFLA_PHYS_SWITCH_ID={0x23, 0x24, "e868dcc5dbe0e0966e8d09245d0bf36df0913e3d1f16e28a4f23ad16e6b8cf"}, @IFLA_MTU={0x8, 0x4, 0x7}, @IFLA_PROTO_DOWN={0x5, 0x27, 0x40}]}, 0x158}, 0x1, 0x0, 0x0, 0x240480c0}, 0x4044000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) mlock(&(0x7f0000411000/0x4000)=nil, 0x4000) set_mempolicy(0x0, &(0x7f00000004c0), 0x81) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000100)={0x0, 0x7ff, 0xcf, 0xb, 0x98}) set_mempolicy(0x4000, &(0x7f0000000240)=0x4, 0x1) r3 = shmget$private(0x0, 0x4000, 0x54001800, &(0x7f0000000000/0x4000)=nil) set_mempolicy(0x2, &(0x7f00000002c0)=0x5, 0x8) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r2, 0x4008941a, &(0x7f0000000480)) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000440), 0x2, &(0x7f000000d000/0x4000)=nil, 0x2) set_mempolicy(0x3, &(0x7f0000000400)=0x7, 0x1) shmat(r3, &(0x7f0000010000/0x1000)=nil, 0x4000) shmget$private(0x0, 0x2000, 0x80, &(0x7f0000003000/0x2000)=nil) 08:43:42 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x92}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff000000", @ANYRES32=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) bind$packet(r0, &(0x7f0000000300)={0x11, 0x0, r3}, 0x14) sendto$packet(r0, &(0x7f0000000340)="93a749700b71659fbc09a7b50800468a89e9a9bf4772454a70d16b5d20bc0f18b47ffd97a5a0", 0x26, 0x0, 0x0, 0x0) 08:43:42 executing program 4: r0 = socket(0x25, 0x5, 0x0) recvfrom$phonet(r0, 0x0, 0x0, 0x40002140, 0x0, 0x0) [ 62.302460][ T25] audit: type=1400 audit(1686213822.430:168): avc: denied { setopt } for pid=3708 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 62.304174][ T3710] No such timeout policy "syz0" [ 62.337044][ T3713] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 62.355887][ T25] audit: type=1400 audit(1686213822.450:169): avc: denied { create } for pid=3707 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 62.375722][ T25] audit: type=1400 audit(1686213822.450:170): avc: denied { read } for pid=3707 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 08:43:42 executing program 0: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed, 0x7}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = socket$rxrpc(0x21, 0x2, 0x2) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r1, 0x110, 0x4, 0x0, 0x100000004) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x15, 0x1ffffffffffffd7e, &(0x7f0000000640)=ANY=[@ANYRES16=r0, @ANYBLOB="000400109e338f3b4d2bb883627799fe60feb2706adb35e72ff1dfca8c5408ebb1f87acc2a14402140b548263ec445c5ffb74e9449b7f109f089572886f998ccccb8b2b6ab2258a4a41b65956aea8228a32931241d13c6299a64a1190e20df457a8fec030029553d50241df96958176c8220259c92c2bf57dfd44483edd32e110feb04a5f9723e574b3399828f5ed795bb623f", @ANYRESOCT=r1, @ANYRESHEX=r1], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0xa}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x402}, 0x10}, 0x80) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000008c0)={&(0x7f0000000740)=@getlink={0x158, 0x12, 0x708, 0x70bd2a, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x21109, 0x810}, [@IFLA_BROADCAST={0xa, 0x2, @random="fc12f04e3b5c"}, @IFLA_AF_SPEC={0xf8, 0x1a, 0x0, 0x1, [@AF_INET6={0x44, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @IFLA_INET6_TOKEN={0x14, 0x7, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x1f}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0xff}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x8}]}, @AF_BRIDGE={0x4}, @AF_BRIDGE={0x4}, @AF_INET={0x28, 0x2, 0x0, 0x1, {0x24, 0x1, 0x0, 0x1, [{0x8, 0x7, 0x0, 0x0, 0x10}, {0x8, 0x18, 0x0, 0x0, 0x5}, {0x8, 0xf, 0x0, 0x0, 0x1}, {0x8, 0xf, 0x0, 0x0, 0x3f}]}}, @AF_BRIDGE={0x4}, @AF_INET={0x28, 0x2, 0x0, 0x1, {0x24, 0x1, 0x0, 0x1, [{0x8, 0x9}, {0x8, 0xe, 0x0, 0x0, 0x6c}, {0x8, 0x1c, 0x0, 0x0, 0xc9c0}, {0x8, 0x7, 0x0, 0x0, 0x8}]}}, @AF_INET={0x38, 0x2, 0x0, 0x1, {0x34, 0x1, 0x0, 0x1, [{0x8, 0x12, 0x0, 0x0, 0x4}, {0x8, 0x1c, 0x0, 0x0, 0x8}, {0x8, 0x1b}, {0x8}, {0x8, 0xf, 0x0, 0x0, 0x7}, {0x8, 0x11, 0x0, 0x0, 0x8}]}}, @AF_INET={0x18, 0x2, 0x0, 0x1, {0x14, 0x1, 0x0, 0x1, [{0x8, 0x4, 0x0, 0x0, 0x3ec}, {0x8, 0x12, 0x0, 0x0, 0x1f}]}}, @AF_BRIDGE={0x4}]}, @IFLA_PHYS_SWITCH_ID={0x23, 0x24, "e868dcc5dbe0e0966e8d09245d0bf36df0913e3d1f16e28a4f23ad16e6b8cf"}, @IFLA_MTU={0x8, 0x4, 0x7}, @IFLA_PROTO_DOWN={0x5, 0x27, 0x40}]}, 0x158}, 0x1, 0x0, 0x0, 0x240480c0}, 0x4044000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) mlock(&(0x7f0000411000/0x4000)=nil, 0x4000) set_mempolicy(0x0, &(0x7f00000004c0), 0x81) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000100)={0x0, 0x7ff, 0xcf, 0xb, 0x98}) set_mempolicy(0x4000, &(0x7f0000000240)=0x4, 0x1) r3 = shmget$private(0x0, 0x4000, 0x54001800, &(0x7f0000000000/0x4000)=nil) set_mempolicy(0x2, &(0x7f00000002c0)=0x5, 0x8) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r2, 0x4008941a, &(0x7f0000000480)) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000440), 0x2, &(0x7f000000d000/0x4000)=nil, 0x2) set_mempolicy(0x3, &(0x7f0000000400)=0x7, 0x1) shmat(r3, &(0x7f0000010000/0x1000)=nil, 0x4000) shmget$private(0x0, 0x2000, 0x80, &(0x7f0000003000/0x2000)=nil) 08:43:42 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x92}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff000000", @ANYRES32=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) bind$packet(r0, &(0x7f0000000300)={0x11, 0x0, r3}, 0x14) sendto$packet(r0, &(0x7f0000000340)="93a749700b71659fbc09a7b50800468a89e9a9bf4772454a70d16b5d20bc0f18b47ffd97a5a0", 0x26, 0x0, 0x0, 0x0) [ 62.396384][ T25] audit: type=1400 audit(1686213822.510:171): avc: denied { bind } for pid=3712 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 62.416330][ T25] audit: type=1400 audit(1686213822.510:172): avc: denied { setopt } for pid=3708 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 62.471244][ T3722] No such timeout policy "syz0" [ 62.476364][ T3721] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 62.552183][ T3724] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 62.562375][ T3724] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 62.611537][ T3721] syz-executor.1 (3721) used greatest stack depth: 11280 bytes left 08:43:43 executing program 3: mlockall(0x1) mlockall(0x0) brk(0x55555ede5ffe) mlockall(0x1) mlockall(0x2) brk(0x0) 08:43:43 executing program 4: r0 = socket(0x25, 0x5, 0x0) recvfrom$phonet(r0, 0x0, 0x0, 0x40002140, 0x0, 0x0) 08:43:43 executing program 0: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed, 0x7}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = socket$rxrpc(0x21, 0x2, 0x2) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r1, 0x110, 0x4, 0x0, 0x100000004) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x15, 0x1ffffffffffffd7e, &(0x7f0000000640)=ANY=[@ANYRES16=r0, @ANYBLOB="000400109e338f3b4d2bb883627799fe60feb2706adb35e72ff1dfca8c5408ebb1f87acc2a14402140b548263ec445c5ffb74e9449b7f109f089572886f998ccccb8b2b6ab2258a4a41b65956aea8228a32931241d13c6299a64a1190e20df457a8fec030029553d50241df96958176c8220259c92c2bf57dfd44483edd32e110feb04a5f9723e574b3399828f5ed795bb623f", @ANYRESOCT=r1, @ANYRESHEX=r1], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0xa}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x402}, 0x10}, 0x80) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000008c0)={&(0x7f0000000740)=@getlink={0x158, 0x12, 0x708, 0x70bd2a, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x21109, 0x810}, [@IFLA_BROADCAST={0xa, 0x2, @random="fc12f04e3b5c"}, @IFLA_AF_SPEC={0xf8, 0x1a, 0x0, 0x1, [@AF_INET6={0x44, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @IFLA_INET6_TOKEN={0x14, 0x7, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x1f}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0xff}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x8}]}, @AF_BRIDGE={0x4}, @AF_BRIDGE={0x4}, @AF_INET={0x28, 0x2, 0x0, 0x1, {0x24, 0x1, 0x0, 0x1, [{0x8, 0x7, 0x0, 0x0, 0x10}, {0x8, 0x18, 0x0, 0x0, 0x5}, {0x8, 0xf, 0x0, 0x0, 0x1}, {0x8, 0xf, 0x0, 0x0, 0x3f}]}}, @AF_BRIDGE={0x4}, @AF_INET={0x28, 0x2, 0x0, 0x1, {0x24, 0x1, 0x0, 0x1, [{0x8, 0x9}, {0x8, 0xe, 0x0, 0x0, 0x6c}, {0x8, 0x1c, 0x0, 0x0, 0xc9c0}, {0x8, 0x7, 0x0, 0x0, 0x8}]}}, @AF_INET={0x38, 0x2, 0x0, 0x1, {0x34, 0x1, 0x0, 0x1, [{0x8, 0x12, 0x0, 0x0, 0x4}, {0x8, 0x1c, 0x0, 0x0, 0x8}, {0x8, 0x1b}, {0x8}, {0x8, 0xf, 0x0, 0x0, 0x7}, {0x8, 0x11, 0x0, 0x0, 0x8}]}}, @AF_INET={0x18, 0x2, 0x0, 0x1, {0x14, 0x1, 0x0, 0x1, [{0x8, 0x4, 0x0, 0x0, 0x3ec}, {0x8, 0x12, 0x0, 0x0, 0x1f}]}}, @AF_BRIDGE={0x4}]}, @IFLA_PHYS_SWITCH_ID={0x23, 0x24, "e868dcc5dbe0e0966e8d09245d0bf36df0913e3d1f16e28a4f23ad16e6b8cf"}, @IFLA_MTU={0x8, 0x4, 0x7}, @IFLA_PROTO_DOWN={0x5, 0x27, 0x40}]}, 0x158}, 0x1, 0x0, 0x0, 0x240480c0}, 0x4044000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) mlock(&(0x7f0000411000/0x4000)=nil, 0x4000) set_mempolicy(0x0, &(0x7f00000004c0), 0x81) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000100)={0x0, 0x7ff, 0xcf, 0xb, 0x98}) set_mempolicy(0x4000, &(0x7f0000000240)=0x4, 0x1) r3 = shmget$private(0x0, 0x4000, 0x54001800, &(0x7f0000000000/0x4000)=nil) set_mempolicy(0x2, &(0x7f00000002c0)=0x5, 0x8) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r2, 0x4008941a, &(0x7f0000000480)) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000440), 0x2, &(0x7f000000d000/0x4000)=nil, 0x2) set_mempolicy(0x3, &(0x7f0000000400)=0x7, 0x1) shmat(r3, &(0x7f0000010000/0x1000)=nil, 0x4000) shmget$private(0x0, 0x2000, 0x80, &(0x7f0000003000/0x2000)=nil) 08:43:43 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x92}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff000000", @ANYRES32=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) bind$packet(r0, &(0x7f0000000300)={0x11, 0x0, r3}, 0x14) sendto$packet(r0, &(0x7f0000000340)="93a749700b71659fbc09a7b50800468a89e9a9bf4772454a70d16b5d20bc0f18b47ffd97a5a0", 0x26, 0x0, 0x0, 0x0) [ 62.976878][ T3734] No such timeout policy "syz0" [ 62.987702][ T3732] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 08:43:43 executing program 2: mlockall(0x1) mlockall(0x0) brk(0x55555ede5ffe) mlockall(0x1) mlockall(0x2) brk(0x0) 08:43:43 executing program 4: r0 = socket(0x25, 0x5, 0x0) recvfrom$phonet(r0, 0x0, 0x0, 0x40002140, 0x0, 0x0) 08:43:43 executing program 0: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed, 0x7}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = socket$rxrpc(0x21, 0x2, 0x2) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r1, 0x110, 0x4, 0x0, 0x100000004) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x15, 0x1ffffffffffffd7e, &(0x7f0000000640)=ANY=[@ANYRES16=r0, @ANYBLOB="000400109e338f3b4d2bb883627799fe60feb2706adb35e72ff1dfca8c5408ebb1f87acc2a14402140b548263ec445c5ffb74e9449b7f109f089572886f998ccccb8b2b6ab2258a4a41b65956aea8228a32931241d13c6299a64a1190e20df457a8fec030029553d50241df96958176c8220259c92c2bf57dfd44483edd32e110feb04a5f9723e574b3399828f5ed795bb623f", @ANYRESOCT=r1, @ANYRESHEX=r1], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0xa}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x402}, 0x10}, 0x80) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000008c0)={&(0x7f0000000740)=@getlink={0x158, 0x12, 0x708, 0x70bd2a, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x21109, 0x810}, [@IFLA_BROADCAST={0xa, 0x2, @random="fc12f04e3b5c"}, @IFLA_AF_SPEC={0xf8, 0x1a, 0x0, 0x1, [@AF_INET6={0x44, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @IFLA_INET6_TOKEN={0x14, 0x7, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x1f}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0xff}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x8}]}, @AF_BRIDGE={0x4}, @AF_BRIDGE={0x4}, @AF_INET={0x28, 0x2, 0x0, 0x1, {0x24, 0x1, 0x0, 0x1, [{0x8, 0x7, 0x0, 0x0, 0x10}, {0x8, 0x18, 0x0, 0x0, 0x5}, {0x8, 0xf, 0x0, 0x0, 0x1}, {0x8, 0xf, 0x0, 0x0, 0x3f}]}}, @AF_BRIDGE={0x4}, @AF_INET={0x28, 0x2, 0x0, 0x1, {0x24, 0x1, 0x0, 0x1, [{0x8, 0x9}, {0x8, 0xe, 0x0, 0x0, 0x6c}, {0x8, 0x1c, 0x0, 0x0, 0xc9c0}, {0x8, 0x7, 0x0, 0x0, 0x8}]}}, @AF_INET={0x38, 0x2, 0x0, 0x1, {0x34, 0x1, 0x0, 0x1, [{0x8, 0x12, 0x0, 0x0, 0x4}, {0x8, 0x1c, 0x0, 0x0, 0x8}, {0x8, 0x1b}, {0x8}, {0x8, 0xf, 0x0, 0x0, 0x7}, {0x8, 0x11, 0x0, 0x0, 0x8}]}}, @AF_INET={0x18, 0x2, 0x0, 0x1, {0x14, 0x1, 0x0, 0x1, [{0x8, 0x4, 0x0, 0x0, 0x3ec}, {0x8, 0x12, 0x0, 0x0, 0x1f}]}}, @AF_BRIDGE={0x4}]}, @IFLA_PHYS_SWITCH_ID={0x23, 0x24, "e868dcc5dbe0e0966e8d09245d0bf36df0913e3d1f16e28a4f23ad16e6b8cf"}, @IFLA_MTU={0x8, 0x4, 0x7}, @IFLA_PROTO_DOWN={0x5, 0x27, 0x40}]}, 0x158}, 0x1, 0x0, 0x0, 0x240480c0}, 0x4044000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) mlock(&(0x7f0000411000/0x4000)=nil, 0x4000) set_mempolicy(0x0, &(0x7f00000004c0), 0x81) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000100)={0x0, 0x7ff, 0xcf, 0xb, 0x98}) set_mempolicy(0x4000, &(0x7f0000000240)=0x4, 0x1) r3 = shmget$private(0x0, 0x4000, 0x54001800, &(0x7f0000000000/0x4000)=nil) set_mempolicy(0x2, &(0x7f00000002c0)=0x5, 0x8) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r2, 0x4008941a, &(0x7f0000000480)) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000440), 0x2, &(0x7f000000d000/0x4000)=nil, 0x2) set_mempolicy(0x3, &(0x7f0000000400)=0x7, 0x1) shmat(r3, &(0x7f0000010000/0x1000)=nil, 0x4000) shmget$private(0x0, 0x2000, 0x80, &(0x7f0000003000/0x2000)=nil) 08:43:43 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x92}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff000000", @ANYRES32=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) bind$packet(r0, &(0x7f0000000300)={0x11, 0x0, r3}, 0x14) sendto$packet(r0, &(0x7f0000000340)="93a749700b71659fbc09a7b50800468a89e9a9bf4772454a70d16b5d20bc0f18b47ffd97a5a0", 0x26, 0x0, 0x0, 0x0) 08:43:43 executing program 5: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed, 0x7}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = socket$rxrpc(0x21, 0x2, 0x2) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r1, 0x110, 0x4, 0x0, 0x100000004) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x15, 0x1ffffffffffffd7e, &(0x7f0000000640)=ANY=[@ANYRES16=r0, @ANYBLOB="000400109e338f3b4d2bb883627799fe60feb2706adb35e72ff1dfca8c5408ebb1f87acc2a14402140b548263ec445c5ffb74e9449b7f109f089572886f998ccccb8b2b6ab2258a4a41b65956aea8228a32931241d13c6299a64a1190e20df457a8fec030029553d50241df96958176c8220259c92c2bf57dfd44483edd32e110feb04a5f9723e574b3399828f5ed795bb623f", @ANYRESOCT=r1, @ANYRESHEX=r1], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0xa}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x402}, 0x10}, 0x80) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000008c0)={&(0x7f0000000740)=@getlink={0x158, 0x12, 0x708, 0x70bd2a, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x21109, 0x810}, [@IFLA_BROADCAST={0xa, 0x2, @random="fc12f04e3b5c"}, @IFLA_AF_SPEC={0xf8, 0x1a, 0x0, 0x1, [@AF_INET6={0x44, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @IFLA_INET6_TOKEN={0x14, 0x7, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x1f}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0xff}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x8}]}, @AF_BRIDGE={0x4}, @AF_BRIDGE={0x4}, @AF_INET={0x28, 0x2, 0x0, 0x1, {0x24, 0x1, 0x0, 0x1, [{0x8, 0x7, 0x0, 0x0, 0x10}, {0x8, 0x18, 0x0, 0x0, 0x5}, {0x8, 0xf, 0x0, 0x0, 0x1}, {0x8, 0xf, 0x0, 0x0, 0x3f}]}}, @AF_BRIDGE={0x4}, @AF_INET={0x28, 0x2, 0x0, 0x1, {0x24, 0x1, 0x0, 0x1, [{0x8, 0x9}, {0x8, 0xe, 0x0, 0x0, 0x6c}, {0x8, 0x1c, 0x0, 0x0, 0xc9c0}, {0x8, 0x7, 0x0, 0x0, 0x8}]}}, @AF_INET={0x38, 0x2, 0x0, 0x1, {0x34, 0x1, 0x0, 0x1, [{0x8, 0x12, 0x0, 0x0, 0x4}, {0x8, 0x1c, 0x0, 0x0, 0x8}, {0x8, 0x1b}, {0x8}, {0x8, 0xf, 0x0, 0x0, 0x7}, {0x8, 0x11, 0x0, 0x0, 0x8}]}}, @AF_INET={0x18, 0x2, 0x0, 0x1, {0x14, 0x1, 0x0, 0x1, [{0x8, 0x4, 0x0, 0x0, 0x3ec}, {0x8, 0x12, 0x0, 0x0, 0x1f}]}}, @AF_BRIDGE={0x4}]}, @IFLA_PHYS_SWITCH_ID={0x23, 0x24, "e868dcc5dbe0e0966e8d09245d0bf36df0913e3d1f16e28a4f23ad16e6b8cf"}, @IFLA_MTU={0x8, 0x4, 0x7}, @IFLA_PROTO_DOWN={0x5, 0x27, 0x40}]}, 0x158}, 0x1, 0x0, 0x0, 0x240480c0}, 0x4044000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) mlock(&(0x7f0000411000/0x4000)=nil, 0x4000) set_mempolicy(0x0, &(0x7f00000004c0), 0x81) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000100)={0x0, 0x7ff, 0xcf, 0xb, 0x98}) set_mempolicy(0x4000, &(0x7f0000000240)=0x4, 0x1) r3 = shmget$private(0x0, 0x4000, 0x54001800, &(0x7f0000000000/0x4000)=nil) set_mempolicy(0x2, &(0x7f00000002c0)=0x5, 0x8) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r2, 0x4008941a, &(0x7f0000000480)) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000440), 0x2, &(0x7f000000d000/0x4000)=nil, 0x2) set_mempolicy(0x3, &(0x7f0000000400)=0x7, 0x1) shmat(r3, &(0x7f0000010000/0x1000)=nil, 0x4000) shmget$private(0x0, 0x2000, 0x80, &(0x7f0000003000/0x2000)=nil) 08:43:43 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed, 0x7}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = socket$rxrpc(0x21, 0x2, 0x2) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r1, 0x110, 0x4, 0x0, 0x100000004) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x15, 0x1ffffffffffffd7e, &(0x7f0000000640)=ANY=[@ANYRES16=r0, @ANYBLOB="000400109e338f3b4d2bb883627799fe60feb2706adb35e72ff1dfca8c5408ebb1f87acc2a14402140b548263ec445c5ffb74e9449b7f109f089572886f998ccccb8b2b6ab2258a4a41b65956aea8228a32931241d13c6299a64a1190e20df457a8fec030029553d50241df96958176c8220259c92c2bf57dfd44483edd32e110feb04a5f9723e574b3399828f5ed795bb623f", @ANYRESOCT=r1, @ANYRESHEX=r1], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0xa}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x402}, 0x10}, 0x80) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000008c0)={&(0x7f0000000740)=@getlink={0x158, 0x12, 0x708, 0x70bd2a, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x21109, 0x810}, [@IFLA_BROADCAST={0xa, 0x2, @random="fc12f04e3b5c"}, @IFLA_AF_SPEC={0xf8, 0x1a, 0x0, 0x1, [@AF_INET6={0x44, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @IFLA_INET6_TOKEN={0x14, 0x7, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x1f}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0xff}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x8}]}, @AF_BRIDGE={0x4}, @AF_BRIDGE={0x4}, @AF_INET={0x28, 0x2, 0x0, 0x1, {0x24, 0x1, 0x0, 0x1, [{0x8, 0x7, 0x0, 0x0, 0x10}, {0x8, 0x18, 0x0, 0x0, 0x5}, {0x8, 0xf, 0x0, 0x0, 0x1}, {0x8, 0xf, 0x0, 0x0, 0x3f}]}}, @AF_BRIDGE={0x4}, @AF_INET={0x28, 0x2, 0x0, 0x1, {0x24, 0x1, 0x0, 0x1, [{0x8, 0x9}, {0x8, 0xe, 0x0, 0x0, 0x6c}, {0x8, 0x1c, 0x0, 0x0, 0xc9c0}, {0x8, 0x7, 0x0, 0x0, 0x8}]}}, @AF_INET={0x38, 0x2, 0x0, 0x1, {0x34, 0x1, 0x0, 0x1, [{0x8, 0x12, 0x0, 0x0, 0x4}, {0x8, 0x1c, 0x0, 0x0, 0x8}, {0x8, 0x1b}, {0x8}, {0x8, 0xf, 0x0, 0x0, 0x7}, {0x8, 0x11, 0x0, 0x0, 0x8}]}}, @AF_INET={0x18, 0x2, 0x0, 0x1, {0x14, 0x1, 0x0, 0x1, [{0x8, 0x4, 0x0, 0x0, 0x3ec}, {0x8, 0x12, 0x0, 0x0, 0x1f}]}}, @AF_BRIDGE={0x4}]}, @IFLA_PHYS_SWITCH_ID={0x23, 0x24, "e868dcc5dbe0e0966e8d09245d0bf36df0913e3d1f16e28a4f23ad16e6b8cf"}, @IFLA_MTU={0x8, 0x4, 0x7}, @IFLA_PROTO_DOWN={0x5, 0x27, 0x40}]}, 0x158}, 0x1, 0x0, 0x0, 0x240480c0}, 0x4044000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) mlock(&(0x7f0000411000/0x4000)=nil, 0x4000) set_mempolicy(0x0, &(0x7f00000004c0), 0x81) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000100)={0x0, 0x7ff, 0xcf, 0xb, 0x98}) set_mempolicy(0x4000, &(0x7f0000000240)=0x4, 0x1) r3 = shmget$private(0x0, 0x4000, 0x54001800, &(0x7f0000000000/0x4000)=nil) set_mempolicy(0x2, &(0x7f00000002c0)=0x5, 0x8) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r2, 0x4008941a, &(0x7f0000000480)) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000440), 0x2, &(0x7f000000d000/0x4000)=nil, 0x2) set_mempolicy(0x3, &(0x7f0000000400)=0x7, 0x1) shmat(r3, &(0x7f0000010000/0x1000)=nil, 0x4000) shmget$private(0x0, 0x2000, 0x80, &(0x7f0000003000/0x2000)=nil) 08:43:43 executing program 5: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed, 0x7}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = socket$rxrpc(0x21, 0x2, 0x2) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r1, 0x110, 0x4, 0x0, 0x100000004) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x15, 0x1ffffffffffffd7e, &(0x7f0000000640)=ANY=[@ANYRES16=r0, @ANYBLOB="000400109e338f3b4d2bb883627799fe60feb2706adb35e72ff1dfca8c5408ebb1f87acc2a14402140b548263ec445c5ffb74e9449b7f109f089572886f998ccccb8b2b6ab2258a4a41b65956aea8228a32931241d13c6299a64a1190e20df457a8fec030029553d50241df96958176c8220259c92c2bf57dfd44483edd32e110feb04a5f9723e574b3399828f5ed795bb623f", @ANYRESOCT=r1, @ANYRESHEX=r1], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0xa}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x402}, 0x10}, 0x80) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000008c0)={&(0x7f0000000740)=@getlink={0x158, 0x12, 0x708, 0x70bd2a, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x21109, 0x810}, [@IFLA_BROADCAST={0xa, 0x2, @random="fc12f04e3b5c"}, @IFLA_AF_SPEC={0xf8, 0x1a, 0x0, 0x1, [@AF_INET6={0x44, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @IFLA_INET6_TOKEN={0x14, 0x7, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x1f}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0xff}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x8}]}, @AF_BRIDGE={0x4}, @AF_BRIDGE={0x4}, @AF_INET={0x28, 0x2, 0x0, 0x1, {0x24, 0x1, 0x0, 0x1, [{0x8, 0x7, 0x0, 0x0, 0x10}, {0x8, 0x18, 0x0, 0x0, 0x5}, {0x8, 0xf, 0x0, 0x0, 0x1}, {0x8, 0xf, 0x0, 0x0, 0x3f}]}}, @AF_BRIDGE={0x4}, @AF_INET={0x28, 0x2, 0x0, 0x1, {0x24, 0x1, 0x0, 0x1, [{0x8, 0x9}, {0x8, 0xe, 0x0, 0x0, 0x6c}, {0x8, 0x1c, 0x0, 0x0, 0xc9c0}, {0x8, 0x7, 0x0, 0x0, 0x8}]}}, @AF_INET={0x38, 0x2, 0x0, 0x1, {0x34, 0x1, 0x0, 0x1, [{0x8, 0x12, 0x0, 0x0, 0x4}, {0x8, 0x1c, 0x0, 0x0, 0x8}, {0x8, 0x1b}, {0x8}, {0x8, 0xf, 0x0, 0x0, 0x7}, {0x8, 0x11, 0x0, 0x0, 0x8}]}}, @AF_INET={0x18, 0x2, 0x0, 0x1, {0x14, 0x1, 0x0, 0x1, [{0x8, 0x4, 0x0, 0x0, 0x3ec}, {0x8, 0x12, 0x0, 0x0, 0x1f}]}}, @AF_BRIDGE={0x4}]}, @IFLA_PHYS_SWITCH_ID={0x23, 0x24, "e868dcc5dbe0e0966e8d09245d0bf36df0913e3d1f16e28a4f23ad16e6b8cf"}, @IFLA_MTU={0x8, 0x4, 0x7}, @IFLA_PROTO_DOWN={0x5, 0x27, 0x40}]}, 0x158}, 0x1, 0x0, 0x0, 0x240480c0}, 0x4044000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) mlock(&(0x7f0000411000/0x4000)=nil, 0x4000) set_mempolicy(0x0, &(0x7f00000004c0), 0x81) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000100)={0x0, 0x7ff, 0xcf, 0xb, 0x98}) set_mempolicy(0x4000, &(0x7f0000000240)=0x4, 0x1) r3 = shmget$private(0x0, 0x4000, 0x54001800, &(0x7f0000000000/0x4000)=nil) set_mempolicy(0x2, &(0x7f00000002c0)=0x5, 0x8) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r2, 0x4008941a, &(0x7f0000000480)) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000440), 0x2, &(0x7f000000d000/0x4000)=nil, 0x2) set_mempolicy(0x3, &(0x7f0000000400)=0x7, 0x1) shmat(r3, &(0x7f0000010000/0x1000)=nil, 0x4000) shmget$private(0x0, 0x2000, 0x80, &(0x7f0000003000/0x2000)=nil) [ 63.663626][ T3742] No such timeout policy "syz0" [ 63.664478][ T3745] No such timeout policy "syz0" [ 63.685916][ T3746] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 63.715236][ T3751] No such timeout policy "syz0" 08:43:43 executing program 0: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed, 0x7}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = socket$rxrpc(0x21, 0x2, 0x2) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r1, 0x110, 0x4, 0x0, 0x100000004) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x15, 0x1ffffffffffffd7e, &(0x7f0000000640)=ANY=[@ANYRES16=r0, @ANYBLOB="000400109e338f3b4d2bb883627799fe60feb2706adb35e72ff1dfca8c5408ebb1f87acc2a14402140b548263ec445c5ffb74e9449b7f109f089572886f998ccccb8b2b6ab2258a4a41b65956aea8228a32931241d13c6299a64a1190e20df457a8fec030029553d50241df96958176c8220259c92c2bf57dfd44483edd32e110feb04a5f9723e574b3399828f5ed795bb623f", @ANYRESOCT=r1, @ANYRESHEX=r1], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0xa}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x402}, 0x10}, 0x80) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000008c0)={&(0x7f0000000740)=@getlink={0x158, 0x12, 0x708, 0x70bd2a, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x21109, 0x810}, [@IFLA_BROADCAST={0xa, 0x2, @random="fc12f04e3b5c"}, @IFLA_AF_SPEC={0xf8, 0x1a, 0x0, 0x1, [@AF_INET6={0x44, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @IFLA_INET6_TOKEN={0x14, 0x7, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x1f}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0xff}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x8}]}, @AF_BRIDGE={0x4}, @AF_BRIDGE={0x4}, @AF_INET={0x28, 0x2, 0x0, 0x1, {0x24, 0x1, 0x0, 0x1, [{0x8, 0x7, 0x0, 0x0, 0x10}, {0x8, 0x18, 0x0, 0x0, 0x5}, {0x8, 0xf, 0x0, 0x0, 0x1}, {0x8, 0xf, 0x0, 0x0, 0x3f}]}}, @AF_BRIDGE={0x4}, @AF_INET={0x28, 0x2, 0x0, 0x1, {0x24, 0x1, 0x0, 0x1, [{0x8, 0x9}, {0x8, 0xe, 0x0, 0x0, 0x6c}, {0x8, 0x1c, 0x0, 0x0, 0xc9c0}, {0x8, 0x7, 0x0, 0x0, 0x8}]}}, @AF_INET={0x38, 0x2, 0x0, 0x1, {0x34, 0x1, 0x0, 0x1, [{0x8, 0x12, 0x0, 0x0, 0x4}, {0x8, 0x1c, 0x0, 0x0, 0x8}, {0x8, 0x1b}, {0x8}, {0x8, 0xf, 0x0, 0x0, 0x7}, {0x8, 0x11, 0x0, 0x0, 0x8}]}}, @AF_INET={0x18, 0x2, 0x0, 0x1, {0x14, 0x1, 0x0, 0x1, [{0x8, 0x4, 0x0, 0x0, 0x3ec}, {0x8, 0x12, 0x0, 0x0, 0x1f}]}}, @AF_BRIDGE={0x4}]}, @IFLA_PHYS_SWITCH_ID={0x23, 0x24, "e868dcc5dbe0e0966e8d09245d0bf36df0913e3d1f16e28a4f23ad16e6b8cf"}, @IFLA_MTU={0x8, 0x4, 0x7}, @IFLA_PROTO_DOWN={0x5, 0x27, 0x40}]}, 0x158}, 0x1, 0x0, 0x0, 0x240480c0}, 0x4044000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) mlock(&(0x7f0000411000/0x4000)=nil, 0x4000) set_mempolicy(0x0, &(0x7f00000004c0), 0x81) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000100)={0x0, 0x7ff, 0xcf, 0xb, 0x98}) set_mempolicy(0x4000, &(0x7f0000000240)=0x4, 0x1) r3 = shmget$private(0x0, 0x4000, 0x54001800, &(0x7f0000000000/0x4000)=nil) set_mempolicy(0x2, &(0x7f00000002c0)=0x5, 0x8) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r2, 0x4008941a, &(0x7f0000000480)) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000440), 0x2, &(0x7f000000d000/0x4000)=nil, 0x2) set_mempolicy(0x3, &(0x7f0000000400)=0x7, 0x1) shmat(r3, &(0x7f0000010000/0x1000)=nil, 0x4000) shmget$private(0x0, 0x2000, 0x80, &(0x7f0000003000/0x2000)=nil) [ 63.738780][ T3753] No such timeout policy "syz0" [ 63.777634][ T3756] No such timeout policy "syz0" 08:43:44 executing program 3: mlockall(0x1) mlockall(0x0) brk(0x55555ede5ffe) mlockall(0x1) mlockall(0x2) brk(0x0) 08:43:44 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed, 0x7}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = socket$rxrpc(0x21, 0x2, 0x2) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r1, 0x110, 0x4, 0x0, 0x100000004) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x15, 0x1ffffffffffffd7e, &(0x7f0000000640)=ANY=[@ANYRES16=r0, @ANYBLOB="000400109e338f3b4d2bb883627799fe60feb2706adb35e72ff1dfca8c5408ebb1f87acc2a14402140b548263ec445c5ffb74e9449b7f109f089572886f998ccccb8b2b6ab2258a4a41b65956aea8228a32931241d13c6299a64a1190e20df457a8fec030029553d50241df96958176c8220259c92c2bf57dfd44483edd32e110feb04a5f9723e574b3399828f5ed795bb623f", @ANYRESOCT=r1, @ANYRESHEX=r1], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0xa}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x402}, 0x10}, 0x80) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000008c0)={&(0x7f0000000740)=@getlink={0x158, 0x12, 0x708, 0x70bd2a, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x21109, 0x810}, [@IFLA_BROADCAST={0xa, 0x2, @random="fc12f04e3b5c"}, @IFLA_AF_SPEC={0xf8, 0x1a, 0x0, 0x1, [@AF_INET6={0x44, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @IFLA_INET6_TOKEN={0x14, 0x7, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x1f}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0xff}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x8}]}, @AF_BRIDGE={0x4}, @AF_BRIDGE={0x4}, @AF_INET={0x28, 0x2, 0x0, 0x1, {0x24, 0x1, 0x0, 0x1, [{0x8, 0x7, 0x0, 0x0, 0x10}, {0x8, 0x18, 0x0, 0x0, 0x5}, {0x8, 0xf, 0x0, 0x0, 0x1}, {0x8, 0xf, 0x0, 0x0, 0x3f}]}}, @AF_BRIDGE={0x4}, @AF_INET={0x28, 0x2, 0x0, 0x1, {0x24, 0x1, 0x0, 0x1, [{0x8, 0x9}, {0x8, 0xe, 0x0, 0x0, 0x6c}, {0x8, 0x1c, 0x0, 0x0, 0xc9c0}, {0x8, 0x7, 0x0, 0x0, 0x8}]}}, @AF_INET={0x38, 0x2, 0x0, 0x1, {0x34, 0x1, 0x0, 0x1, [{0x8, 0x12, 0x0, 0x0, 0x4}, {0x8, 0x1c, 0x0, 0x0, 0x8}, {0x8, 0x1b}, {0x8}, {0x8, 0xf, 0x0, 0x0, 0x7}, {0x8, 0x11, 0x0, 0x0, 0x8}]}}, @AF_INET={0x18, 0x2, 0x0, 0x1, {0x14, 0x1, 0x0, 0x1, [{0x8, 0x4, 0x0, 0x0, 0x3ec}, {0x8, 0x12, 0x0, 0x0, 0x1f}]}}, @AF_BRIDGE={0x4}]}, @IFLA_PHYS_SWITCH_ID={0x23, 0x24, "e868dcc5dbe0e0966e8d09245d0bf36df0913e3d1f16e28a4f23ad16e6b8cf"}, @IFLA_MTU={0x8, 0x4, 0x7}, @IFLA_PROTO_DOWN={0x5, 0x27, 0x40}]}, 0x158}, 0x1, 0x0, 0x0, 0x240480c0}, 0x4044000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) mlock(&(0x7f0000411000/0x4000)=nil, 0x4000) set_mempolicy(0x0, &(0x7f00000004c0), 0x81) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000100)={0x0, 0x7ff, 0xcf, 0xb, 0x98}) set_mempolicy(0x4000, &(0x7f0000000240)=0x4, 0x1) r3 = shmget$private(0x0, 0x4000, 0x54001800, &(0x7f0000000000/0x4000)=nil) set_mempolicy(0x2, &(0x7f00000002c0)=0x5, 0x8) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r2, 0x4008941a, &(0x7f0000000480)) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000440), 0x2, &(0x7f000000d000/0x4000)=nil, 0x2) set_mempolicy(0x3, &(0x7f0000000400)=0x7, 0x1) shmat(r3, &(0x7f0000010000/0x1000)=nil, 0x4000) shmget$private(0x0, 0x2000, 0x80, &(0x7f0000003000/0x2000)=nil) 08:43:44 executing program 5: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed, 0x7}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = socket$rxrpc(0x21, 0x2, 0x2) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r1, 0x110, 0x4, 0x0, 0x100000004) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x15, 0x1ffffffffffffd7e, &(0x7f0000000640)=ANY=[@ANYRES16=r0, @ANYBLOB="000400109e338f3b4d2bb883627799fe60feb2706adb35e72ff1dfca8c5408ebb1f87acc2a14402140b548263ec445c5ffb74e9449b7f109f089572886f998ccccb8b2b6ab2258a4a41b65956aea8228a32931241d13c6299a64a1190e20df457a8fec030029553d50241df96958176c8220259c92c2bf57dfd44483edd32e110feb04a5f9723e574b3399828f5ed795bb623f", @ANYRESOCT=r1, @ANYRESHEX=r1], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0xa}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x402}, 0x10}, 0x80) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000008c0)={&(0x7f0000000740)=@getlink={0x158, 0x12, 0x708, 0x70bd2a, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x21109, 0x810}, [@IFLA_BROADCAST={0xa, 0x2, @random="fc12f04e3b5c"}, @IFLA_AF_SPEC={0xf8, 0x1a, 0x0, 0x1, [@AF_INET6={0x44, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @IFLA_INET6_TOKEN={0x14, 0x7, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x1f}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0xff}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x8}]}, @AF_BRIDGE={0x4}, @AF_BRIDGE={0x4}, @AF_INET={0x28, 0x2, 0x0, 0x1, {0x24, 0x1, 0x0, 0x1, [{0x8, 0x7, 0x0, 0x0, 0x10}, {0x8, 0x18, 0x0, 0x0, 0x5}, {0x8, 0xf, 0x0, 0x0, 0x1}, {0x8, 0xf, 0x0, 0x0, 0x3f}]}}, @AF_BRIDGE={0x4}, @AF_INET={0x28, 0x2, 0x0, 0x1, {0x24, 0x1, 0x0, 0x1, [{0x8, 0x9}, {0x8, 0xe, 0x0, 0x0, 0x6c}, {0x8, 0x1c, 0x0, 0x0, 0xc9c0}, {0x8, 0x7, 0x0, 0x0, 0x8}]}}, @AF_INET={0x38, 0x2, 0x0, 0x1, {0x34, 0x1, 0x0, 0x1, [{0x8, 0x12, 0x0, 0x0, 0x4}, {0x8, 0x1c, 0x0, 0x0, 0x8}, {0x8, 0x1b}, {0x8}, {0x8, 0xf, 0x0, 0x0, 0x7}, {0x8, 0x11, 0x0, 0x0, 0x8}]}}, @AF_INET={0x18, 0x2, 0x0, 0x1, {0x14, 0x1, 0x0, 0x1, [{0x8, 0x4, 0x0, 0x0, 0x3ec}, {0x8, 0x12, 0x0, 0x0, 0x1f}]}}, @AF_BRIDGE={0x4}]}, @IFLA_PHYS_SWITCH_ID={0x23, 0x24, "e868dcc5dbe0e0966e8d09245d0bf36df0913e3d1f16e28a4f23ad16e6b8cf"}, @IFLA_MTU={0x8, 0x4, 0x7}, @IFLA_PROTO_DOWN={0x5, 0x27, 0x40}]}, 0x158}, 0x1, 0x0, 0x0, 0x240480c0}, 0x4044000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) mlock(&(0x7f0000411000/0x4000)=nil, 0x4000) set_mempolicy(0x0, &(0x7f00000004c0), 0x81) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000100)={0x0, 0x7ff, 0xcf, 0xb, 0x98}) set_mempolicy(0x4000, &(0x7f0000000240)=0x4, 0x1) r3 = shmget$private(0x0, 0x4000, 0x54001800, &(0x7f0000000000/0x4000)=nil) set_mempolicy(0x2, &(0x7f00000002c0)=0x5, 0x8) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r2, 0x4008941a, &(0x7f0000000480)) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000440), 0x2, &(0x7f000000d000/0x4000)=nil, 0x2) set_mempolicy(0x3, &(0x7f0000000400)=0x7, 0x1) shmat(r3, &(0x7f0000010000/0x1000)=nil, 0x4000) shmget$private(0x0, 0x2000, 0x80, &(0x7f0000003000/0x2000)=nil) 08:43:44 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed, 0x7}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = socket$rxrpc(0x21, 0x2, 0x2) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r1, 0x110, 0x4, 0x0, 0x100000004) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x15, 0x1ffffffffffffd7e, &(0x7f0000000640)=ANY=[@ANYRES16=r0, @ANYBLOB="000400109e338f3b4d2bb883627799fe60feb2706adb35e72ff1dfca8c5408ebb1f87acc2a14402140b548263ec445c5ffb74e9449b7f109f089572886f998ccccb8b2b6ab2258a4a41b65956aea8228a32931241d13c6299a64a1190e20df457a8fec030029553d50241df96958176c8220259c92c2bf57dfd44483edd32e110feb04a5f9723e574b3399828f5ed795bb623f", @ANYRESOCT=r1, @ANYRESHEX=r1], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0xa}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x402}, 0x10}, 0x80) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000008c0)={&(0x7f0000000740)=@getlink={0x158, 0x12, 0x708, 0x70bd2a, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x21109, 0x810}, [@IFLA_BROADCAST={0xa, 0x2, @random="fc12f04e3b5c"}, @IFLA_AF_SPEC={0xf8, 0x1a, 0x0, 0x1, [@AF_INET6={0x44, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @IFLA_INET6_TOKEN={0x14, 0x7, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x1f}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0xff}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x8}]}, @AF_BRIDGE={0x4}, @AF_BRIDGE={0x4}, @AF_INET={0x28, 0x2, 0x0, 0x1, {0x24, 0x1, 0x0, 0x1, [{0x8, 0x7, 0x0, 0x0, 0x10}, {0x8, 0x18, 0x0, 0x0, 0x5}, {0x8, 0xf, 0x0, 0x0, 0x1}, {0x8, 0xf, 0x0, 0x0, 0x3f}]}}, @AF_BRIDGE={0x4}, @AF_INET={0x28, 0x2, 0x0, 0x1, {0x24, 0x1, 0x0, 0x1, [{0x8, 0x9}, {0x8, 0xe, 0x0, 0x0, 0x6c}, {0x8, 0x1c, 0x0, 0x0, 0xc9c0}, {0x8, 0x7, 0x0, 0x0, 0x8}]}}, @AF_INET={0x38, 0x2, 0x0, 0x1, {0x34, 0x1, 0x0, 0x1, [{0x8, 0x12, 0x0, 0x0, 0x4}, {0x8, 0x1c, 0x0, 0x0, 0x8}, {0x8, 0x1b}, {0x8}, {0x8, 0xf, 0x0, 0x0, 0x7}, {0x8, 0x11, 0x0, 0x0, 0x8}]}}, @AF_INET={0x18, 0x2, 0x0, 0x1, {0x14, 0x1, 0x0, 0x1, [{0x8, 0x4, 0x0, 0x0, 0x3ec}, {0x8, 0x12, 0x0, 0x0, 0x1f}]}}, @AF_BRIDGE={0x4}]}, @IFLA_PHYS_SWITCH_ID={0x23, 0x24, "e868dcc5dbe0e0966e8d09245d0bf36df0913e3d1f16e28a4f23ad16e6b8cf"}, @IFLA_MTU={0x8, 0x4, 0x7}, @IFLA_PROTO_DOWN={0x5, 0x27, 0x40}]}, 0x158}, 0x1, 0x0, 0x0, 0x240480c0}, 0x4044000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) mlock(&(0x7f0000411000/0x4000)=nil, 0x4000) set_mempolicy(0x0, &(0x7f00000004c0), 0x81) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000100)={0x0, 0x7ff, 0xcf, 0xb, 0x98}) set_mempolicy(0x4000, &(0x7f0000000240)=0x4, 0x1) r3 = shmget$private(0x0, 0x4000, 0x54001800, &(0x7f0000000000/0x4000)=nil) set_mempolicy(0x2, &(0x7f00000002c0)=0x5, 0x8) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r2, 0x4008941a, &(0x7f0000000480)) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000440), 0x2, &(0x7f000000d000/0x4000)=nil, 0x2) set_mempolicy(0x3, &(0x7f0000000400)=0x7, 0x1) shmat(r3, &(0x7f0000010000/0x1000)=nil, 0x4000) shmget$private(0x0, 0x2000, 0x80, &(0x7f0000003000/0x2000)=nil) [ 64.022516][ T3762] No such timeout policy "syz0" [ 64.024358][ T3763] No such timeout policy "syz0" 08:43:44 executing program 4: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed, 0x7}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = socket$rxrpc(0x21, 0x2, 0x2) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r1, 0x110, 0x4, 0x0, 0x100000004) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x15, 0x1ffffffffffffd7e, &(0x7f0000000640)=ANY=[@ANYRES16=r0, @ANYBLOB="000400109e338f3b4d2bb883627799fe60feb2706adb35e72ff1dfca8c5408ebb1f87acc2a14402140b548263ec445c5ffb74e9449b7f109f089572886f998ccccb8b2b6ab2258a4a41b65956aea8228a32931241d13c6299a64a1190e20df457a8fec030029553d50241df96958176c8220259c92c2bf57dfd44483edd32e110feb04a5f9723e574b3399828f5ed795bb623f", @ANYRESOCT=r1, @ANYRESHEX=r1], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0xa}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x402}, 0x10}, 0x80) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000008c0)={&(0x7f0000000740)=@getlink={0x158, 0x12, 0x708, 0x70bd2a, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x21109, 0x810}, [@IFLA_BROADCAST={0xa, 0x2, @random="fc12f04e3b5c"}, @IFLA_AF_SPEC={0xf8, 0x1a, 0x0, 0x1, [@AF_INET6={0x44, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @IFLA_INET6_TOKEN={0x14, 0x7, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x1f}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0xff}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x8}]}, @AF_BRIDGE={0x4}, @AF_BRIDGE={0x4}, @AF_INET={0x28, 0x2, 0x0, 0x1, {0x24, 0x1, 0x0, 0x1, [{0x8, 0x7, 0x0, 0x0, 0x10}, {0x8, 0x18, 0x0, 0x0, 0x5}, {0x8, 0xf, 0x0, 0x0, 0x1}, {0x8, 0xf, 0x0, 0x0, 0x3f}]}}, @AF_BRIDGE={0x4}, @AF_INET={0x28, 0x2, 0x0, 0x1, {0x24, 0x1, 0x0, 0x1, [{0x8, 0x9}, {0x8, 0xe, 0x0, 0x0, 0x6c}, {0x8, 0x1c, 0x0, 0x0, 0xc9c0}, {0x8, 0x7, 0x0, 0x0, 0x8}]}}, @AF_INET={0x38, 0x2, 0x0, 0x1, {0x34, 0x1, 0x0, 0x1, [{0x8, 0x12, 0x0, 0x0, 0x4}, {0x8, 0x1c, 0x0, 0x0, 0x8}, {0x8, 0x1b}, {0x8}, {0x8, 0xf, 0x0, 0x0, 0x7}, {0x8, 0x11, 0x0, 0x0, 0x8}]}}, @AF_INET={0x18, 0x2, 0x0, 0x1, {0x14, 0x1, 0x0, 0x1, [{0x8, 0x4, 0x0, 0x0, 0x3ec}, {0x8, 0x12, 0x0, 0x0, 0x1f}]}}, @AF_BRIDGE={0x4}]}, @IFLA_PHYS_SWITCH_ID={0x23, 0x24, "e868dcc5dbe0e0966e8d09245d0bf36df0913e3d1f16e28a4f23ad16e6b8cf"}, @IFLA_MTU={0x8, 0x4, 0x7}, @IFLA_PROTO_DOWN={0x5, 0x27, 0x40}]}, 0x158}, 0x1, 0x0, 0x0, 0x240480c0}, 0x4044000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) mlock(&(0x7f0000411000/0x4000)=nil, 0x4000) set_mempolicy(0x0, &(0x7f00000004c0), 0x81) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000100)={0x0, 0x7ff, 0xcf, 0xb, 0x98}) set_mempolicy(0x4000, &(0x7f0000000240)=0x4, 0x1) r3 = shmget$private(0x0, 0x4000, 0x54001800, &(0x7f0000000000/0x4000)=nil) set_mempolicy(0x2, &(0x7f00000002c0)=0x5, 0x8) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r2, 0x4008941a, &(0x7f0000000480)) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000440), 0x2, &(0x7f000000d000/0x4000)=nil, 0x2) set_mempolicy(0x3, &(0x7f0000000400)=0x7, 0x1) shmat(r3, &(0x7f0000010000/0x1000)=nil, 0x4000) shmget$private(0x0, 0x2000, 0x80, &(0x7f0000003000/0x2000)=nil) 08:43:44 executing program 0: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed, 0x7}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = socket$rxrpc(0x21, 0x2, 0x2) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r1, 0x110, 0x4, 0x0, 0x100000004) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x15, 0x1ffffffffffffd7e, &(0x7f0000000640)=ANY=[@ANYRES16=r0, @ANYBLOB="000400109e338f3b4d2bb883627799fe60feb2706adb35e72ff1dfca8c5408ebb1f87acc2a14402140b548263ec445c5ffb74e9449b7f109f089572886f998ccccb8b2b6ab2258a4a41b65956aea8228a32931241d13c6299a64a1190e20df457a8fec030029553d50241df96958176c8220259c92c2bf57dfd44483edd32e110feb04a5f9723e574b3399828f5ed795bb623f", @ANYRESOCT=r1, @ANYRESHEX=r1], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0xa}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x402}, 0x10}, 0x80) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000008c0)={&(0x7f0000000740)=@getlink={0x158, 0x12, 0x708, 0x70bd2a, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x21109, 0x810}, [@IFLA_BROADCAST={0xa, 0x2, @random="fc12f04e3b5c"}, @IFLA_AF_SPEC={0xf8, 0x1a, 0x0, 0x1, [@AF_INET6={0x44, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @IFLA_INET6_TOKEN={0x14, 0x7, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x1f}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0xff}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x8}]}, @AF_BRIDGE={0x4}, @AF_BRIDGE={0x4}, @AF_INET={0x28, 0x2, 0x0, 0x1, {0x24, 0x1, 0x0, 0x1, [{0x8, 0x7, 0x0, 0x0, 0x10}, {0x8, 0x18, 0x0, 0x0, 0x5}, {0x8, 0xf, 0x0, 0x0, 0x1}, {0x8, 0xf, 0x0, 0x0, 0x3f}]}}, @AF_BRIDGE={0x4}, @AF_INET={0x28, 0x2, 0x0, 0x1, {0x24, 0x1, 0x0, 0x1, [{0x8, 0x9}, {0x8, 0xe, 0x0, 0x0, 0x6c}, {0x8, 0x1c, 0x0, 0x0, 0xc9c0}, {0x8, 0x7, 0x0, 0x0, 0x8}]}}, @AF_INET={0x38, 0x2, 0x0, 0x1, {0x34, 0x1, 0x0, 0x1, [{0x8, 0x12, 0x0, 0x0, 0x4}, {0x8, 0x1c, 0x0, 0x0, 0x8}, {0x8, 0x1b}, {0x8}, {0x8, 0xf, 0x0, 0x0, 0x7}, {0x8, 0x11, 0x0, 0x0, 0x8}]}}, @AF_INET={0x18, 0x2, 0x0, 0x1, {0x14, 0x1, 0x0, 0x1, [{0x8, 0x4, 0x0, 0x0, 0x3ec}, {0x8, 0x12, 0x0, 0x0, 0x1f}]}}, @AF_BRIDGE={0x4}]}, @IFLA_PHYS_SWITCH_ID={0x23, 0x24, "e868dcc5dbe0e0966e8d09245d0bf36df0913e3d1f16e28a4f23ad16e6b8cf"}, @IFLA_MTU={0x8, 0x4, 0x7}, @IFLA_PROTO_DOWN={0x5, 0x27, 0x40}]}, 0x158}, 0x1, 0x0, 0x0, 0x240480c0}, 0x4044000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) mlock(&(0x7f0000411000/0x4000)=nil, 0x4000) set_mempolicy(0x0, &(0x7f00000004c0), 0x81) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000100)={0x0, 0x7ff, 0xcf, 0xb, 0x98}) set_mempolicy(0x4000, &(0x7f0000000240)=0x4, 0x1) r3 = shmget$private(0x0, 0x4000, 0x54001800, &(0x7f0000000000/0x4000)=nil) set_mempolicy(0x2, &(0x7f00000002c0)=0x5, 0x8) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r2, 0x4008941a, &(0x7f0000000480)) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000440), 0x2, &(0x7f000000d000/0x4000)=nil, 0x2) set_mempolicy(0x3, &(0x7f0000000400)=0x7, 0x1) shmat(r3, &(0x7f0000010000/0x1000)=nil, 0x4000) shmget$private(0x0, 0x2000, 0x80, &(0x7f0000003000/0x2000)=nil) 08:43:44 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed, 0x7}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = socket$rxrpc(0x21, 0x2, 0x2) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r1, 0x110, 0x4, 0x0, 0x100000004) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x15, 0x1ffffffffffffd7e, &(0x7f0000000640)=ANY=[@ANYRES16=r0, @ANYBLOB="000400109e338f3b4d2bb883627799fe60feb2706adb35e72ff1dfca8c5408ebb1f87acc2a14402140b548263ec445c5ffb74e9449b7f109f089572886f998ccccb8b2b6ab2258a4a41b65956aea8228a32931241d13c6299a64a1190e20df457a8fec030029553d50241df96958176c8220259c92c2bf57dfd44483edd32e110feb04a5f9723e574b3399828f5ed795bb623f", @ANYRESOCT=r1, @ANYRESHEX=r1], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0xa}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x402}, 0x10}, 0x80) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000008c0)={&(0x7f0000000740)=@getlink={0x158, 0x12, 0x708, 0x70bd2a, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x21109, 0x810}, [@IFLA_BROADCAST={0xa, 0x2, @random="fc12f04e3b5c"}, @IFLA_AF_SPEC={0xf8, 0x1a, 0x0, 0x1, [@AF_INET6={0x44, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @IFLA_INET6_TOKEN={0x14, 0x7, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x1f}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0xff}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x8}]}, @AF_BRIDGE={0x4}, @AF_BRIDGE={0x4}, @AF_INET={0x28, 0x2, 0x0, 0x1, {0x24, 0x1, 0x0, 0x1, [{0x8, 0x7, 0x0, 0x0, 0x10}, {0x8, 0x18, 0x0, 0x0, 0x5}, {0x8, 0xf, 0x0, 0x0, 0x1}, {0x8, 0xf, 0x0, 0x0, 0x3f}]}}, @AF_BRIDGE={0x4}, @AF_INET={0x28, 0x2, 0x0, 0x1, {0x24, 0x1, 0x0, 0x1, [{0x8, 0x9}, {0x8, 0xe, 0x0, 0x0, 0x6c}, {0x8, 0x1c, 0x0, 0x0, 0xc9c0}, {0x8, 0x7, 0x0, 0x0, 0x8}]}}, @AF_INET={0x38, 0x2, 0x0, 0x1, {0x34, 0x1, 0x0, 0x1, [{0x8, 0x12, 0x0, 0x0, 0x4}, {0x8, 0x1c, 0x0, 0x0, 0x8}, {0x8, 0x1b}, {0x8}, {0x8, 0xf, 0x0, 0x0, 0x7}, {0x8, 0x11, 0x0, 0x0, 0x8}]}}, @AF_INET={0x18, 0x2, 0x0, 0x1, {0x14, 0x1, 0x0, 0x1, [{0x8, 0x4, 0x0, 0x0, 0x3ec}, {0x8, 0x12, 0x0, 0x0, 0x1f}]}}, @AF_BRIDGE={0x4}]}, @IFLA_PHYS_SWITCH_ID={0x23, 0x24, "e868dcc5dbe0e0966e8d09245d0bf36df0913e3d1f16e28a4f23ad16e6b8cf"}, @IFLA_MTU={0x8, 0x4, 0x7}, @IFLA_PROTO_DOWN={0x5, 0x27, 0x40}]}, 0x158}, 0x1, 0x0, 0x0, 0x240480c0}, 0x4044000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) mlock(&(0x7f0000411000/0x4000)=nil, 0x4000) set_mempolicy(0x0, &(0x7f00000004c0), 0x81) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000100)={0x0, 0x7ff, 0xcf, 0xb, 0x98}) set_mempolicy(0x4000, &(0x7f0000000240)=0x4, 0x1) r3 = shmget$private(0x0, 0x4000, 0x54001800, &(0x7f0000000000/0x4000)=nil) set_mempolicy(0x2, &(0x7f00000002c0)=0x5, 0x8) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r2, 0x4008941a, &(0x7f0000000480)) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000440), 0x2, &(0x7f000000d000/0x4000)=nil, 0x2) set_mempolicy(0x3, &(0x7f0000000400)=0x7, 0x1) shmat(r3, &(0x7f0000010000/0x1000)=nil, 0x4000) shmget$private(0x0, 0x2000, 0x80, &(0x7f0000003000/0x2000)=nil) 08:43:44 executing program 5: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed, 0x7}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = socket$rxrpc(0x21, 0x2, 0x2) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r1, 0x110, 0x4, 0x0, 0x100000004) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x15, 0x1ffffffffffffd7e, &(0x7f0000000640)=ANY=[@ANYRES16=r0, @ANYBLOB="000400109e338f3b4d2bb883627799fe60feb2706adb35e72ff1dfca8c5408ebb1f87acc2a14402140b548263ec445c5ffb74e9449b7f109f089572886f998ccccb8b2b6ab2258a4a41b65956aea8228a32931241d13c6299a64a1190e20df457a8fec030029553d50241df96958176c8220259c92c2bf57dfd44483edd32e110feb04a5f9723e574b3399828f5ed795bb623f", @ANYRESOCT=r1, @ANYRESHEX=r1], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0xa}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x402}, 0x10}, 0x80) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000008c0)={&(0x7f0000000740)=@getlink={0x158, 0x12, 0x708, 0x70bd2a, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x21109, 0x810}, [@IFLA_BROADCAST={0xa, 0x2, @random="fc12f04e3b5c"}, @IFLA_AF_SPEC={0xf8, 0x1a, 0x0, 0x1, [@AF_INET6={0x44, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @IFLA_INET6_TOKEN={0x14, 0x7, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x1f}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0xff}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x8}]}, @AF_BRIDGE={0x4}, @AF_BRIDGE={0x4}, @AF_INET={0x28, 0x2, 0x0, 0x1, {0x24, 0x1, 0x0, 0x1, [{0x8, 0x7, 0x0, 0x0, 0x10}, {0x8, 0x18, 0x0, 0x0, 0x5}, {0x8, 0xf, 0x0, 0x0, 0x1}, {0x8, 0xf, 0x0, 0x0, 0x3f}]}}, @AF_BRIDGE={0x4}, @AF_INET={0x28, 0x2, 0x0, 0x1, {0x24, 0x1, 0x0, 0x1, [{0x8, 0x9}, {0x8, 0xe, 0x0, 0x0, 0x6c}, {0x8, 0x1c, 0x0, 0x0, 0xc9c0}, {0x8, 0x7, 0x0, 0x0, 0x8}]}}, @AF_INET={0x38, 0x2, 0x0, 0x1, {0x34, 0x1, 0x0, 0x1, [{0x8, 0x12, 0x0, 0x0, 0x4}, {0x8, 0x1c, 0x0, 0x0, 0x8}, {0x8, 0x1b}, {0x8}, {0x8, 0xf, 0x0, 0x0, 0x7}, {0x8, 0x11, 0x0, 0x0, 0x8}]}}, @AF_INET={0x18, 0x2, 0x0, 0x1, {0x14, 0x1, 0x0, 0x1, [{0x8, 0x4, 0x0, 0x0, 0x3ec}, {0x8, 0x12, 0x0, 0x0, 0x1f}]}}, @AF_BRIDGE={0x4}]}, @IFLA_PHYS_SWITCH_ID={0x23, 0x24, "e868dcc5dbe0e0966e8d09245d0bf36df0913e3d1f16e28a4f23ad16e6b8cf"}, @IFLA_MTU={0x8, 0x4, 0x7}, @IFLA_PROTO_DOWN={0x5, 0x27, 0x40}]}, 0x158}, 0x1, 0x0, 0x0, 0x240480c0}, 0x4044000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) mlock(&(0x7f0000411000/0x4000)=nil, 0x4000) set_mempolicy(0x0, &(0x7f00000004c0), 0x81) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000100)={0x0, 0x7ff, 0xcf, 0xb, 0x98}) set_mempolicy(0x4000, &(0x7f0000000240)=0x4, 0x1) r3 = shmget$private(0x0, 0x4000, 0x54001800, &(0x7f0000000000/0x4000)=nil) set_mempolicy(0x2, &(0x7f00000002c0)=0x5, 0x8) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r2, 0x4008941a, &(0x7f0000000480)) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000440), 0x2, &(0x7f000000d000/0x4000)=nil, 0x2) set_mempolicy(0x3, &(0x7f0000000400)=0x7, 0x1) shmat(r3, &(0x7f0000010000/0x1000)=nil, 0x4000) shmget$private(0x0, 0x2000, 0x80, &(0x7f0000003000/0x2000)=nil) 08:43:44 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed, 0x7}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = socket$rxrpc(0x21, 0x2, 0x2) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r1, 0x110, 0x4, 0x0, 0x100000004) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x15, 0x1ffffffffffffd7e, &(0x7f0000000640)=ANY=[@ANYRES16=r0, @ANYBLOB="000400109e338f3b4d2bb883627799fe60feb2706adb35e72ff1dfca8c5408ebb1f87acc2a14402140b548263ec445c5ffb74e9449b7f109f089572886f998ccccb8b2b6ab2258a4a41b65956aea8228a32931241d13c6299a64a1190e20df457a8fec030029553d50241df96958176c8220259c92c2bf57dfd44483edd32e110feb04a5f9723e574b3399828f5ed795bb623f", @ANYRESOCT=r1, @ANYRESHEX=r1], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0xa}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x402}, 0x10}, 0x80) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000008c0)={&(0x7f0000000740)=@getlink={0x158, 0x12, 0x708, 0x70bd2a, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x21109, 0x810}, [@IFLA_BROADCAST={0xa, 0x2, @random="fc12f04e3b5c"}, @IFLA_AF_SPEC={0xf8, 0x1a, 0x0, 0x1, [@AF_INET6={0x44, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @IFLA_INET6_TOKEN={0x14, 0x7, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x1f}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0xff}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x8}]}, @AF_BRIDGE={0x4}, @AF_BRIDGE={0x4}, @AF_INET={0x28, 0x2, 0x0, 0x1, {0x24, 0x1, 0x0, 0x1, [{0x8, 0x7, 0x0, 0x0, 0x10}, {0x8, 0x18, 0x0, 0x0, 0x5}, {0x8, 0xf, 0x0, 0x0, 0x1}, {0x8, 0xf, 0x0, 0x0, 0x3f}]}}, @AF_BRIDGE={0x4}, @AF_INET={0x28, 0x2, 0x0, 0x1, {0x24, 0x1, 0x0, 0x1, [{0x8, 0x9}, {0x8, 0xe, 0x0, 0x0, 0x6c}, {0x8, 0x1c, 0x0, 0x0, 0xc9c0}, {0x8, 0x7, 0x0, 0x0, 0x8}]}}, @AF_INET={0x38, 0x2, 0x0, 0x1, {0x34, 0x1, 0x0, 0x1, [{0x8, 0x12, 0x0, 0x0, 0x4}, {0x8, 0x1c, 0x0, 0x0, 0x8}, {0x8, 0x1b}, {0x8}, {0x8, 0xf, 0x0, 0x0, 0x7}, {0x8, 0x11, 0x0, 0x0, 0x8}]}}, @AF_INET={0x18, 0x2, 0x0, 0x1, {0x14, 0x1, 0x0, 0x1, [{0x8, 0x4, 0x0, 0x0, 0x3ec}, {0x8, 0x12, 0x0, 0x0, 0x1f}]}}, @AF_BRIDGE={0x4}]}, @IFLA_PHYS_SWITCH_ID={0x23, 0x24, "e868dcc5dbe0e0966e8d09245d0bf36df0913e3d1f16e28a4f23ad16e6b8cf"}, @IFLA_MTU={0x8, 0x4, 0x7}, @IFLA_PROTO_DOWN={0x5, 0x27, 0x40}]}, 0x158}, 0x1, 0x0, 0x0, 0x240480c0}, 0x4044000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) mlock(&(0x7f0000411000/0x4000)=nil, 0x4000) set_mempolicy(0x0, &(0x7f00000004c0), 0x81) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000100)={0x0, 0x7ff, 0xcf, 0xb, 0x98}) set_mempolicy(0x4000, &(0x7f0000000240)=0x4, 0x1) r3 = shmget$private(0x0, 0x4000, 0x54001800, &(0x7f0000000000/0x4000)=nil) set_mempolicy(0x2, &(0x7f00000002c0)=0x5, 0x8) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r2, 0x4008941a, &(0x7f0000000480)) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000440), 0x2, &(0x7f000000d000/0x4000)=nil, 0x2) set_mempolicy(0x3, &(0x7f0000000400)=0x7, 0x1) shmat(r3, &(0x7f0000010000/0x1000)=nil, 0x4000) shmget$private(0x0, 0x2000, 0x80, &(0x7f0000003000/0x2000)=nil) 08:43:44 executing program 5: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed, 0x7}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = socket$rxrpc(0x21, 0x2, 0x2) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r1, 0x110, 0x4, 0x0, 0x100000004) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x15, 0x1ffffffffffffd7e, &(0x7f0000000640)=ANY=[@ANYRES16=r0, @ANYBLOB="000400109e338f3b4d2bb883627799fe60feb2706adb35e72ff1dfca8c5408ebb1f87acc2a14402140b548263ec445c5ffb74e9449b7f109f089572886f998ccccb8b2b6ab2258a4a41b65956aea8228a32931241d13c6299a64a1190e20df457a8fec030029553d50241df96958176c8220259c92c2bf57dfd44483edd32e110feb04a5f9723e574b3399828f5ed795bb623f", @ANYRESOCT=r1, @ANYRESHEX=r1], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0xa}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x402}, 0x10}, 0x80) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000008c0)={&(0x7f0000000740)=@getlink={0x158, 0x12, 0x708, 0x70bd2a, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x21109, 0x810}, [@IFLA_BROADCAST={0xa, 0x2, @random="fc12f04e3b5c"}, @IFLA_AF_SPEC={0xf8, 0x1a, 0x0, 0x1, [@AF_INET6={0x44, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @IFLA_INET6_TOKEN={0x14, 0x7, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x1f}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0xff}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x8}]}, @AF_BRIDGE={0x4}, @AF_BRIDGE={0x4}, @AF_INET={0x28, 0x2, 0x0, 0x1, {0x24, 0x1, 0x0, 0x1, [{0x8, 0x7, 0x0, 0x0, 0x10}, {0x8, 0x18, 0x0, 0x0, 0x5}, {0x8, 0xf, 0x0, 0x0, 0x1}, {0x8, 0xf, 0x0, 0x0, 0x3f}]}}, @AF_BRIDGE={0x4}, @AF_INET={0x28, 0x2, 0x0, 0x1, {0x24, 0x1, 0x0, 0x1, [{0x8, 0x9}, {0x8, 0xe, 0x0, 0x0, 0x6c}, {0x8, 0x1c, 0x0, 0x0, 0xc9c0}, {0x8, 0x7, 0x0, 0x0, 0x8}]}}, @AF_INET={0x38, 0x2, 0x0, 0x1, {0x34, 0x1, 0x0, 0x1, [{0x8, 0x12, 0x0, 0x0, 0x4}, {0x8, 0x1c, 0x0, 0x0, 0x8}, {0x8, 0x1b}, {0x8}, {0x8, 0xf, 0x0, 0x0, 0x7}, {0x8, 0x11, 0x0, 0x0, 0x8}]}}, @AF_INET={0x18, 0x2, 0x0, 0x1, {0x14, 0x1, 0x0, 0x1, [{0x8, 0x4, 0x0, 0x0, 0x3ec}, {0x8, 0x12, 0x0, 0x0, 0x1f}]}}, @AF_BRIDGE={0x4}]}, @IFLA_PHYS_SWITCH_ID={0x23, 0x24, "e868dcc5dbe0e0966e8d09245d0bf36df0913e3d1f16e28a4f23ad16e6b8cf"}, @IFLA_MTU={0x8, 0x4, 0x7}, @IFLA_PROTO_DOWN={0x5, 0x27, 0x40}]}, 0x158}, 0x1, 0x0, 0x0, 0x240480c0}, 0x4044000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) mlock(&(0x7f0000411000/0x4000)=nil, 0x4000) set_mempolicy(0x0, &(0x7f00000004c0), 0x81) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000100)={0x0, 0x7ff, 0xcf, 0xb, 0x98}) set_mempolicy(0x4000, &(0x7f0000000240)=0x4, 0x1) r3 = shmget$private(0x0, 0x4000, 0x54001800, &(0x7f0000000000/0x4000)=nil) set_mempolicy(0x2, &(0x7f00000002c0)=0x5, 0x8) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r2, 0x4008941a, &(0x7f0000000480)) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000440), 0x2, &(0x7f000000d000/0x4000)=nil, 0x2) set_mempolicy(0x3, &(0x7f0000000400)=0x7, 0x1) shmat(r3, &(0x7f0000010000/0x1000)=nil, 0x4000) shmget$private(0x0, 0x2000, 0x80, &(0x7f0000003000/0x2000)=nil) 08:43:44 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed, 0x7}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = socket$rxrpc(0x21, 0x2, 0x2) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r1, 0x110, 0x4, 0x0, 0x100000004) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x15, 0x1ffffffffffffd7e, &(0x7f0000000640)=ANY=[@ANYRES16=r0, @ANYBLOB="000400109e338f3b4d2bb883627799fe60feb2706adb35e72ff1dfca8c5408ebb1f87acc2a14402140b548263ec445c5ffb74e9449b7f109f089572886f998ccccb8b2b6ab2258a4a41b65956aea8228a32931241d13c6299a64a1190e20df457a8fec030029553d50241df96958176c8220259c92c2bf57dfd44483edd32e110feb04a5f9723e574b3399828f5ed795bb623f", @ANYRESOCT=r1, @ANYRESHEX=r1], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0xa}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x402}, 0x10}, 0x80) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000008c0)={&(0x7f0000000740)=@getlink={0x158, 0x12, 0x708, 0x70bd2a, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x21109, 0x810}, [@IFLA_BROADCAST={0xa, 0x2, @random="fc12f04e3b5c"}, @IFLA_AF_SPEC={0xf8, 0x1a, 0x0, 0x1, [@AF_INET6={0x44, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @IFLA_INET6_TOKEN={0x14, 0x7, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x1f}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0xff}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x8}]}, @AF_BRIDGE={0x4}, @AF_BRIDGE={0x4}, @AF_INET={0x28, 0x2, 0x0, 0x1, {0x24, 0x1, 0x0, 0x1, [{0x8, 0x7, 0x0, 0x0, 0x10}, {0x8, 0x18, 0x0, 0x0, 0x5}, {0x8, 0xf, 0x0, 0x0, 0x1}, {0x8, 0xf, 0x0, 0x0, 0x3f}]}}, @AF_BRIDGE={0x4}, @AF_INET={0x28, 0x2, 0x0, 0x1, {0x24, 0x1, 0x0, 0x1, [{0x8, 0x9}, {0x8, 0xe, 0x0, 0x0, 0x6c}, {0x8, 0x1c, 0x0, 0x0, 0xc9c0}, {0x8, 0x7, 0x0, 0x0, 0x8}]}}, @AF_INET={0x38, 0x2, 0x0, 0x1, {0x34, 0x1, 0x0, 0x1, [{0x8, 0x12, 0x0, 0x0, 0x4}, {0x8, 0x1c, 0x0, 0x0, 0x8}, {0x8, 0x1b}, {0x8}, {0x8, 0xf, 0x0, 0x0, 0x7}, {0x8, 0x11, 0x0, 0x0, 0x8}]}}, @AF_INET={0x18, 0x2, 0x0, 0x1, {0x14, 0x1, 0x0, 0x1, [{0x8, 0x4, 0x0, 0x0, 0x3ec}, {0x8, 0x12, 0x0, 0x0, 0x1f}]}}, @AF_BRIDGE={0x4}]}, @IFLA_PHYS_SWITCH_ID={0x23, 0x24, "e868dcc5dbe0e0966e8d09245d0bf36df0913e3d1f16e28a4f23ad16e6b8cf"}, @IFLA_MTU={0x8, 0x4, 0x7}, @IFLA_PROTO_DOWN={0x5, 0x27, 0x40}]}, 0x158}, 0x1, 0x0, 0x0, 0x240480c0}, 0x4044000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) mlock(&(0x7f0000411000/0x4000)=nil, 0x4000) set_mempolicy(0x0, &(0x7f00000004c0), 0x81) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000100)={0x0, 0x7ff, 0xcf, 0xb, 0x98}) set_mempolicy(0x4000, &(0x7f0000000240)=0x4, 0x1) r3 = shmget$private(0x0, 0x4000, 0x54001800, &(0x7f0000000000/0x4000)=nil) set_mempolicy(0x2, &(0x7f00000002c0)=0x5, 0x8) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r2, 0x4008941a, &(0x7f0000000480)) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000440), 0x2, &(0x7f000000d000/0x4000)=nil, 0x2) set_mempolicy(0x3, &(0x7f0000000400)=0x7, 0x1) shmat(r3, &(0x7f0000010000/0x1000)=nil, 0x4000) shmget$private(0x0, 0x2000, 0x80, &(0x7f0000003000/0x2000)=nil) 08:43:44 executing program 0: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed, 0x7}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = socket$rxrpc(0x21, 0x2, 0x2) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r1, 0x110, 0x4, 0x0, 0x100000004) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x15, 0x1ffffffffffffd7e, &(0x7f0000000640)=ANY=[@ANYRES16=r0, @ANYBLOB="000400109e338f3b4d2bb883627799fe60feb2706adb35e72ff1dfca8c5408ebb1f87acc2a14402140b548263ec445c5ffb74e9449b7f109f089572886f998ccccb8b2b6ab2258a4a41b65956aea8228a32931241d13c6299a64a1190e20df457a8fec030029553d50241df96958176c8220259c92c2bf57dfd44483edd32e110feb04a5f9723e574b3399828f5ed795bb623f", @ANYRESOCT=r1, @ANYRESHEX=r1], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0xa}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x402}, 0x10}, 0x80) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000008c0)={&(0x7f0000000740)=@getlink={0x158, 0x12, 0x708, 0x70bd2a, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x21109, 0x810}, [@IFLA_BROADCAST={0xa, 0x2, @random="fc12f04e3b5c"}, @IFLA_AF_SPEC={0xf8, 0x1a, 0x0, 0x1, [@AF_INET6={0x44, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @IFLA_INET6_TOKEN={0x14, 0x7, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x1f}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0xff}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x8}]}, @AF_BRIDGE={0x4}, @AF_BRIDGE={0x4}, @AF_INET={0x28, 0x2, 0x0, 0x1, {0x24, 0x1, 0x0, 0x1, [{0x8, 0x7, 0x0, 0x0, 0x10}, {0x8, 0x18, 0x0, 0x0, 0x5}, {0x8, 0xf, 0x0, 0x0, 0x1}, {0x8, 0xf, 0x0, 0x0, 0x3f}]}}, @AF_BRIDGE={0x4}, @AF_INET={0x28, 0x2, 0x0, 0x1, {0x24, 0x1, 0x0, 0x1, [{0x8, 0x9}, {0x8, 0xe, 0x0, 0x0, 0x6c}, {0x8, 0x1c, 0x0, 0x0, 0xc9c0}, {0x8, 0x7, 0x0, 0x0, 0x8}]}}, @AF_INET={0x38, 0x2, 0x0, 0x1, {0x34, 0x1, 0x0, 0x1, [{0x8, 0x12, 0x0, 0x0, 0x4}, {0x8, 0x1c, 0x0, 0x0, 0x8}, {0x8, 0x1b}, {0x8}, {0x8, 0xf, 0x0, 0x0, 0x7}, {0x8, 0x11, 0x0, 0x0, 0x8}]}}, @AF_INET={0x18, 0x2, 0x0, 0x1, {0x14, 0x1, 0x0, 0x1, [{0x8, 0x4, 0x0, 0x0, 0x3ec}, {0x8, 0x12, 0x0, 0x0, 0x1f}]}}, @AF_BRIDGE={0x4}]}, @IFLA_PHYS_SWITCH_ID={0x23, 0x24, "e868dcc5dbe0e0966e8d09245d0bf36df0913e3d1f16e28a4f23ad16e6b8cf"}, @IFLA_MTU={0x8, 0x4, 0x7}, @IFLA_PROTO_DOWN={0x5, 0x27, 0x40}]}, 0x158}, 0x1, 0x0, 0x0, 0x240480c0}, 0x4044000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) mlock(&(0x7f0000411000/0x4000)=nil, 0x4000) set_mempolicy(0x0, &(0x7f00000004c0), 0x81) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000100)={0x0, 0x7ff, 0xcf, 0xb, 0x98}) set_mempolicy(0x4000, &(0x7f0000000240)=0x4, 0x1) r3 = shmget$private(0x0, 0x4000, 0x54001800, &(0x7f0000000000/0x4000)=nil) set_mempolicy(0x2, &(0x7f00000002c0)=0x5, 0x8) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r2, 0x4008941a, &(0x7f0000000480)) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000440), 0x2, &(0x7f000000d000/0x4000)=nil, 0x2) set_mempolicy(0x3, &(0x7f0000000400)=0x7, 0x1) shmat(r3, &(0x7f0000010000/0x1000)=nil, 0x4000) shmget$private(0x0, 0x2000, 0x80, &(0x7f0000003000/0x2000)=nil) 08:43:45 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f00000000c0)={'filter\x00', 0x7, 0x4, 0x3f0, 0x0, 0x308, 0x110, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@arp={@broadcast, @multicast2, 0x0, 0x0, 0x0, 0x0, {}, {@mac}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'ipvlan1\x00', 'bridge_slave_1\x00'}, 0xc0, 0xe0}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev}}}, {{@arp={@private, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {@mac=@random="66758f3826b2"}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'team_slave_0\x00', 'gre0\x00'}, 0xc0, 0xe8}, @unspec=@NFQUEUE2={0x28}}, {{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @local, @initdev={0xac, 0x1e, 0x0, 0x0}}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x440) 08:43:45 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed, 0x7}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = socket$rxrpc(0x21, 0x2, 0x2) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r1, 0x110, 0x4, 0x0, 0x100000004) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x15, 0x1ffffffffffffd7e, &(0x7f0000000640)=ANY=[@ANYRES16=r0, @ANYBLOB="000400109e338f3b4d2bb883627799fe60feb2706adb35e72ff1dfca8c5408ebb1f87acc2a14402140b548263ec445c5ffb74e9449b7f109f089572886f998ccccb8b2b6ab2258a4a41b65956aea8228a32931241d13c6299a64a1190e20df457a8fec030029553d50241df96958176c8220259c92c2bf57dfd44483edd32e110feb04a5f9723e574b3399828f5ed795bb623f", @ANYRESOCT=r1, @ANYRESHEX=r1], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0xa}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x402}, 0x10}, 0x80) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000008c0)={&(0x7f0000000740)=@getlink={0x158, 0x12, 0x708, 0x70bd2a, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x21109, 0x810}, [@IFLA_BROADCAST={0xa, 0x2, @random="fc12f04e3b5c"}, @IFLA_AF_SPEC={0xf8, 0x1a, 0x0, 0x1, [@AF_INET6={0x44, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @IFLA_INET6_TOKEN={0x14, 0x7, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x1f}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0xff}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x8}]}, @AF_BRIDGE={0x4}, @AF_BRIDGE={0x4}, @AF_INET={0x28, 0x2, 0x0, 0x1, {0x24, 0x1, 0x0, 0x1, [{0x8, 0x7, 0x0, 0x0, 0x10}, {0x8, 0x18, 0x0, 0x0, 0x5}, {0x8, 0xf, 0x0, 0x0, 0x1}, {0x8, 0xf, 0x0, 0x0, 0x3f}]}}, @AF_BRIDGE={0x4}, @AF_INET={0x28, 0x2, 0x0, 0x1, {0x24, 0x1, 0x0, 0x1, [{0x8, 0x9}, {0x8, 0xe, 0x0, 0x0, 0x6c}, {0x8, 0x1c, 0x0, 0x0, 0xc9c0}, {0x8, 0x7, 0x0, 0x0, 0x8}]}}, @AF_INET={0x38, 0x2, 0x0, 0x1, {0x34, 0x1, 0x0, 0x1, [{0x8, 0x12, 0x0, 0x0, 0x4}, {0x8, 0x1c, 0x0, 0x0, 0x8}, {0x8, 0x1b}, {0x8}, {0x8, 0xf, 0x0, 0x0, 0x7}, {0x8, 0x11, 0x0, 0x0, 0x8}]}}, @AF_INET={0x18, 0x2, 0x0, 0x1, {0x14, 0x1, 0x0, 0x1, [{0x8, 0x4, 0x0, 0x0, 0x3ec}, {0x8, 0x12, 0x0, 0x0, 0x1f}]}}, @AF_BRIDGE={0x4}]}, @IFLA_PHYS_SWITCH_ID={0x23, 0x24, "e868dcc5dbe0e0966e8d09245d0bf36df0913e3d1f16e28a4f23ad16e6b8cf"}, @IFLA_MTU={0x8, 0x4, 0x7}, @IFLA_PROTO_DOWN={0x5, 0x27, 0x40}]}, 0x158}, 0x1, 0x0, 0x0, 0x240480c0}, 0x4044000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) mlock(&(0x7f0000411000/0x4000)=nil, 0x4000) set_mempolicy(0x0, &(0x7f00000004c0), 0x81) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000100)={0x0, 0x7ff, 0xcf, 0xb, 0x98}) set_mempolicy(0x4000, &(0x7f0000000240)=0x4, 0x1) r3 = shmget$private(0x0, 0x4000, 0x54001800, &(0x7f0000000000/0x4000)=nil) set_mempolicy(0x2, &(0x7f00000002c0)=0x5, 0x8) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r2, 0x4008941a, &(0x7f0000000480)) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000440), 0x2, &(0x7f000000d000/0x4000)=nil, 0x2) set_mempolicy(0x3, &(0x7f0000000400)=0x7, 0x1) shmat(r3, &(0x7f0000010000/0x1000)=nil, 0x4000) shmget$private(0x0, 0x2000, 0x80, &(0x7f0000003000/0x2000)=nil) 08:43:45 executing program 5: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed, 0x7}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = socket$rxrpc(0x21, 0x2, 0x2) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r1, 0x110, 0x4, 0x0, 0x100000004) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x15, 0x1ffffffffffffd7e, &(0x7f0000000640)=ANY=[@ANYRES16=r0, @ANYBLOB="000400109e338f3b4d2bb883627799fe60feb2706adb35e72ff1dfca8c5408ebb1f87acc2a14402140b548263ec445c5ffb74e9449b7f109f089572886f998ccccb8b2b6ab2258a4a41b65956aea8228a32931241d13c6299a64a1190e20df457a8fec030029553d50241df96958176c8220259c92c2bf57dfd44483edd32e110feb04a5f9723e574b3399828f5ed795bb623f", @ANYRESOCT=r1, @ANYRESHEX=r1], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0xa}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x402}, 0x10}, 0x80) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000008c0)={&(0x7f0000000740)=@getlink={0x158, 0x12, 0x708, 0x70bd2a, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x21109, 0x810}, [@IFLA_BROADCAST={0xa, 0x2, @random="fc12f04e3b5c"}, @IFLA_AF_SPEC={0xf8, 0x1a, 0x0, 0x1, [@AF_INET6={0x44, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @IFLA_INET6_TOKEN={0x14, 0x7, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x1f}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0xff}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x8}]}, @AF_BRIDGE={0x4}, @AF_BRIDGE={0x4}, @AF_INET={0x28, 0x2, 0x0, 0x1, {0x24, 0x1, 0x0, 0x1, [{0x8, 0x7, 0x0, 0x0, 0x10}, {0x8, 0x18, 0x0, 0x0, 0x5}, {0x8, 0xf, 0x0, 0x0, 0x1}, {0x8, 0xf, 0x0, 0x0, 0x3f}]}}, @AF_BRIDGE={0x4}, @AF_INET={0x28, 0x2, 0x0, 0x1, {0x24, 0x1, 0x0, 0x1, [{0x8, 0x9}, {0x8, 0xe, 0x0, 0x0, 0x6c}, {0x8, 0x1c, 0x0, 0x0, 0xc9c0}, {0x8, 0x7, 0x0, 0x0, 0x8}]}}, @AF_INET={0x38, 0x2, 0x0, 0x1, {0x34, 0x1, 0x0, 0x1, [{0x8, 0x12, 0x0, 0x0, 0x4}, {0x8, 0x1c, 0x0, 0x0, 0x8}, {0x8, 0x1b}, {0x8}, {0x8, 0xf, 0x0, 0x0, 0x7}, {0x8, 0x11, 0x0, 0x0, 0x8}]}}, @AF_INET={0x18, 0x2, 0x0, 0x1, {0x14, 0x1, 0x0, 0x1, [{0x8, 0x4, 0x0, 0x0, 0x3ec}, {0x8, 0x12, 0x0, 0x0, 0x1f}]}}, @AF_BRIDGE={0x4}]}, @IFLA_PHYS_SWITCH_ID={0x23, 0x24, "e868dcc5dbe0e0966e8d09245d0bf36df0913e3d1f16e28a4f23ad16e6b8cf"}, @IFLA_MTU={0x8, 0x4, 0x7}, @IFLA_PROTO_DOWN={0x5, 0x27, 0x40}]}, 0x158}, 0x1, 0x0, 0x0, 0x240480c0}, 0x4044000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) mlock(&(0x7f0000411000/0x4000)=nil, 0x4000) set_mempolicy(0x0, &(0x7f00000004c0), 0x81) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000100)={0x0, 0x7ff, 0xcf, 0xb, 0x98}) set_mempolicy(0x4000, &(0x7f0000000240)=0x4, 0x1) r3 = shmget$private(0x0, 0x4000, 0x54001800, &(0x7f0000000000/0x4000)=nil) set_mempolicy(0x2, &(0x7f00000002c0)=0x5, 0x8) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r2, 0x4008941a, &(0x7f0000000480)) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000440), 0x2, &(0x7f000000d000/0x4000)=nil, 0x2) set_mempolicy(0x3, &(0x7f0000000400)=0x7, 0x1) shmat(r3, &(0x7f0000010000/0x1000)=nil, 0x4000) shmget$private(0x0, 0x2000, 0x80, &(0x7f0000003000/0x2000)=nil) 08:43:45 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000280)=0x6, 0x4) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f0000000280)=0x6, 0x4) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) 08:43:45 executing program 1: setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000300)='./bus\x00', 0x8000d0, &(0x7f0000000040)=ANY=[], 0x1, 0x7c4, &(0x7f0000000340)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000005, 0x12, r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0xb4, 0x0, &(0x7f00000000c0)) 08:43:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000001d80), 0x4) 08:43:45 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f00000000c0)={'filter\x00', 0x7, 0x4, 0x3f0, 0x0, 0x308, 0x110, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@arp={@broadcast, @multicast2, 0x0, 0x0, 0x0, 0x0, {}, {@mac}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'ipvlan1\x00', 'bridge_slave_1\x00'}, 0xc0, 0xe0}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev}}}, {{@arp={@private, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {@mac=@random="66758f3826b2"}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'team_slave_0\x00', 'gre0\x00'}, 0xc0, 0xe8}, @unspec=@NFQUEUE2={0x28}}, {{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @local, @initdev={0xac, 0x1e, 0x0, 0x0}}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x440) [ 64.987717][ T3790] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3790 comm=syz-executor.4 [ 65.000586][ T25] audit: type=1400 audit(1686213825.120:173): avc: denied { create } for pid=3787 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 65.016788][ T3795] loop1: detected capacity change from 0 to 2048 08:43:45 executing program 2: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed, 0x7}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = socket$rxrpc(0x21, 0x2, 0x2) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r1, 0x110, 0x4, 0x0, 0x100000004) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x15, 0x1ffffffffffffd7e, &(0x7f0000000640)=ANY=[@ANYRES16=r0, @ANYBLOB="000400109e338f3b4d2bb883627799fe60feb2706adb35e72ff1dfca8c5408ebb1f87acc2a14402140b548263ec445c5ffb74e9449b7f109f089572886f998ccccb8b2b6ab2258a4a41b65956aea8228a32931241d13c6299a64a1190e20df457a8fec030029553d50241df96958176c8220259c92c2bf57dfd44483edd32e110feb04a5f9723e574b3399828f5ed795bb623f", @ANYRESOCT=r1, @ANYRESHEX=r1], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0xa}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x402}, 0x10}, 0x80) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000008c0)={&(0x7f0000000740)=@getlink={0x158, 0x12, 0x708, 0x70bd2a, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x21109, 0x810}, [@IFLA_BROADCAST={0xa, 0x2, @random="fc12f04e3b5c"}, @IFLA_AF_SPEC={0xf8, 0x1a, 0x0, 0x1, [@AF_INET6={0x44, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @IFLA_INET6_TOKEN={0x14, 0x7, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x1f}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0xff}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x8}]}, @AF_BRIDGE={0x4}, @AF_BRIDGE={0x4}, @AF_INET={0x28, 0x2, 0x0, 0x1, {0x24, 0x1, 0x0, 0x1, [{0x8, 0x7, 0x0, 0x0, 0x10}, {0x8, 0x18, 0x0, 0x0, 0x5}, {0x8, 0xf, 0x0, 0x0, 0x1}, {0x8, 0xf, 0x0, 0x0, 0x3f}]}}, @AF_BRIDGE={0x4}, @AF_INET={0x28, 0x2, 0x0, 0x1, {0x24, 0x1, 0x0, 0x1, [{0x8, 0x9}, {0x8, 0xe, 0x0, 0x0, 0x6c}, {0x8, 0x1c, 0x0, 0x0, 0xc9c0}, {0x8, 0x7, 0x0, 0x0, 0x8}]}}, @AF_INET={0x38, 0x2, 0x0, 0x1, {0x34, 0x1, 0x0, 0x1, [{0x8, 0x12, 0x0, 0x0, 0x4}, {0x8, 0x1c, 0x0, 0x0, 0x8}, {0x8, 0x1b}, {0x8}, {0x8, 0xf, 0x0, 0x0, 0x7}, {0x8, 0x11, 0x0, 0x0, 0x8}]}}, @AF_INET={0x18, 0x2, 0x0, 0x1, {0x14, 0x1, 0x0, 0x1, [{0x8, 0x4, 0x0, 0x0, 0x3ec}, {0x8, 0x12, 0x0, 0x0, 0x1f}]}}, @AF_BRIDGE={0x4}]}, @IFLA_PHYS_SWITCH_ID={0x23, 0x24, "e868dcc5dbe0e0966e8d09245d0bf36df0913e3d1f16e28a4f23ad16e6b8cf"}, @IFLA_MTU={0x8, 0x4, 0x7}, @IFLA_PROTO_DOWN={0x5, 0x27, 0x40}]}, 0x158}, 0x1, 0x0, 0x0, 0x240480c0}, 0x4044000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) mlock(&(0x7f0000411000/0x4000)=nil, 0x4000) set_mempolicy(0x0, &(0x7f00000004c0), 0x81) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000100)={0x0, 0x7ff, 0xcf, 0xb, 0x98}) set_mempolicy(0x4000, &(0x7f0000000240)=0x4, 0x1) r3 = shmget$private(0x0, 0x4000, 0x54001800, &(0x7f0000000000/0x4000)=nil) set_mempolicy(0x2, &(0x7f00000002c0)=0x5, 0x8) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r2, 0x4008941a, &(0x7f0000000480)) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000440), 0x2, &(0x7f000000d000/0x4000)=nil, 0x2) set_mempolicy(0x3, &(0x7f0000000400)=0x7, 0x1) shmat(r3, &(0x7f0000010000/0x1000)=nil, 0x4000) shmget$private(0x0, 0x2000, 0x80, &(0x7f0000003000/0x2000)=nil) 08:43:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000001d80), 0x4) 08:43:45 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f00000000c0)={'filter\x00', 0x7, 0x4, 0x3f0, 0x0, 0x308, 0x110, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@arp={@broadcast, @multicast2, 0x0, 0x0, 0x0, 0x0, {}, {@mac}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'ipvlan1\x00', 'bridge_slave_1\x00'}, 0xc0, 0xe0}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev}}}, {{@arp={@private, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {@mac=@random="66758f3826b2"}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'team_slave_0\x00', 'gre0\x00'}, 0xc0, 0xe8}, @unspec=@NFQUEUE2={0x28}}, {{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @local, @initdev={0xac, 0x1e, 0x0, 0x0}}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x440) 08:43:45 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x1, 0x5, 0x210001, 0x9, 0x1}, 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000140), &(0x7f00000002c0)=""/4095}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r0, &(0x7f00000000c0), &(0x7f00000012c0)=""/237}, 0x20) [ 65.020416][ T25] audit: type=1400 audit(1686213825.120:174): avc: denied { setopt } for pid=3787 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 65.063292][ T3795] ======================================================= [ 65.063292][ T3795] WARNING: The mand mount option has been deprecated and [ 65.063292][ T3795] and is ignored by this kernel. Remove the mand 08:43:45 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000280)=0x6, 0x4) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f0000000280)=0x6, 0x4) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) [ 65.063292][ T3795] option from the mount to silence this warning. [ 65.063292][ T3795] ======================================================= [ 65.118310][ T3795] ext4: Unknown parameter ' [ 65.118310][ T3795] ' 08:43:45 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x1, 0x5, 0x210001, 0x9, 0x1}, 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000140), &(0x7f00000002c0)=""/4095}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r0, &(0x7f00000000c0), &(0x7f00000012c0)=""/237}, 0x20) 08:43:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000001d80), 0x4) 08:43:45 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f00000000c0)={'filter\x00', 0x7, 0x4, 0x3f0, 0x0, 0x308, 0x110, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@arp={@broadcast, @multicast2, 0x0, 0x0, 0x0, 0x0, {}, {@mac}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'ipvlan1\x00', 'bridge_slave_1\x00'}, 0xc0, 0xe0}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev}}}, {{@arp={@private, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {@mac=@random="66758f3826b2"}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'team_slave_0\x00', 'gre0\x00'}, 0xc0, 0xe8}, @unspec=@NFQUEUE2={0x28}}, {{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @local, @initdev={0xac, 0x1e, 0x0, 0x0}}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x440) [ 65.136772][ T3811] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3811 comm=syz-executor.4 08:43:45 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000280)=0x6, 0x4) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f0000000280)=0x6, 0x4) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) 08:43:45 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000040)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x34, 0x0, 0x0, 0x1}, {0x6}]}, 0x10) writev(r0, &(0x7f0000000440)=[{&(0x7f00000000c0)="3a2cb4b1", 0x4}], 0x1) 08:43:45 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000280)=0x6, 0x4) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f0000000280)=0x6, 0x4) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) 08:43:45 executing program 0: r0 = socket$inet6(0xa, 0x806, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x3) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r2, &(0x7f0000772000)={0x2, 0x4e23}, 0x10) connect$inet(r1, &(0x7f0000772000)={0x2, 0x4e23}, 0x10) accept4(r0, 0x0, 0x0, 0x0) 08:43:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000001d80), 0x4) [ 65.176150][ T25] audit: type=1400 audit(1686213825.310:175): avc: denied { getopt } for pid=3789 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 65.220042][ T3819] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3819 comm=syz-executor.2 08:43:45 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)={{0x14}, [@NFT_MSG_DELSET={0x2c, 0x1d, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_SET_HANDLE={0xc}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x54}}, 0x0) 08:43:45 executing program 0: r0 = socket$inet6(0xa, 0x806, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x3) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r2, &(0x7f0000772000)={0x2, 0x4e23}, 0x10) connect$inet(r1, &(0x7f0000772000)={0x2, 0x4e23}, 0x10) accept4(r0, 0x0, 0x0, 0x0) 08:43:45 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x1, 0x5, 0x210001, 0x9, 0x1}, 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000140), &(0x7f00000002c0)=""/4095}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r0, &(0x7f00000000c0), &(0x7f00000012c0)=""/237}, 0x20) 08:43:45 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000040)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x34, 0x0, 0x0, 0x1}, {0x6}]}, 0x10) writev(r0, &(0x7f0000000440)=[{&(0x7f00000000c0)="3a2cb4b1", 0x4}], 0x1) 08:43:45 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000280)=0x6, 0x4) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f0000000280)=0x6, 0x4) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) 08:43:45 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)={{0x14}, [@NFT_MSG_DELSET={0x2c, 0x1d, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_SET_HANDLE={0xc}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x54}}, 0x0) [ 65.258870][ T25] audit: type=1400 audit(1686213825.390:176): avc: denied { accept } for pid=3823 comm="syz-executor.0" lport=20003 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 65.271310][ T3827] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3827 comm=syz-executor.4 08:43:45 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000040)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x34, 0x0, 0x0, 0x1}, {0x6}]}, 0x10) writev(r0, &(0x7f0000000440)=[{&(0x7f00000000c0)="3a2cb4b1", 0x4}], 0x1) 08:43:45 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)={{0x14}, [@NFT_MSG_DELSET={0x2c, 0x1d, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_SET_HANDLE={0xc}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x54}}, 0x0) 08:43:45 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000040)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x34, 0x0, 0x0, 0x1}, {0x6}]}, 0x10) writev(r0, &(0x7f0000000440)=[{&(0x7f00000000c0)="3a2cb4b1", 0x4}], 0x1) 08:43:45 executing program 0: r0 = socket$inet6(0xa, 0x806, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x3) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r2, &(0x7f0000772000)={0x2, 0x4e23}, 0x10) connect$inet(r1, &(0x7f0000772000)={0x2, 0x4e23}, 0x10) accept4(r0, 0x0, 0x0, 0x0) 08:43:45 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000280)=0x6, 0x4) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f0000000280)=0x6, 0x4) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) [ 65.342363][ T25] audit: type=1400 audit(1686213825.450:177): avc: denied { create } for pid=3828 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 65.357359][ T3838] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3838 comm=syz-executor.2 08:43:45 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x1, 0x5, 0x210001, 0x9, 0x1}, 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000140), &(0x7f00000002c0)=""/4095}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r0, &(0x7f00000000c0), &(0x7f00000012c0)=""/237}, 0x20) 08:43:45 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0xfee4, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) recvmmsg(r0, &(0x7f0000002c80)=[{{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)=""/237, 0xed}], 0x1}}], 0x1, 0x0, 0x0) 08:43:45 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)={{0x14}, [@NFT_MSG_DELSET={0x2c, 0x1d, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_SET_HANDLE={0xc}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x54}}, 0x0) 08:43:45 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000280)=0x6, 0x4) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f0000000280)=0x6, 0x4) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) 08:43:45 executing program 0: r0 = socket$inet6(0xa, 0x806, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x3) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r2, &(0x7f0000772000)={0x2, 0x4e23}, 0x10) connect$inet(r1, &(0x7f0000772000)={0x2, 0x4e23}, 0x10) accept4(r0, 0x0, 0x0, 0x0) [ 65.441370][ T3850] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3850 comm=syz-executor.4 08:43:45 executing program 3: io_setup(0x8, &(0x7f0000000600)=0x0) r1 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000002740), 0x101002) io_submit(r0, 0x1, &(0x7f0000000180)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x2}]) 08:43:45 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x1}, 0x10) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @local}, 0x10) listen(r0, 0x0) 08:43:45 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_CMAP(r0, 0x4b71, &(0x7f0000000040)) 08:43:45 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r0, 0x1, 0xa, &(0x7f0000000480), &(0x7f0000000280)=0x4) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x5}, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000004000000000000000000850000000700000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r2}, 0x10) fallocate(r0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = getgid() r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSW(r5, 0x5403, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f0000000180)=0xff) r6 = syz_io_uring_setup(0x67a7, &(0x7f0000000680), &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000003000/0x3000)=nil, &(0x7f0000000180), &(0x7f00000000c0)=0x0) r8 = fsmount(0xffffffffffffffff, 0x1, 0x8) ioctl$TIOCSTI(r8, 0x5412, &(0x7f0000000540)=0x9) sync_file_range(0xffffffffffffffff, 0x3, 0xfffffffffffffffe, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x3, 0x1, 0x7ff, 0x6, 0x800, 0x6, 0x6, 0x401, 0x1}, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) io_uring_enter(r6, 0x6562, 0x3533, 0x12, &(0x7f0000000500), 0x8) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001e80)=[{{&(0x7f0000000300)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000000c0)=[{&(0x7f0000000380)="df37f1f9940f8245c63996b3426a18e532f3eb5fe694d8cf9102fe837c835d286571e27fc8242460824aad936d6c1012af3926e4a708f440e59f6ea217974c2f7bcc9a47be1c38d0bb5e080000b3d997a410067e436dfdb43508d80b986cb8334afd938e240325875f897f8a6b72a650d26efe19736caddea2a802c34be89086ed954750c73839149923053bc07b673be8c76c59fb150ff8b4cdd06fca5a4ecd584c6a80168f4eb00a070c7faf4ff151b60aac1af47fa82bad5b29a30850440cc62f275bcd3f5ee4d3ee9ef620bd61cc5a34e0fe58ded59c8bfe026ee737d66deea75e312769", 0xe6}], 0x1, 0x0, 0x0, 0x24008880}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="1c00000000000000", @ANYRES8=r4, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESHEX=r6, @ANYRES32=r9, @ANYRES32, @ANYRES8=r9, @ANYRESOCT=r3, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYBLOB="42c715cb248eb795b09b45cdcc2c2d83c86edd8020f25dd02cb9bc9846d4692f4236b6e99793f3fc255825c493fa0d32f0c9cdefb38ec369f32481f73645174950391c0d599abd7b7f48c39dcceca93c9a3d4c1977d1344dd3bb1d3131f1840da9b2ab878f980fd5599121bf02f8c5ed5fa13d383974d783a547a1bfc3e5182b68ba89dece73e1ae65203679e92849d22724536272acc2e6881ee99a", @ANYRES32=r7, @ANYRES32=r7], 0x78, 0x40000}}, {{0x0, 0x0, 0x0}}, {{&(0x7f0000001600)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000001800)=[{0x0}], 0x1, 0x0, 0x0, 0x8000}}], 0x4, 0x4084) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {0x1d}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$KDSKBMETA(r9, 0x4b63, &(0x7f00000004c0)=0x4) 08:43:45 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000040)=[{0x2c}, {0x24}, {0x6, 0x0, 0x0, 0x7ffffdbf}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.io_queued\x00', 0x275a, 0x0) 08:43:45 executing program 3: io_setup(0x8, &(0x7f0000000600)=0x0) r1 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000002740), 0x101002) io_submit(r0, 0x1, &(0x7f0000000180)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x2}]) [ 65.576208][ T3860] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3860 comm=syz-executor.2 08:43:45 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000040)=[{0x2c}, {0x24}, {0x6, 0x0, 0x0, 0x7ffffdbf}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.io_queued\x00', 0x275a, 0x0) 08:43:45 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_CMAP(r0, 0x4b71, &(0x7f0000000040)) 08:43:45 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0xfee4, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) recvmmsg(r0, &(0x7f0000002c80)=[{{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)=""/237, 0xed}], 0x1}}], 0x1, 0x0, 0x0) 08:43:45 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000040)=[{0x2c}, {0x24}, {0x6, 0x0, 0x0, 0x7ffffdbf}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.io_queued\x00', 0x275a, 0x0) [ 65.630698][ T3856] syz-executor.1 (3856) used greatest stack depth: 11104 bytes left 08:43:45 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_CMAP(r0, 0x4b71, &(0x7f0000000040)) 08:43:45 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_CMAP(r0, 0x4b71, &(0x7f0000000040)) 08:43:45 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000040)=[{0x2c}, {0x24}, {0x6, 0x0, 0x0, 0x7ffffdbf}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.io_queued\x00', 0x275a, 0x0) 08:43:46 executing program 3: io_setup(0x8, &(0x7f0000000600)=0x0) r1 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000002740), 0x101002) io_submit(r0, 0x1, &(0x7f0000000180)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x2}]) 08:43:46 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x1}, 0x10) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @local}, 0x10) listen(r0, 0x0) 08:43:46 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r0, 0x1, 0xa, &(0x7f0000000480), &(0x7f0000000280)=0x4) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x5}, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000004000000000000000000850000000700000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r2}, 0x10) fallocate(r0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = getgid() r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSW(r5, 0x5403, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f0000000180)=0xff) r6 = syz_io_uring_setup(0x67a7, &(0x7f0000000680), &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000003000/0x3000)=nil, &(0x7f0000000180), &(0x7f00000000c0)=0x0) r8 = fsmount(0xffffffffffffffff, 0x1, 0x8) ioctl$TIOCSTI(r8, 0x5412, &(0x7f0000000540)=0x9) sync_file_range(0xffffffffffffffff, 0x3, 0xfffffffffffffffe, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x3, 0x1, 0x7ff, 0x6, 0x800, 0x6, 0x6, 0x401, 0x1}, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) io_uring_enter(r6, 0x6562, 0x3533, 0x12, &(0x7f0000000500), 0x8) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001e80)=[{{&(0x7f0000000300)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000000c0)=[{&(0x7f0000000380)="df37f1f9940f8245c63996b3426a18e532f3eb5fe694d8cf9102fe837c835d286571e27fc8242460824aad936d6c1012af3926e4a708f440e59f6ea217974c2f7bcc9a47be1c38d0bb5e080000b3d997a410067e436dfdb43508d80b986cb8334afd938e240325875f897f8a6b72a650d26efe19736caddea2a802c34be89086ed954750c73839149923053bc07b673be8c76c59fb150ff8b4cdd06fca5a4ecd584c6a80168f4eb00a070c7faf4ff151b60aac1af47fa82bad5b29a30850440cc62f275bcd3f5ee4d3ee9ef620bd61cc5a34e0fe58ded59c8bfe026ee737d66deea75e312769", 0xe6}], 0x1, 0x0, 0x0, 0x24008880}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="1c00000000000000", @ANYRES8=r4, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESHEX=r6, @ANYRES32=r9, @ANYRES32, @ANYRES8=r9, @ANYRESOCT=r3, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYBLOB="42c715cb248eb795b09b45cdcc2c2d83c86edd8020f25dd02cb9bc9846d4692f4236b6e99793f3fc255825c493fa0d32f0c9cdefb38ec369f32481f73645174950391c0d599abd7b7f48c39dcceca93c9a3d4c1977d1344dd3bb1d3131f1840da9b2ab878f980fd5599121bf02f8c5ed5fa13d383974d783a547a1bfc3e5182b68ba89dece73e1ae65203679e92849d22724536272acc2e6881ee99a", @ANYRES32=r7, @ANYRES32=r7], 0x78, 0x40000}}, {{0x0, 0x0, 0x0}}, {{&(0x7f0000001600)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000001800)=[{0x0}], 0x1, 0x0, 0x0, 0x8000}}], 0x4, 0x4084) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {0x1d}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$KDSKBMETA(r9, 0x4b63, &(0x7f00000004c0)=0x4) 08:43:46 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) gettid() accept$unix(r3, &(0x7f0000000400)=@abs, &(0x7f0000000480)=0x6e) ftruncate(0xffffffffffffffff, 0xfffffffffffffffb) chroot(&(0x7f0000000340)='./file0\x00') unshare(0x60020200) r5 = memfd_create(&(0x7f0000000240)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3*\x82t\x96\xf8\x00\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\x035\xd9\xfc\x9c\xdd\x9a\xf8.(\'\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%Q\x02\x85;\x00h\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef#\x94\x8b\x1f\xce\x06k\xbb\xf9\xaf\x96p\x99]\r\x00\xbc\xe5\xc2`\xaf\xc7\x1a\a\xa6]\x93\xf1~\xabz3\xfb\t\x03\x9aZ/\xcdP\xbasQz\xe6\xaeX$\xb7\xff\xf24s\xee[\xc1\xe8\x8c\x87\xc6F\xdd0n~\xe4\x90\xb3[Z\x9dq\xbb\xeb\xbe\xccO;r\xdf\x9c\xe0\xb3\xd7\xeb\xa6\xd9\xdc\xed\x91\x9fj\xcewv\xa20\xbb\x83\xad%IR\xc6\v\x87\xc2\xd9,\xa6\xa9{\xfc\xb2\xeb&2|\xa4\xb3\x85\xa1\xd7K', 0x0) fallocate(r5, 0x0, 0x0, 0x3fffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) tkill(0x0, 0x14) r6 = getpgid(r2) kcmp(0x0, r6, 0x2, r1, r4) 08:43:46 executing program 5: perf_event_open(&(0x7f0000000380)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:43:46 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0xfee4, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) recvmmsg(r0, &(0x7f0000002c80)=[{{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)=""/237, 0xed}], 0x1}}], 0x1, 0x0, 0x0) 08:43:46 executing program 5: perf_event_open(&(0x7f0000000380)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:43:46 executing program 3: io_setup(0x8, &(0x7f0000000600)=0x0) r1 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000002740), 0x101002) io_submit(r0, 0x1, &(0x7f0000000180)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x2}]) 08:43:46 executing program 5: perf_event_open(&(0x7f0000000380)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:43:46 executing program 5: perf_event_open(&(0x7f0000000380)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:43:46 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r0, 0x1, 0xa, &(0x7f0000000480), &(0x7f0000000280)=0x4) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x5}, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000004000000000000000000850000000700000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r2}, 0x10) fallocate(r0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = getgid() r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSW(r5, 0x5403, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f0000000180)=0xff) r6 = syz_io_uring_setup(0x67a7, &(0x7f0000000680), &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000003000/0x3000)=nil, &(0x7f0000000180), &(0x7f00000000c0)=0x0) r8 = fsmount(0xffffffffffffffff, 0x1, 0x8) ioctl$TIOCSTI(r8, 0x5412, &(0x7f0000000540)=0x9) sync_file_range(0xffffffffffffffff, 0x3, 0xfffffffffffffffe, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x3, 0x1, 0x7ff, 0x6, 0x800, 0x6, 0x6, 0x401, 0x1}, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) io_uring_enter(r6, 0x6562, 0x3533, 0x12, &(0x7f0000000500), 0x8) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001e80)=[{{&(0x7f0000000300)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000000c0)=[{&(0x7f0000000380)="df37f1f9940f8245c63996b3426a18e532f3eb5fe694d8cf9102fe837c835d286571e27fc8242460824aad936d6c1012af3926e4a708f440e59f6ea217974c2f7bcc9a47be1c38d0bb5e080000b3d997a410067e436dfdb43508d80b986cb8334afd938e240325875f897f8a6b72a650d26efe19736caddea2a802c34be89086ed954750c73839149923053bc07b673be8c76c59fb150ff8b4cdd06fca5a4ecd584c6a80168f4eb00a070c7faf4ff151b60aac1af47fa82bad5b29a30850440cc62f275bcd3f5ee4d3ee9ef620bd61cc5a34e0fe58ded59c8bfe026ee737d66deea75e312769", 0xe6}], 0x1, 0x0, 0x0, 0x24008880}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="1c00000000000000", @ANYRES8=r4, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESHEX=r6, @ANYRES32=r9, @ANYRES32, @ANYRES8=r9, @ANYRESOCT=r3, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYBLOB="42c715cb248eb795b09b45cdcc2c2d83c86edd8020f25dd02cb9bc9846d4692f4236b6e99793f3fc255825c493fa0d32f0c9cdefb38ec369f32481f73645174950391c0d599abd7b7f48c39dcceca93c9a3d4c1977d1344dd3bb1d3131f1840da9b2ab878f980fd5599121bf02f8c5ed5fa13d383974d783a547a1bfc3e5182b68ba89dece73e1ae65203679e92849d22724536272acc2e6881ee99a", @ANYRES32=r7, @ANYRES32=r7], 0x78, 0x40000}}, {{0x0, 0x0, 0x0}}, {{&(0x7f0000001600)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000001800)=[{0x0}], 0x1, 0x0, 0x0, 0x8000}}], 0x4, 0x4084) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {0x1d}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$KDSKBMETA(r9, 0x4b63, &(0x7f00000004c0)=0x4) 08:43:46 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0xfee4, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) recvmmsg(r0, &(0x7f0000002c80)=[{{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)=""/237, 0xed}], 0x1}}], 0x1, 0x0, 0x0) 08:43:47 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r0, 0x1, 0xa, &(0x7f0000000480), &(0x7f0000000280)=0x4) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x5}, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000004000000000000000000850000000700000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r2}, 0x10) fallocate(r0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = getgid() r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSW(r5, 0x5403, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f0000000180)=0xff) r6 = syz_io_uring_setup(0x67a7, &(0x7f0000000680), &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000003000/0x3000)=nil, &(0x7f0000000180), &(0x7f00000000c0)=0x0) r8 = fsmount(0xffffffffffffffff, 0x1, 0x8) ioctl$TIOCSTI(r8, 0x5412, &(0x7f0000000540)=0x9) sync_file_range(0xffffffffffffffff, 0x3, 0xfffffffffffffffe, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x3, 0x1, 0x7ff, 0x6, 0x800, 0x6, 0x6, 0x401, 0x1}, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) io_uring_enter(r6, 0x6562, 0x3533, 0x12, &(0x7f0000000500), 0x8) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001e80)=[{{&(0x7f0000000300)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000000c0)=[{&(0x7f0000000380)="df37f1f9940f8245c63996b3426a18e532f3eb5fe694d8cf9102fe837c835d286571e27fc8242460824aad936d6c1012af3926e4a708f440e59f6ea217974c2f7bcc9a47be1c38d0bb5e080000b3d997a410067e436dfdb43508d80b986cb8334afd938e240325875f897f8a6b72a650d26efe19736caddea2a802c34be89086ed954750c73839149923053bc07b673be8c76c59fb150ff8b4cdd06fca5a4ecd584c6a80168f4eb00a070c7faf4ff151b60aac1af47fa82bad5b29a30850440cc62f275bcd3f5ee4d3ee9ef620bd61cc5a34e0fe58ded59c8bfe026ee737d66deea75e312769", 0xe6}], 0x1, 0x0, 0x0, 0x24008880}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="1c00000000000000", @ANYRES8=r4, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESHEX=r6, @ANYRES32=r9, @ANYRES32, @ANYRES8=r9, @ANYRESOCT=r3, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYBLOB="42c715cb248eb795b09b45cdcc2c2d83c86edd8020f25dd02cb9bc9846d4692f4236b6e99793f3fc255825c493fa0d32f0c9cdefb38ec369f32481f73645174950391c0d599abd7b7f48c39dcceca93c9a3d4c1977d1344dd3bb1d3131f1840da9b2ab878f980fd5599121bf02f8c5ed5fa13d383974d783a547a1bfc3e5182b68ba89dece73e1ae65203679e92849d22724536272acc2e6881ee99a", @ANYRES32=r7, @ANYRES32=r7], 0x78, 0x40000}}, {{0x0, 0x0, 0x0}}, {{&(0x7f0000001600)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000001800)=[{0x0}], 0x1, 0x0, 0x0, 0x8000}}], 0x4, 0x4084) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {0x1d}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$KDSKBMETA(r9, 0x4b63, &(0x7f00000004c0)=0x4) 08:43:47 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x1}, 0x10) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @local}, 0x10) listen(r0, 0x0) [ 67.703639][ T3892] syz-executor.2 (3892) used greatest stack depth: 10920 bytes left 08:43:48 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r0, 0x1, 0xa, &(0x7f0000000480), &(0x7f0000000280)=0x4) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x5}, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000004000000000000000000850000000700000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r2}, 0x10) fallocate(r0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = getgid() r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSW(r5, 0x5403, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f0000000180)=0xff) r6 = syz_io_uring_setup(0x67a7, &(0x7f0000000680), &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000003000/0x3000)=nil, &(0x7f0000000180), &(0x7f00000000c0)=0x0) r8 = fsmount(0xffffffffffffffff, 0x1, 0x8) ioctl$TIOCSTI(r8, 0x5412, &(0x7f0000000540)=0x9) sync_file_range(0xffffffffffffffff, 0x3, 0xfffffffffffffffe, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x3, 0x1, 0x7ff, 0x6, 0x800, 0x6, 0x6, 0x401, 0x1}, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) io_uring_enter(r6, 0x6562, 0x3533, 0x12, &(0x7f0000000500), 0x8) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001e80)=[{{&(0x7f0000000300)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000000c0)=[{&(0x7f0000000380)="df37f1f9940f8245c63996b3426a18e532f3eb5fe694d8cf9102fe837c835d286571e27fc8242460824aad936d6c1012af3926e4a708f440e59f6ea217974c2f7bcc9a47be1c38d0bb5e080000b3d997a410067e436dfdb43508d80b986cb8334afd938e240325875f897f8a6b72a650d26efe19736caddea2a802c34be89086ed954750c73839149923053bc07b673be8c76c59fb150ff8b4cdd06fca5a4ecd584c6a80168f4eb00a070c7faf4ff151b60aac1af47fa82bad5b29a30850440cc62f275bcd3f5ee4d3ee9ef620bd61cc5a34e0fe58ded59c8bfe026ee737d66deea75e312769", 0xe6}], 0x1, 0x0, 0x0, 0x24008880}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="1c00000000000000", @ANYRES8=r4, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESHEX=r6, @ANYRES32=r9, @ANYRES32, @ANYRES8=r9, @ANYRESOCT=r3, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYBLOB="42c715cb248eb795b09b45cdcc2c2d83c86edd8020f25dd02cb9bc9846d4692f4236b6e99793f3fc255825c493fa0d32f0c9cdefb38ec369f32481f73645174950391c0d599abd7b7f48c39dcceca93c9a3d4c1977d1344dd3bb1d3131f1840da9b2ab878f980fd5599121bf02f8c5ed5fa13d383974d783a547a1bfc3e5182b68ba89dece73e1ae65203679e92849d22724536272acc2e6881ee99a", @ANYRES32=r7, @ANYRES32=r7], 0x78, 0x40000}}, {{0x0, 0x0, 0x0}}, {{&(0x7f0000001600)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000001800)=[{0x0}], 0x1, 0x0, 0x0, 0x8000}}], 0x4, 0x4084) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {0x1d}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$KDSKBMETA(r9, 0x4b63, &(0x7f00000004c0)=0x4) 08:43:48 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r0, 0x1, 0xa, &(0x7f0000000480), &(0x7f0000000280)=0x4) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x5}, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000004000000000000000000850000000700000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r2}, 0x10) fallocate(r0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = getgid() r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSW(r5, 0x5403, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f0000000180)=0xff) r6 = syz_io_uring_setup(0x67a7, &(0x7f0000000680), &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000003000/0x3000)=nil, &(0x7f0000000180), &(0x7f00000000c0)=0x0) r8 = fsmount(0xffffffffffffffff, 0x1, 0x8) ioctl$TIOCSTI(r8, 0x5412, &(0x7f0000000540)=0x9) sync_file_range(0xffffffffffffffff, 0x3, 0xfffffffffffffffe, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x3, 0x1, 0x7ff, 0x6, 0x800, 0x6, 0x6, 0x401, 0x1}, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) io_uring_enter(r6, 0x6562, 0x3533, 0x12, &(0x7f0000000500), 0x8) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001e80)=[{{&(0x7f0000000300)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000000c0)=[{&(0x7f0000000380)="df37f1f9940f8245c63996b3426a18e532f3eb5fe694d8cf9102fe837c835d286571e27fc8242460824aad936d6c1012af3926e4a708f440e59f6ea217974c2f7bcc9a47be1c38d0bb5e080000b3d997a410067e436dfdb43508d80b986cb8334afd938e240325875f897f8a6b72a650d26efe19736caddea2a802c34be89086ed954750c73839149923053bc07b673be8c76c59fb150ff8b4cdd06fca5a4ecd584c6a80168f4eb00a070c7faf4ff151b60aac1af47fa82bad5b29a30850440cc62f275bcd3f5ee4d3ee9ef620bd61cc5a34e0fe58ded59c8bfe026ee737d66deea75e312769", 0xe6}], 0x1, 0x0, 0x0, 0x24008880}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="1c00000000000000", @ANYRES8=r4, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESHEX=r6, @ANYRES32=r9, @ANYRES32, @ANYRES8=r9, @ANYRESOCT=r3, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYBLOB="42c715cb248eb795b09b45cdcc2c2d83c86edd8020f25dd02cb9bc9846d4692f4236b6e99793f3fc255825c493fa0d32f0c9cdefb38ec369f32481f73645174950391c0d599abd7b7f48c39dcceca93c9a3d4c1977d1344dd3bb1d3131f1840da9b2ab878f980fd5599121bf02f8c5ed5fa13d383974d783a547a1bfc3e5182b68ba89dece73e1ae65203679e92849d22724536272acc2e6881ee99a", @ANYRES32=r7, @ANYRES32=r7], 0x78, 0x40000}}, {{0x0, 0x0, 0x0}}, {{&(0x7f0000001600)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000001800)=[{0x0}], 0x1, 0x0, 0x0, 0x8000}}], 0x4, 0x4084) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {0x1d}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$KDSKBMETA(r9, 0x4b63, &(0x7f00000004c0)=0x4) 08:43:48 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) gettid() accept$unix(r3, &(0x7f0000000400)=@abs, &(0x7f0000000480)=0x6e) ftruncate(0xffffffffffffffff, 0xfffffffffffffffb) chroot(&(0x7f0000000340)='./file0\x00') unshare(0x60020200) r5 = memfd_create(&(0x7f0000000240)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3*\x82t\x96\xf8\x00\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\x035\xd9\xfc\x9c\xdd\x9a\xf8.(\'\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%Q\x02\x85;\x00h\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef#\x94\x8b\x1f\xce\x06k\xbb\xf9\xaf\x96p\x99]\r\x00\xbc\xe5\xc2`\xaf\xc7\x1a\a\xa6]\x93\xf1~\xabz3\xfb\t\x03\x9aZ/\xcdP\xbasQz\xe6\xaeX$\xb7\xff\xf24s\xee[\xc1\xe8\x8c\x87\xc6F\xdd0n~\xe4\x90\xb3[Z\x9dq\xbb\xeb\xbe\xccO;r\xdf\x9c\xe0\xb3\xd7\xeb\xa6\xd9\xdc\xed\x91\x9fj\xcewv\xa20\xbb\x83\xad%IR\xc6\v\x87\xc2\xd9,\xa6\xa9{\xfc\xb2\xeb&2|\xa4\xb3\x85\xa1\xd7K', 0x0) fallocate(r5, 0x0, 0x0, 0x3fffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) tkill(0x0, 0x14) r6 = getpgid(r2) kcmp(0x0, r6, 0x2, r1, r4) 08:43:48 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x1}, 0x10) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @local}, 0x10) listen(r0, 0x0) 08:43:49 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r0, 0x1, 0xa, &(0x7f0000000480), &(0x7f0000000280)=0x4) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x5}, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000004000000000000000000850000000700000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r2}, 0x10) fallocate(r0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = getgid() r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSW(r5, 0x5403, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f0000000180)=0xff) r6 = syz_io_uring_setup(0x67a7, &(0x7f0000000680), &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000003000/0x3000)=nil, &(0x7f0000000180), &(0x7f00000000c0)=0x0) r8 = fsmount(0xffffffffffffffff, 0x1, 0x8) ioctl$TIOCSTI(r8, 0x5412, &(0x7f0000000540)=0x9) sync_file_range(0xffffffffffffffff, 0x3, 0xfffffffffffffffe, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x3, 0x1, 0x7ff, 0x6, 0x800, 0x6, 0x6, 0x401, 0x1}, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) io_uring_enter(r6, 0x6562, 0x3533, 0x12, &(0x7f0000000500), 0x8) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001e80)=[{{&(0x7f0000000300)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000000c0)=[{&(0x7f0000000380)="df37f1f9940f8245c63996b3426a18e532f3eb5fe694d8cf9102fe837c835d286571e27fc8242460824aad936d6c1012af3926e4a708f440e59f6ea217974c2f7bcc9a47be1c38d0bb5e080000b3d997a410067e436dfdb43508d80b986cb8334afd938e240325875f897f8a6b72a650d26efe19736caddea2a802c34be89086ed954750c73839149923053bc07b673be8c76c59fb150ff8b4cdd06fca5a4ecd584c6a80168f4eb00a070c7faf4ff151b60aac1af47fa82bad5b29a30850440cc62f275bcd3f5ee4d3ee9ef620bd61cc5a34e0fe58ded59c8bfe026ee737d66deea75e312769", 0xe6}], 0x1, 0x0, 0x0, 0x24008880}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="1c00000000000000", @ANYRES8=r4, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESHEX=r6, @ANYRES32=r9, @ANYRES32, @ANYRES8=r9, @ANYRESOCT=r3, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYBLOB="42c715cb248eb795b09b45cdcc2c2d83c86edd8020f25dd02cb9bc9846d4692f4236b6e99793f3fc255825c493fa0d32f0c9cdefb38ec369f32481f73645174950391c0d599abd7b7f48c39dcceca93c9a3d4c1977d1344dd3bb1d3131f1840da9b2ab878f980fd5599121bf02f8c5ed5fa13d383974d783a547a1bfc3e5182b68ba89dece73e1ae65203679e92849d22724536272acc2e6881ee99a", @ANYRES32=r7, @ANYRES32=r7], 0x78, 0x40000}}, {{0x0, 0x0, 0x0}}, {{&(0x7f0000001600)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000001800)=[{0x0}], 0x1, 0x0, 0x0, 0x8000}}], 0x4, 0x4084) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {0x1d}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$KDSKBMETA(r9, 0x4b63, &(0x7f00000004c0)=0x4) 08:43:49 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) gettid() accept$unix(r3, &(0x7f0000000400)=@abs, &(0x7f0000000480)=0x6e) ftruncate(0xffffffffffffffff, 0xfffffffffffffffb) chroot(&(0x7f0000000340)='./file0\x00') unshare(0x60020200) r5 = memfd_create(&(0x7f0000000240)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3*\x82t\x96\xf8\x00\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\x035\xd9\xfc\x9c\xdd\x9a\xf8.(\'\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%Q\x02\x85;\x00h\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef#\x94\x8b\x1f\xce\x06k\xbb\xf9\xaf\x96p\x99]\r\x00\xbc\xe5\xc2`\xaf\xc7\x1a\a\xa6]\x93\xf1~\xabz3\xfb\t\x03\x9aZ/\xcdP\xbasQz\xe6\xaeX$\xb7\xff\xf24s\xee[\xc1\xe8\x8c\x87\xc6F\xdd0n~\xe4\x90\xb3[Z\x9dq\xbb\xeb\xbe\xccO;r\xdf\x9c\xe0\xb3\xd7\xeb\xa6\xd9\xdc\xed\x91\x9fj\xcewv\xa20\xbb\x83\xad%IR\xc6\v\x87\xc2\xd9,\xa6\xa9{\xfc\xb2\xeb&2|\xa4\xb3\x85\xa1\xd7K', 0x0) fallocate(r5, 0x0, 0x0, 0x3fffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) tkill(0x0, 0x14) r6 = getpgid(r2) kcmp(0x0, r6, 0x2, r1, r4) 08:43:49 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) gettid() accept$unix(r3, &(0x7f0000000400)=@abs, &(0x7f0000000480)=0x6e) ftruncate(0xffffffffffffffff, 0xfffffffffffffffb) chroot(&(0x7f0000000340)='./file0\x00') unshare(0x60020200) r5 = memfd_create(&(0x7f0000000240)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3*\x82t\x96\xf8\x00\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\x035\xd9\xfc\x9c\xdd\x9a\xf8.(\'\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%Q\x02\x85;\x00h\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef#\x94\x8b\x1f\xce\x06k\xbb\xf9\xaf\x96p\x99]\r\x00\xbc\xe5\xc2`\xaf\xc7\x1a\a\xa6]\x93\xf1~\xabz3\xfb\t\x03\x9aZ/\xcdP\xbasQz\xe6\xaeX$\xb7\xff\xf24s\xee[\xc1\xe8\x8c\x87\xc6F\xdd0n~\xe4\x90\xb3[Z\x9dq\xbb\xeb\xbe\xccO;r\xdf\x9c\xe0\xb3\xd7\xeb\xa6\xd9\xdc\xed\x91\x9fj\xcewv\xa20\xbb\x83\xad%IR\xc6\v\x87\xc2\xd9,\xa6\xa9{\xfc\xb2\xeb&2|\xa4\xb3\x85\xa1\xd7K', 0x0) fallocate(r5, 0x0, 0x0, 0x3fffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) tkill(0x0, 0x14) r6 = getpgid(r2) kcmp(0x0, r6, 0x2, r1, r4) 08:43:50 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) gettid() accept$unix(r3, &(0x7f0000000400)=@abs, &(0x7f0000000480)=0x6e) ftruncate(0xffffffffffffffff, 0xfffffffffffffffb) chroot(&(0x7f0000000340)='./file0\x00') unshare(0x60020200) r5 = memfd_create(&(0x7f0000000240)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3*\x82t\x96\xf8\x00\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\x035\xd9\xfc\x9c\xdd\x9a\xf8.(\'\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%Q\x02\x85;\x00h\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef#\x94\x8b\x1f\xce\x06k\xbb\xf9\xaf\x96p\x99]\r\x00\xbc\xe5\xc2`\xaf\xc7\x1a\a\xa6]\x93\xf1~\xabz3\xfb\t\x03\x9aZ/\xcdP\xbasQz\xe6\xaeX$\xb7\xff\xf24s\xee[\xc1\xe8\x8c\x87\xc6F\xdd0n~\xe4\x90\xb3[Z\x9dq\xbb\xeb\xbe\xccO;r\xdf\x9c\xe0\xb3\xd7\xeb\xa6\xd9\xdc\xed\x91\x9fj\xcewv\xa20\xbb\x83\xad%IR\xc6\v\x87\xc2\xd9,\xa6\xa9{\xfc\xb2\xeb&2|\xa4\xb3\x85\xa1\xd7K', 0x0) fallocate(r5, 0x0, 0x0, 0x3fffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) tkill(0x0, 0x14) r6 = getpgid(r2) kcmp(0x0, r6, 0x2, r1, r4) 08:43:50 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) gettid() accept$unix(r3, &(0x7f0000000400)=@abs, &(0x7f0000000480)=0x6e) ftruncate(0xffffffffffffffff, 0xfffffffffffffffb) chroot(&(0x7f0000000340)='./file0\x00') unshare(0x60020200) r5 = memfd_create(&(0x7f0000000240)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3*\x82t\x96\xf8\x00\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\x035\xd9\xfc\x9c\xdd\x9a\xf8.(\'\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%Q\x02\x85;\x00h\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef#\x94\x8b\x1f\xce\x06k\xbb\xf9\xaf\x96p\x99]\r\x00\xbc\xe5\xc2`\xaf\xc7\x1a\a\xa6]\x93\xf1~\xabz3\xfb\t\x03\x9aZ/\xcdP\xbasQz\xe6\xaeX$\xb7\xff\xf24s\xee[\xc1\xe8\x8c\x87\xc6F\xdd0n~\xe4\x90\xb3[Z\x9dq\xbb\xeb\xbe\xccO;r\xdf\x9c\xe0\xb3\xd7\xeb\xa6\xd9\xdc\xed\x91\x9fj\xcewv\xa20\xbb\x83\xad%IR\xc6\v\x87\xc2\xd9,\xa6\xa9{\xfc\xb2\xeb&2|\xa4\xb3\x85\xa1\xd7K', 0x0) fallocate(r5, 0x0, 0x0, 0x3fffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) tkill(0x0, 0x14) r6 = getpgid(r2) kcmp(0x0, r6, 0x2, r1, r4) 08:43:51 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) gettid() accept$unix(r3, &(0x7f0000000400)=@abs, &(0x7f0000000480)=0x6e) ftruncate(0xffffffffffffffff, 0xfffffffffffffffb) chroot(&(0x7f0000000340)='./file0\x00') unshare(0x60020200) r5 = memfd_create(&(0x7f0000000240)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3*\x82t\x96\xf8\x00\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\x035\xd9\xfc\x9c\xdd\x9a\xf8.(\'\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%Q\x02\x85;\x00h\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef#\x94\x8b\x1f\xce\x06k\xbb\xf9\xaf\x96p\x99]\r\x00\xbc\xe5\xc2`\xaf\xc7\x1a\a\xa6]\x93\xf1~\xabz3\xfb\t\x03\x9aZ/\xcdP\xbasQz\xe6\xaeX$\xb7\xff\xf24s\xee[\xc1\xe8\x8c\x87\xc6F\xdd0n~\xe4\x90\xb3[Z\x9dq\xbb\xeb\xbe\xccO;r\xdf\x9c\xe0\xb3\xd7\xeb\xa6\xd9\xdc\xed\x91\x9fj\xcewv\xa20\xbb\x83\xad%IR\xc6\v\x87\xc2\xd9,\xa6\xa9{\xfc\xb2\xeb&2|\xa4\xb3\x85\xa1\xd7K', 0x0) fallocate(r5, 0x0, 0x0, 0x3fffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) tkill(0x0, 0x14) r6 = getpgid(r2) kcmp(0x0, r6, 0x2, r1, r4) 08:43:51 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r0, 0x1, 0xa, &(0x7f0000000480), &(0x7f0000000280)=0x4) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x5}, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000004000000000000000000850000000700000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r2}, 0x10) fallocate(r0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = getgid() r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSW(r5, 0x5403, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f0000000180)=0xff) r6 = syz_io_uring_setup(0x67a7, &(0x7f0000000680), &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000003000/0x3000)=nil, &(0x7f0000000180), &(0x7f00000000c0)=0x0) r8 = fsmount(0xffffffffffffffff, 0x1, 0x8) ioctl$TIOCSTI(r8, 0x5412, &(0x7f0000000540)=0x9) sync_file_range(0xffffffffffffffff, 0x3, 0xfffffffffffffffe, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x3, 0x1, 0x7ff, 0x6, 0x800, 0x6, 0x6, 0x401, 0x1}, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) io_uring_enter(r6, 0x6562, 0x3533, 0x12, &(0x7f0000000500), 0x8) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001e80)=[{{&(0x7f0000000300)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000000c0)=[{&(0x7f0000000380)="df37f1f9940f8245c63996b3426a18e532f3eb5fe694d8cf9102fe837c835d286571e27fc8242460824aad936d6c1012af3926e4a708f440e59f6ea217974c2f7bcc9a47be1c38d0bb5e080000b3d997a410067e436dfdb43508d80b986cb8334afd938e240325875f897f8a6b72a650d26efe19736caddea2a802c34be89086ed954750c73839149923053bc07b673be8c76c59fb150ff8b4cdd06fca5a4ecd584c6a80168f4eb00a070c7faf4ff151b60aac1af47fa82bad5b29a30850440cc62f275bcd3f5ee4d3ee9ef620bd61cc5a34e0fe58ded59c8bfe026ee737d66deea75e312769", 0xe6}], 0x1, 0x0, 0x0, 0x24008880}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="1c00000000000000", @ANYRES8=r4, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESHEX=r6, @ANYRES32=r9, @ANYRES32, @ANYRES8=r9, @ANYRESOCT=r3, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYBLOB="42c715cb248eb795b09b45cdcc2c2d83c86edd8020f25dd02cb9bc9846d4692f4236b6e99793f3fc255825c493fa0d32f0c9cdefb38ec369f32481f73645174950391c0d599abd7b7f48c39dcceca93c9a3d4c1977d1344dd3bb1d3131f1840da9b2ab878f980fd5599121bf02f8c5ed5fa13d383974d783a547a1bfc3e5182b68ba89dece73e1ae65203679e92849d22724536272acc2e6881ee99a", @ANYRES32=r7, @ANYRES32=r7], 0x78, 0x40000}}, {{0x0, 0x0, 0x0}}, {{&(0x7f0000001600)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000001800)=[{0x0}], 0x1, 0x0, 0x0, 0x8000}}], 0x4, 0x4084) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {0x1d}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$KDSKBMETA(r9, 0x4b63, &(0x7f00000004c0)=0x4) 08:43:51 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) gettid() accept$unix(r3, &(0x7f0000000400)=@abs, &(0x7f0000000480)=0x6e) ftruncate(0xffffffffffffffff, 0xfffffffffffffffb) chroot(&(0x7f0000000340)='./file0\x00') unshare(0x60020200) r5 = memfd_create(&(0x7f0000000240)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3*\x82t\x96\xf8\x00\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\x035\xd9\xfc\x9c\xdd\x9a\xf8.(\'\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%Q\x02\x85;\x00h\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef#\x94\x8b\x1f\xce\x06k\xbb\xf9\xaf\x96p\x99]\r\x00\xbc\xe5\xc2`\xaf\xc7\x1a\a\xa6]\x93\xf1~\xabz3\xfb\t\x03\x9aZ/\xcdP\xbasQz\xe6\xaeX$\xb7\xff\xf24s\xee[\xc1\xe8\x8c\x87\xc6F\xdd0n~\xe4\x90\xb3[Z\x9dq\xbb\xeb\xbe\xccO;r\xdf\x9c\xe0\xb3\xd7\xeb\xa6\xd9\xdc\xed\x91\x9fj\xcewv\xa20\xbb\x83\xad%IR\xc6\v\x87\xc2\xd9,\xa6\xa9{\xfc\xb2\xeb&2|\xa4\xb3\x85\xa1\xd7K', 0x0) fallocate(r5, 0x0, 0x0, 0x3fffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) tkill(0x0, 0x14) r6 = getpgid(r2) kcmp(0x0, r6, 0x2, r1, r4) 08:43:52 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r0, 0x1, 0xa, &(0x7f0000000480), &(0x7f0000000280)=0x4) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x5}, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000004000000000000000000850000000700000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r2}, 0x10) fallocate(r0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = getgid() r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSW(r5, 0x5403, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f0000000180)=0xff) r6 = syz_io_uring_setup(0x67a7, &(0x7f0000000680), &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000003000/0x3000)=nil, &(0x7f0000000180), &(0x7f00000000c0)=0x0) r8 = fsmount(0xffffffffffffffff, 0x1, 0x8) ioctl$TIOCSTI(r8, 0x5412, &(0x7f0000000540)=0x9) sync_file_range(0xffffffffffffffff, 0x3, 0xfffffffffffffffe, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x3, 0x1, 0x7ff, 0x6, 0x800, 0x6, 0x6, 0x401, 0x1}, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) io_uring_enter(r6, 0x6562, 0x3533, 0x12, &(0x7f0000000500), 0x8) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001e80)=[{{&(0x7f0000000300)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000000c0)=[{&(0x7f0000000380)="df37f1f9940f8245c63996b3426a18e532f3eb5fe694d8cf9102fe837c835d286571e27fc8242460824aad936d6c1012af3926e4a708f440e59f6ea217974c2f7bcc9a47be1c38d0bb5e080000b3d997a410067e436dfdb43508d80b986cb8334afd938e240325875f897f8a6b72a650d26efe19736caddea2a802c34be89086ed954750c73839149923053bc07b673be8c76c59fb150ff8b4cdd06fca5a4ecd584c6a80168f4eb00a070c7faf4ff151b60aac1af47fa82bad5b29a30850440cc62f275bcd3f5ee4d3ee9ef620bd61cc5a34e0fe58ded59c8bfe026ee737d66deea75e312769", 0xe6}], 0x1, 0x0, 0x0, 0x24008880}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="1c00000000000000", @ANYRES8=r4, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESHEX=r6, @ANYRES32=r9, @ANYRES32, @ANYRES8=r9, @ANYRESOCT=r3, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYBLOB="42c715cb248eb795b09b45cdcc2c2d83c86edd8020f25dd02cb9bc9846d4692f4236b6e99793f3fc255825c493fa0d32f0c9cdefb38ec369f32481f73645174950391c0d599abd7b7f48c39dcceca93c9a3d4c1977d1344dd3bb1d3131f1840da9b2ab878f980fd5599121bf02f8c5ed5fa13d383974d783a547a1bfc3e5182b68ba89dece73e1ae65203679e92849d22724536272acc2e6881ee99a", @ANYRES32=r7, @ANYRES32=r7], 0x78, 0x40000}}, {{0x0, 0x0, 0x0}}, {{&(0x7f0000001600)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000001800)=[{0x0}], 0x1, 0x0, 0x0, 0x8000}}], 0x4, 0x4084) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {0x1d}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$KDSKBMETA(r9, 0x4b63, &(0x7f00000004c0)=0x4) 08:43:52 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r0, 0x1, 0xa, &(0x7f0000000480), &(0x7f0000000280)=0x4) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x5}, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000004000000000000000000850000000700000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r2}, 0x10) fallocate(r0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = getgid() r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSW(r5, 0x5403, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f0000000180)=0xff) r6 = syz_io_uring_setup(0x67a7, &(0x7f0000000680), &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000003000/0x3000)=nil, &(0x7f0000000180), &(0x7f00000000c0)=0x0) r8 = fsmount(0xffffffffffffffff, 0x1, 0x8) ioctl$TIOCSTI(r8, 0x5412, &(0x7f0000000540)=0x9) sync_file_range(0xffffffffffffffff, 0x3, 0xfffffffffffffffe, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x3, 0x1, 0x7ff, 0x6, 0x800, 0x6, 0x6, 0x401, 0x1}, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) io_uring_enter(r6, 0x6562, 0x3533, 0x12, &(0x7f0000000500), 0x8) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001e80)=[{{&(0x7f0000000300)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000000c0)=[{&(0x7f0000000380)="df37f1f9940f8245c63996b3426a18e532f3eb5fe694d8cf9102fe837c835d286571e27fc8242460824aad936d6c1012af3926e4a708f440e59f6ea217974c2f7bcc9a47be1c38d0bb5e080000b3d997a410067e436dfdb43508d80b986cb8334afd938e240325875f897f8a6b72a650d26efe19736caddea2a802c34be89086ed954750c73839149923053bc07b673be8c76c59fb150ff8b4cdd06fca5a4ecd584c6a80168f4eb00a070c7faf4ff151b60aac1af47fa82bad5b29a30850440cc62f275bcd3f5ee4d3ee9ef620bd61cc5a34e0fe58ded59c8bfe026ee737d66deea75e312769", 0xe6}], 0x1, 0x0, 0x0, 0x24008880}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="1c00000000000000", @ANYRES8=r4, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESHEX=r6, @ANYRES32=r9, @ANYRES32, @ANYRES8=r9, @ANYRESOCT=r3, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYBLOB="42c715cb248eb795b09b45cdcc2c2d83c86edd8020f25dd02cb9bc9846d4692f4236b6e99793f3fc255825c493fa0d32f0c9cdefb38ec369f32481f73645174950391c0d599abd7b7f48c39dcceca93c9a3d4c1977d1344dd3bb1d3131f1840da9b2ab878f980fd5599121bf02f8c5ed5fa13d383974d783a547a1bfc3e5182b68ba89dece73e1ae65203679e92849d22724536272acc2e6881ee99a", @ANYRES32=r7, @ANYRES32=r7], 0x78, 0x40000}}, {{0x0, 0x0, 0x0}}, {{&(0x7f0000001600)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000001800)=[{0x0}], 0x1, 0x0, 0x0, 0x8000}}], 0x4, 0x4084) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {0x1d}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$KDSKBMETA(r9, 0x4b63, &(0x7f00000004c0)=0x4) 08:43:52 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) gettid() accept$unix(r3, &(0x7f0000000400)=@abs, &(0x7f0000000480)=0x6e) ftruncate(0xffffffffffffffff, 0xfffffffffffffffb) chroot(&(0x7f0000000340)='./file0\x00') unshare(0x60020200) r5 = memfd_create(&(0x7f0000000240)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3*\x82t\x96\xf8\x00\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\x035\xd9\xfc\x9c\xdd\x9a\xf8.(\'\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%Q\x02\x85;\x00h\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef#\x94\x8b\x1f\xce\x06k\xbb\xf9\xaf\x96p\x99]\r\x00\xbc\xe5\xc2`\xaf\xc7\x1a\a\xa6]\x93\xf1~\xabz3\xfb\t\x03\x9aZ/\xcdP\xbasQz\xe6\xaeX$\xb7\xff\xf24s\xee[\xc1\xe8\x8c\x87\xc6F\xdd0n~\xe4\x90\xb3[Z\x9dq\xbb\xeb\xbe\xccO;r\xdf\x9c\xe0\xb3\xd7\xeb\xa6\xd9\xdc\xed\x91\x9fj\xcewv\xa20\xbb\x83\xad%IR\xc6\v\x87\xc2\xd9,\xa6\xa9{\xfc\xb2\xeb&2|\xa4\xb3\x85\xa1\xd7K', 0x0) fallocate(r5, 0x0, 0x0, 0x3fffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) tkill(0x0, 0x14) r6 = getpgid(r2) kcmp(0x0, r6, 0x2, r1, r4) 08:43:52 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) gettid() accept$unix(r3, &(0x7f0000000400)=@abs, &(0x7f0000000480)=0x6e) ftruncate(0xffffffffffffffff, 0xfffffffffffffffb) chroot(&(0x7f0000000340)='./file0\x00') unshare(0x60020200) r5 = memfd_create(&(0x7f0000000240)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3*\x82t\x96\xf8\x00\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\x035\xd9\xfc\x9c\xdd\x9a\xf8.(\'\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%Q\x02\x85;\x00h\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef#\x94\x8b\x1f\xce\x06k\xbb\xf9\xaf\x96p\x99]\r\x00\xbc\xe5\xc2`\xaf\xc7\x1a\a\xa6]\x93\xf1~\xabz3\xfb\t\x03\x9aZ/\xcdP\xbasQz\xe6\xaeX$\xb7\xff\xf24s\xee[\xc1\xe8\x8c\x87\xc6F\xdd0n~\xe4\x90\xb3[Z\x9dq\xbb\xeb\xbe\xccO;r\xdf\x9c\xe0\xb3\xd7\xeb\xa6\xd9\xdc\xed\x91\x9fj\xcewv\xa20\xbb\x83\xad%IR\xc6\v\x87\xc2\xd9,\xa6\xa9{\xfc\xb2\xeb&2|\xa4\xb3\x85\xa1\xd7K', 0x0) fallocate(r5, 0x0, 0x0, 0x3fffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) tkill(0x0, 0x14) r6 = getpgid(r2) kcmp(0x0, r6, 0x2, r1, r4) 08:43:54 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r0, 0x1, 0xa, &(0x7f0000000480), &(0x7f0000000280)=0x4) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x5}, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000004000000000000000000850000000700000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r2}, 0x10) fallocate(r0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = getgid() r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSW(r5, 0x5403, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f0000000180)=0xff) r6 = syz_io_uring_setup(0x67a7, &(0x7f0000000680), &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000003000/0x3000)=nil, &(0x7f0000000180), &(0x7f00000000c0)=0x0) r8 = fsmount(0xffffffffffffffff, 0x1, 0x8) ioctl$TIOCSTI(r8, 0x5412, &(0x7f0000000540)=0x9) sync_file_range(0xffffffffffffffff, 0x3, 0xfffffffffffffffe, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x3, 0x1, 0x7ff, 0x6, 0x800, 0x6, 0x6, 0x401, 0x1}, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) io_uring_enter(r6, 0x6562, 0x3533, 0x12, &(0x7f0000000500), 0x8) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001e80)=[{{&(0x7f0000000300)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000000c0)=[{&(0x7f0000000380)="df37f1f9940f8245c63996b3426a18e532f3eb5fe694d8cf9102fe837c835d286571e27fc8242460824aad936d6c1012af3926e4a708f440e59f6ea217974c2f7bcc9a47be1c38d0bb5e080000b3d997a410067e436dfdb43508d80b986cb8334afd938e240325875f897f8a6b72a650d26efe19736caddea2a802c34be89086ed954750c73839149923053bc07b673be8c76c59fb150ff8b4cdd06fca5a4ecd584c6a80168f4eb00a070c7faf4ff151b60aac1af47fa82bad5b29a30850440cc62f275bcd3f5ee4d3ee9ef620bd61cc5a34e0fe58ded59c8bfe026ee737d66deea75e312769", 0xe6}], 0x1, 0x0, 0x0, 0x24008880}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="1c00000000000000", @ANYRES8=r4, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESHEX=r6, @ANYRES32=r9, @ANYRES32, @ANYRES8=r9, @ANYRESOCT=r3, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYBLOB="42c715cb248eb795b09b45cdcc2c2d83c86edd8020f25dd02cb9bc9846d4692f4236b6e99793f3fc255825c493fa0d32f0c9cdefb38ec369f32481f73645174950391c0d599abd7b7f48c39dcceca93c9a3d4c1977d1344dd3bb1d3131f1840da9b2ab878f980fd5599121bf02f8c5ed5fa13d383974d783a547a1bfc3e5182b68ba89dece73e1ae65203679e92849d22724536272acc2e6881ee99a", @ANYRES32=r7, @ANYRES32=r7], 0x78, 0x40000}}, {{0x0, 0x0, 0x0}}, {{&(0x7f0000001600)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000001800)=[{0x0}], 0x1, 0x0, 0x0, 0x8000}}], 0x4, 0x4084) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {0x1d}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$KDSKBMETA(r9, 0x4b63, &(0x7f00000004c0)=0x4) 08:43:54 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) gettid() accept$unix(r3, &(0x7f0000000400)=@abs, &(0x7f0000000480)=0x6e) ftruncate(0xffffffffffffffff, 0xfffffffffffffffb) chroot(&(0x7f0000000340)='./file0\x00') unshare(0x60020200) r5 = memfd_create(&(0x7f0000000240)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3*\x82t\x96\xf8\x00\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\x035\xd9\xfc\x9c\xdd\x9a\xf8.(\'\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%Q\x02\x85;\x00h\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef#\x94\x8b\x1f\xce\x06k\xbb\xf9\xaf\x96p\x99]\r\x00\xbc\xe5\xc2`\xaf\xc7\x1a\a\xa6]\x93\xf1~\xabz3\xfb\t\x03\x9aZ/\xcdP\xbasQz\xe6\xaeX$\xb7\xff\xf24s\xee[\xc1\xe8\x8c\x87\xc6F\xdd0n~\xe4\x90\xb3[Z\x9dq\xbb\xeb\xbe\xccO;r\xdf\x9c\xe0\xb3\xd7\xeb\xa6\xd9\xdc\xed\x91\x9fj\xcewv\xa20\xbb\x83\xad%IR\xc6\v\x87\xc2\xd9,\xa6\xa9{\xfc\xb2\xeb&2|\xa4\xb3\x85\xa1\xd7K', 0x0) fallocate(r5, 0x0, 0x0, 0x3fffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) tkill(0x0, 0x14) r6 = getpgid(r2) kcmp(0x0, r6, 0x2, r1, r4) 08:43:54 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) gettid() accept$unix(r3, &(0x7f0000000400)=@abs, &(0x7f0000000480)=0x6e) ftruncate(0xffffffffffffffff, 0xfffffffffffffffb) chroot(&(0x7f0000000340)='./file0\x00') unshare(0x60020200) r5 = memfd_create(&(0x7f0000000240)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3*\x82t\x96\xf8\x00\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\x035\xd9\xfc\x9c\xdd\x9a\xf8.(\'\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%Q\x02\x85;\x00h\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef#\x94\x8b\x1f\xce\x06k\xbb\xf9\xaf\x96p\x99]\r\x00\xbc\xe5\xc2`\xaf\xc7\x1a\a\xa6]\x93\xf1~\xabz3\xfb\t\x03\x9aZ/\xcdP\xbasQz\xe6\xaeX$\xb7\xff\xf24s\xee[\xc1\xe8\x8c\x87\xc6F\xdd0n~\xe4\x90\xb3[Z\x9dq\xbb\xeb\xbe\xccO;r\xdf\x9c\xe0\xb3\xd7\xeb\xa6\xd9\xdc\xed\x91\x9fj\xcewv\xa20\xbb\x83\xad%IR\xc6\v\x87\xc2\xd9,\xa6\xa9{\xfc\xb2\xeb&2|\xa4\xb3\x85\xa1\xd7K', 0x0) fallocate(r5, 0x0, 0x0, 0x3fffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) tkill(0x0, 0x14) r6 = getpgid(r2) kcmp(0x0, r6, 0x2, r1, r4) 08:43:55 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) gettid() accept$unix(r3, &(0x7f0000000400)=@abs, &(0x7f0000000480)=0x6e) ftruncate(0xffffffffffffffff, 0xfffffffffffffffb) chroot(&(0x7f0000000340)='./file0\x00') unshare(0x60020200) r5 = memfd_create(&(0x7f0000000240)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3*\x82t\x96\xf8\x00\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\x035\xd9\xfc\x9c\xdd\x9a\xf8.(\'\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%Q\x02\x85;\x00h\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef#\x94\x8b\x1f\xce\x06k\xbb\xf9\xaf\x96p\x99]\r\x00\xbc\xe5\xc2`\xaf\xc7\x1a\a\xa6]\x93\xf1~\xabz3\xfb\t\x03\x9aZ/\xcdP\xbasQz\xe6\xaeX$\xb7\xff\xf24s\xee[\xc1\xe8\x8c\x87\xc6F\xdd0n~\xe4\x90\xb3[Z\x9dq\xbb\xeb\xbe\xccO;r\xdf\x9c\xe0\xb3\xd7\xeb\xa6\xd9\xdc\xed\x91\x9fj\xcewv\xa20\xbb\x83\xad%IR\xc6\v\x87\xc2\xd9,\xa6\xa9{\xfc\xb2\xeb&2|\xa4\xb3\x85\xa1\xd7K', 0x0) fallocate(r5, 0x0, 0x0, 0x3fffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) tkill(0x0, 0x14) r6 = getpgid(r2) kcmp(0x0, r6, 0x2, r1, r4) 08:43:55 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r0, 0x1, 0xa, &(0x7f0000000480), &(0x7f0000000280)=0x4) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x5}, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000004000000000000000000850000000700000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r2}, 0x10) fallocate(r0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = getgid() r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSW(r5, 0x5403, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f0000000180)=0xff) r6 = syz_io_uring_setup(0x67a7, &(0x7f0000000680), &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000003000/0x3000)=nil, &(0x7f0000000180), &(0x7f00000000c0)=0x0) r8 = fsmount(0xffffffffffffffff, 0x1, 0x8) ioctl$TIOCSTI(r8, 0x5412, &(0x7f0000000540)=0x9) sync_file_range(0xffffffffffffffff, 0x3, 0xfffffffffffffffe, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x3, 0x1, 0x7ff, 0x6, 0x800, 0x6, 0x6, 0x401, 0x1}, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) io_uring_enter(r6, 0x6562, 0x3533, 0x12, &(0x7f0000000500), 0x8) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001e80)=[{{&(0x7f0000000300)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000000c0)=[{&(0x7f0000000380)="df37f1f9940f8245c63996b3426a18e532f3eb5fe694d8cf9102fe837c835d286571e27fc8242460824aad936d6c1012af3926e4a708f440e59f6ea217974c2f7bcc9a47be1c38d0bb5e080000b3d997a410067e436dfdb43508d80b986cb8334afd938e240325875f897f8a6b72a650d26efe19736caddea2a802c34be89086ed954750c73839149923053bc07b673be8c76c59fb150ff8b4cdd06fca5a4ecd584c6a80168f4eb00a070c7faf4ff151b60aac1af47fa82bad5b29a30850440cc62f275bcd3f5ee4d3ee9ef620bd61cc5a34e0fe58ded59c8bfe026ee737d66deea75e312769", 0xe6}], 0x1, 0x0, 0x0, 0x24008880}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="1c00000000000000", @ANYRES8=r4, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESHEX=r6, @ANYRES32=r9, @ANYRES32, @ANYRES8=r9, @ANYRESOCT=r3, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYBLOB="42c715cb248eb795b09b45cdcc2c2d83c86edd8020f25dd02cb9bc9846d4692f4236b6e99793f3fc255825c493fa0d32f0c9cdefb38ec369f32481f73645174950391c0d599abd7b7f48c39dcceca93c9a3d4c1977d1344dd3bb1d3131f1840da9b2ab878f980fd5599121bf02f8c5ed5fa13d383974d783a547a1bfc3e5182b68ba89dece73e1ae65203679e92849d22724536272acc2e6881ee99a", @ANYRES32=r7, @ANYRES32=r7], 0x78, 0x40000}}, {{0x0, 0x0, 0x0}}, {{&(0x7f0000001600)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000001800)=[{0x0}], 0x1, 0x0, 0x0, 0x8000}}], 0x4, 0x4084) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {0x1d}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$KDSKBMETA(r9, 0x4b63, &(0x7f00000004c0)=0x4) 08:43:55 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) gettid() accept$unix(r3, &(0x7f0000000400)=@abs, &(0x7f0000000480)=0x6e) ftruncate(0xffffffffffffffff, 0xfffffffffffffffb) chroot(&(0x7f0000000340)='./file0\x00') unshare(0x60020200) r5 = memfd_create(&(0x7f0000000240)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3*\x82t\x96\xf8\x00\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\x035\xd9\xfc\x9c\xdd\x9a\xf8.(\'\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%Q\x02\x85;\x00h\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef#\x94\x8b\x1f\xce\x06k\xbb\xf9\xaf\x96p\x99]\r\x00\xbc\xe5\xc2`\xaf\xc7\x1a\a\xa6]\x93\xf1~\xabz3\xfb\t\x03\x9aZ/\xcdP\xbasQz\xe6\xaeX$\xb7\xff\xf24s\xee[\xc1\xe8\x8c\x87\xc6F\xdd0n~\xe4\x90\xb3[Z\x9dq\xbb\xeb\xbe\xccO;r\xdf\x9c\xe0\xb3\xd7\xeb\xa6\xd9\xdc\xed\x91\x9fj\xcewv\xa20\xbb\x83\xad%IR\xc6\v\x87\xc2\xd9,\xa6\xa9{\xfc\xb2\xeb&2|\xa4\xb3\x85\xa1\xd7K', 0x0) fallocate(r5, 0x0, 0x0, 0x3fffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) tkill(0x0, 0x14) r6 = getpgid(r2) kcmp(0x0, r6, 0x2, r1, r4) 08:43:56 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) gettid() accept$unix(r3, &(0x7f0000000400)=@abs, &(0x7f0000000480)=0x6e) ftruncate(0xffffffffffffffff, 0xfffffffffffffffb) chroot(&(0x7f0000000340)='./file0\x00') unshare(0x60020200) r5 = memfd_create(&(0x7f0000000240)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3*\x82t\x96\xf8\x00\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\x035\xd9\xfc\x9c\xdd\x9a\xf8.(\'\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%Q\x02\x85;\x00h\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef#\x94\x8b\x1f\xce\x06k\xbb\xf9\xaf\x96p\x99]\r\x00\xbc\xe5\xc2`\xaf\xc7\x1a\a\xa6]\x93\xf1~\xabz3\xfb\t\x03\x9aZ/\xcdP\xbasQz\xe6\xaeX$\xb7\xff\xf24s\xee[\xc1\xe8\x8c\x87\xc6F\xdd0n~\xe4\x90\xb3[Z\x9dq\xbb\xeb\xbe\xccO;r\xdf\x9c\xe0\xb3\xd7\xeb\xa6\xd9\xdc\xed\x91\x9fj\xcewv\xa20\xbb\x83\xad%IR\xc6\v\x87\xc2\xd9,\xa6\xa9{\xfc\xb2\xeb&2|\xa4\xb3\x85\xa1\xd7K', 0x0) fallocate(r5, 0x0, 0x0, 0x3fffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) tkill(0x0, 0x14) r6 = getpgid(r2) kcmp(0x0, r6, 0x2, r1, r4) 08:43:57 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) gettid() accept$unix(r3, &(0x7f0000000400)=@abs, &(0x7f0000000480)=0x6e) ftruncate(0xffffffffffffffff, 0xfffffffffffffffb) chroot(&(0x7f0000000340)='./file0\x00') unshare(0x60020200) r5 = memfd_create(&(0x7f0000000240)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3*\x82t\x96\xf8\x00\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\x035\xd9\xfc\x9c\xdd\x9a\xf8.(\'\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%Q\x02\x85;\x00h\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef#\x94\x8b\x1f\xce\x06k\xbb\xf9\xaf\x96p\x99]\r\x00\xbc\xe5\xc2`\xaf\xc7\x1a\a\xa6]\x93\xf1~\xabz3\xfb\t\x03\x9aZ/\xcdP\xbasQz\xe6\xaeX$\xb7\xff\xf24s\xee[\xc1\xe8\x8c\x87\xc6F\xdd0n~\xe4\x90\xb3[Z\x9dq\xbb\xeb\xbe\xccO;r\xdf\x9c\xe0\xb3\xd7\xeb\xa6\xd9\xdc\xed\x91\x9fj\xcewv\xa20\xbb\x83\xad%IR\xc6\v\x87\xc2\xd9,\xa6\xa9{\xfc\xb2\xeb&2|\xa4\xb3\x85\xa1\xd7K', 0x0) fallocate(r5, 0x0, 0x0, 0x3fffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) tkill(0x0, 0x14) r6 = getpgid(r2) kcmp(0x0, r6, 0x2, r1, r4) 08:43:57 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r0, 0x1, 0xa, &(0x7f0000000480), &(0x7f0000000280)=0x4) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x5}, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000004000000000000000000850000000700000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r2}, 0x10) fallocate(r0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = getgid() r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSW(r5, 0x5403, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f0000000180)=0xff) r6 = syz_io_uring_setup(0x67a7, &(0x7f0000000680), &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000003000/0x3000)=nil, &(0x7f0000000180), &(0x7f00000000c0)=0x0) r8 = fsmount(0xffffffffffffffff, 0x1, 0x8) ioctl$TIOCSTI(r8, 0x5412, &(0x7f0000000540)=0x9) sync_file_range(0xffffffffffffffff, 0x3, 0xfffffffffffffffe, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x3, 0x1, 0x7ff, 0x6, 0x800, 0x6, 0x6, 0x401, 0x1}, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) io_uring_enter(r6, 0x6562, 0x3533, 0x12, &(0x7f0000000500), 0x8) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001e80)=[{{&(0x7f0000000300)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000000c0)=[{&(0x7f0000000380)="df37f1f9940f8245c63996b3426a18e532f3eb5fe694d8cf9102fe837c835d286571e27fc8242460824aad936d6c1012af3926e4a708f440e59f6ea217974c2f7bcc9a47be1c38d0bb5e080000b3d997a410067e436dfdb43508d80b986cb8334afd938e240325875f897f8a6b72a650d26efe19736caddea2a802c34be89086ed954750c73839149923053bc07b673be8c76c59fb150ff8b4cdd06fca5a4ecd584c6a80168f4eb00a070c7faf4ff151b60aac1af47fa82bad5b29a30850440cc62f275bcd3f5ee4d3ee9ef620bd61cc5a34e0fe58ded59c8bfe026ee737d66deea75e312769", 0xe6}], 0x1, 0x0, 0x0, 0x24008880}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="1c00000000000000", @ANYRES8=r4, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESHEX=r6, @ANYRES32=r9, @ANYRES32, @ANYRES8=r9, @ANYRESOCT=r3, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYBLOB="42c715cb248eb795b09b45cdcc2c2d83c86edd8020f25dd02cb9bc9846d4692f4236b6e99793f3fc255825c493fa0d32f0c9cdefb38ec369f32481f73645174950391c0d599abd7b7f48c39dcceca93c9a3d4c1977d1344dd3bb1d3131f1840da9b2ab878f980fd5599121bf02f8c5ed5fa13d383974d783a547a1bfc3e5182b68ba89dece73e1ae65203679e92849d22724536272acc2e6881ee99a", @ANYRES32=r7, @ANYRES32=r7], 0x78, 0x40000}}, {{0x0, 0x0, 0x0}}, {{&(0x7f0000001600)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000001800)=[{0x0}], 0x1, 0x0, 0x0, 0x8000}}], 0x4, 0x4084) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {0x1d}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$KDSKBMETA(r9, 0x4b63, &(0x7f00000004c0)=0x4) 08:43:58 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r0, 0x1, 0xa, &(0x7f0000000480), &(0x7f0000000280)=0x4) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x5}, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000004000000000000000000850000000700000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r2}, 0x10) fallocate(r0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = getgid() r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSW(r5, 0x5403, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f0000000180)=0xff) r6 = syz_io_uring_setup(0x67a7, &(0x7f0000000680), &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000003000/0x3000)=nil, &(0x7f0000000180), &(0x7f00000000c0)=0x0) r8 = fsmount(0xffffffffffffffff, 0x1, 0x8) ioctl$TIOCSTI(r8, 0x5412, &(0x7f0000000540)=0x9) sync_file_range(0xffffffffffffffff, 0x3, 0xfffffffffffffffe, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x3, 0x1, 0x7ff, 0x6, 0x800, 0x6, 0x6, 0x401, 0x1}, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) io_uring_enter(r6, 0x6562, 0x3533, 0x12, &(0x7f0000000500), 0x8) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001e80)=[{{&(0x7f0000000300)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000000c0)=[{&(0x7f0000000380)="df37f1f9940f8245c63996b3426a18e532f3eb5fe694d8cf9102fe837c835d286571e27fc8242460824aad936d6c1012af3926e4a708f440e59f6ea217974c2f7bcc9a47be1c38d0bb5e080000b3d997a410067e436dfdb43508d80b986cb8334afd938e240325875f897f8a6b72a650d26efe19736caddea2a802c34be89086ed954750c73839149923053bc07b673be8c76c59fb150ff8b4cdd06fca5a4ecd584c6a80168f4eb00a070c7faf4ff151b60aac1af47fa82bad5b29a30850440cc62f275bcd3f5ee4d3ee9ef620bd61cc5a34e0fe58ded59c8bfe026ee737d66deea75e312769", 0xe6}], 0x1, 0x0, 0x0, 0x24008880}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="1c00000000000000", @ANYRES8=r4, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESHEX=r6, @ANYRES32=r9, @ANYRES32, @ANYRES8=r9, @ANYRESOCT=r3, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYBLOB="42c715cb248eb795b09b45cdcc2c2d83c86edd8020f25dd02cb9bc9846d4692f4236b6e99793f3fc255825c493fa0d32f0c9cdefb38ec369f32481f73645174950391c0d599abd7b7f48c39dcceca93c9a3d4c1977d1344dd3bb1d3131f1840da9b2ab878f980fd5599121bf02f8c5ed5fa13d383974d783a547a1bfc3e5182b68ba89dece73e1ae65203679e92849d22724536272acc2e6881ee99a", @ANYRES32=r7, @ANYRES32=r7], 0x78, 0x40000}}, {{0x0, 0x0, 0x0}}, {{&(0x7f0000001600)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000001800)=[{0x0}], 0x1, 0x0, 0x0, 0x8000}}], 0x4, 0x4084) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {0x1d}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$KDSKBMETA(r9, 0x4b63, &(0x7f00000004c0)=0x4) 08:43:58 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) gettid() accept$unix(r3, &(0x7f0000000400)=@abs, &(0x7f0000000480)=0x6e) ftruncate(0xffffffffffffffff, 0xfffffffffffffffb) chroot(&(0x7f0000000340)='./file0\x00') unshare(0x60020200) r5 = memfd_create(&(0x7f0000000240)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3*\x82t\x96\xf8\x00\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\x035\xd9\xfc\x9c\xdd\x9a\xf8.(\'\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%Q\x02\x85;\x00h\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef#\x94\x8b\x1f\xce\x06k\xbb\xf9\xaf\x96p\x99]\r\x00\xbc\xe5\xc2`\xaf\xc7\x1a\a\xa6]\x93\xf1~\xabz3\xfb\t\x03\x9aZ/\xcdP\xbasQz\xe6\xaeX$\xb7\xff\xf24s\xee[\xc1\xe8\x8c\x87\xc6F\xdd0n~\xe4\x90\xb3[Z\x9dq\xbb\xeb\xbe\xccO;r\xdf\x9c\xe0\xb3\xd7\xeb\xa6\xd9\xdc\xed\x91\x9fj\xcewv\xa20\xbb\x83\xad%IR\xc6\v\x87\xc2\xd9,\xa6\xa9{\xfc\xb2\xeb&2|\xa4\xb3\x85\xa1\xd7K', 0x0) fallocate(r5, 0x0, 0x0, 0x3fffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) tkill(0x0, 0x14) r6 = getpgid(r2) kcmp(0x0, r6, 0x2, r1, r4) 08:43:58 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) lchown(&(0x7f00000049c0)='./file0\x00', 0x0, 0x0) 08:43:58 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) gettid() accept$unix(r3, &(0x7f0000000400)=@abs, &(0x7f0000000480)=0x6e) ftruncate(0xffffffffffffffff, 0xfffffffffffffffb) chroot(&(0x7f0000000340)='./file0\x00') unshare(0x60020200) r5 = memfd_create(&(0x7f0000000240)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3*\x82t\x96\xf8\x00\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\x035\xd9\xfc\x9c\xdd\x9a\xf8.(\'\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%Q\x02\x85;\x00h\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef#\x94\x8b\x1f\xce\x06k\xbb\xf9\xaf\x96p\x99]\r\x00\xbc\xe5\xc2`\xaf\xc7\x1a\a\xa6]\x93\xf1~\xabz3\xfb\t\x03\x9aZ/\xcdP\xbasQz\xe6\xaeX$\xb7\xff\xf24s\xee[\xc1\xe8\x8c\x87\xc6F\xdd0n~\xe4\x90\xb3[Z\x9dq\xbb\xeb\xbe\xccO;r\xdf\x9c\xe0\xb3\xd7\xeb\xa6\xd9\xdc\xed\x91\x9fj\xcewv\xa20\xbb\x83\xad%IR\xc6\v\x87\xc2\xd9,\xa6\xa9{\xfc\xb2\xeb&2|\xa4\xb3\x85\xa1\xd7K', 0x0) fallocate(r5, 0x0, 0x0, 0x3fffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) tkill(0x0, 0x14) r6 = getpgid(r2) kcmp(0x0, r6, 0x2, r1, r4) 08:43:58 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) lchown(&(0x7f00000049c0)='./file0\x00', 0x0, 0x0) 08:43:59 executing program 5: r0 = memfd_create(&(0x7f0000000ac0)='C\x13\xfc2\x95WD\xaa\xba^\x90\xfd\x8d\xc2\xb1[\x81\xda\xda\xd6\x8c\xc99\xec\x0e*||\xe4\xb3\xc4\xb6\v\xaa\x15\x86,\xac\x8d\x89cu\x10\xdc\x93\x9b\xb4\x93\xafE*:\xe4\xdd\xa5\xa75\xb8\x1e;7\xb7.V\xdcrw[\r\x98\x93j\x9c\xf6\xf8\x99\xefF_\xcd\xdf!b\xc5\xec\ntb\xff\b\xaaF?!\x9f\a\x1a\x03\f\xe94\x1deU\x06zS\xc9\xb4\xa7@\xa1\\B\xc2@\r_b\x9a\xeb\b\xa4(V\xd6/N\xc5\xc6f\xb1\x95Z\xe5w^\xd8\xe7J\x80\xf7\xae\xafuv\x84\x9eG\xd1\xe7\x9b\xf0_9\xc2\x9b\xfd\xc3\xf3\xe4\x95P\xf1m\xcf\xc2\xe1\xe6\xa6\x8c\x11\xfb\xb8S\x8b\x92\\\asW-Ee\x02\x00\x00\x00\xd0;Q\xc1~\x89\xec\xc8\x9b\x88\a\xf2\x93\x82(\x8b\x00\xd8\xb4T\x80\x95\x93i|\xc0\x00\x04\x00\x00\x00\x00\x00\x00v\xef\xee+\xab\x9c\x00^R\xb2n?i=\xbe\x16\x8a\xbf\xe3\xcdB\xed\xe14\xe8\xd0\xb7\xff\xfeQ\x1c\x85n8\x1b\xc1\b\x00\x00\x00\x00\x00\x00\x00\x17\x94\xdfW\x92z\xbe\xb2R)\xf1K\xd7\xaf\x99\xf6d\xe8\xec\xb7\xbd+T3\xa6\xa9\xfaY-1qs\x82\xefn*\x96\xc9\x1e\xf4\xd1\x02Dt\xc0\x19\xf7\x89\x96.D [F\xeeYW\x95\x13\xc7;\xb5\x13^\x13\xcb\xf0C\x9c\xabf\x1daCS2\x02\xb0\xef\xc7\x8c\x9e\xed\a\n0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r0, 0x1, 0xa, &(0x7f0000000480), &(0x7f0000000280)=0x4) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x5}, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000004000000000000000000850000000700000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r2}, 0x10) fallocate(r0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = getgid() r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSW(r5, 0x5403, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f0000000180)=0xff) r6 = syz_io_uring_setup(0x67a7, &(0x7f0000000680), &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000003000/0x3000)=nil, &(0x7f0000000180), &(0x7f00000000c0)=0x0) r8 = fsmount(0xffffffffffffffff, 0x1, 0x8) ioctl$TIOCSTI(r8, 0x5412, &(0x7f0000000540)=0x9) sync_file_range(0xffffffffffffffff, 0x3, 0xfffffffffffffffe, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x3, 0x1, 0x7ff, 0x6, 0x800, 0x6, 0x6, 0x401, 0x1}, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) io_uring_enter(r6, 0x6562, 0x3533, 0x12, &(0x7f0000000500), 0x8) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001e80)=[{{&(0x7f0000000300)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000000c0)=[{&(0x7f0000000380)="df37f1f9940f8245c63996b3426a18e532f3eb5fe694d8cf9102fe837c835d286571e27fc8242460824aad936d6c1012af3926e4a708f440e59f6ea217974c2f7bcc9a47be1c38d0bb5e080000b3d997a410067e436dfdb43508d80b986cb8334afd938e240325875f897f8a6b72a650d26efe19736caddea2a802c34be89086ed954750c73839149923053bc07b673be8c76c59fb150ff8b4cdd06fca5a4ecd584c6a80168f4eb00a070c7faf4ff151b60aac1af47fa82bad5b29a30850440cc62f275bcd3f5ee4d3ee9ef620bd61cc5a34e0fe58ded59c8bfe026ee737d66deea75e312769", 0xe6}], 0x1, 0x0, 0x0, 0x24008880}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="1c00000000000000", @ANYRES8=r4, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESHEX=r6, @ANYRES32=r9, @ANYRES32, @ANYRES8=r9, @ANYRESOCT=r3, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYBLOB="42c715cb248eb795b09b45cdcc2c2d83c86edd8020f25dd02cb9bc9846d4692f4236b6e99793f3fc255825c493fa0d32f0c9cdefb38ec369f32481f73645174950391c0d599abd7b7f48c39dcceca93c9a3d4c1977d1344dd3bb1d3131f1840da9b2ab878f980fd5599121bf02f8c5ed5fa13d383974d783a547a1bfc3e5182b68ba89dece73e1ae65203679e92849d22724536272acc2e6881ee99a", @ANYRES32=r7, @ANYRES32=r7], 0x78, 0x40000}}, {{0x0, 0x0, 0x0}}, {{&(0x7f0000001600)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000001800)=[{0x0}], 0x1, 0x0, 0x0, 0x8000}}], 0x4, 0x4084) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {0x1d}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$KDSKBMETA(r9, 0x4b63, &(0x7f00000004c0)=0x4) 08:44:00 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x8) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) gettid() accept$unix(r3, &(0x7f0000000400)=@abs, &(0x7f0000000480)=0x6e) ftruncate(0xffffffffffffffff, 0xfffffffffffffffb) chroot(&(0x7f0000000340)='./file0\x00') unshare(0x60020200) r5 = memfd_create(&(0x7f0000000240)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3*\x82t\x96\xf8\x00\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\x035\xd9\xfc\x9c\xdd\x9a\xf8.(\'\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%Q\x02\x85;\x00h\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef#\x94\x8b\x1f\xce\x06k\xbb\xf9\xaf\x96p\x99]\r\x00\xbc\xe5\xc2`\xaf\xc7\x1a\a\xa6]\x93\xf1~\xabz3\xfb\t\x03\x9aZ/\xcdP\xbasQz\xe6\xaeX$\xb7\xff\xf24s\xee[\xc1\xe8\x8c\x87\xc6F\xdd0n~\xe4\x90\xb3[Z\x9dq\xbb\xeb\xbe\xccO;r\xdf\x9c\xe0\xb3\xd7\xeb\xa6\xd9\xdc\xed\x91\x9fj\xcewv\xa20\xbb\x83\xad%IR\xc6\v\x87\xc2\xd9,\xa6\xa9{\xfc\xb2\xeb&2|\xa4\xb3\x85\xa1\xd7K', 0x0) fallocate(r5, 0x0, 0x0, 0x3fffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) tkill(0x0, 0x14) r6 = getpgid(r2) kcmp(0x0, r6, 0x2, r1, r4) 08:44:00 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000040)={'sit0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="73797a746e6c32000000ff8d14f8ff87", @ANYRES32, @ANYBLOB="0001e23f00007fff7fffffff451b00140067ffffff89"]}) 08:44:00 executing program 4: r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x8) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps_rollup\x00') preadv(r1, &(0x7f0000000140)=[{&(0x7f0000000180)=""/208, 0xd0}], 0x1, 0x0, 0x0) 08:44:00 executing program 5: r0 = memfd_create(&(0x7f0000000ac0)='C\x13\xfc2\x95WD\xaa\xba^\x90\xfd\x8d\xc2\xb1[\x81\xda\xda\xd6\x8c\xc99\xec\x0e*||\xe4\xb3\xc4\xb6\v\xaa\x15\x86,\xac\x8d\x89cu\x10\xdc\x93\x9b\xb4\x93\xafE*:\xe4\xdd\xa5\xa75\xb8\x1e;7\xb7.V\xdcrw[\r\x98\x93j\x9c\xf6\xf8\x99\xefF_\xcd\xdf!b\xc5\xec\ntb\xff\b\xaaF?!\x9f\a\x1a\x03\f\xe94\x1deU\x06zS\xc9\xb4\xa7@\xa1\\B\xc2@\r_b\x9a\xeb\b\xa4(V\xd6/N\xc5\xc6f\xb1\x95Z\xe5w^\xd8\xe7J\x80\xf7\xae\xafuv\x84\x9eG\xd1\xe7\x9b\xf0_9\xc2\x9b\xfd\xc3\xf3\xe4\x95P\xf1m\xcf\xc2\xe1\xe6\xa6\x8c\x11\xfb\xb8S\x8b\x92\\\asW-Ee\x02\x00\x00\x00\xd0;Q\xc1~\x89\xec\xc8\x9b\x88\a\xf2\x93\x82(\x8b\x00\xd8\xb4T\x80\x95\x93i|\xc0\x00\x04\x00\x00\x00\x00\x00\x00v\xef\xee+\xab\x9c\x00^R\xb2n?i=\xbe\x16\x8a\xbf\xe3\xcdB\xed\xe14\xe8\xd0\xb7\xff\xfeQ\x1c\x85n8\x1b\xc1\b\x00\x00\x00\x00\x00\x00\x00\x17\x94\xdfW\x92z\xbe\xb2R)\xf1K\xd7\xaf\x99\xf6d\xe8\xec\xb7\xbd+T3\xa6\xa9\xfaY-1qs\x82\xefn*\x96\xc9\x1e\xf4\xd1\x02Dt\xc0\x19\xf7\x89\x96.D [F\xeeYW\x95\x13\xc7;\xb5\x13^\x13\xcb\xf0C\x9c\xabf\x1daCS2\x02\xb0\xef\xc7\x8c\x9e\xed\a\n\x92z\xbe\xb2R)\xf1K\xd7\xaf\x99\xf6d\xe8\xec\xb7\xbd+T3\xa6\xa9\xfaY-1qs\x82\xefn*\x96\xc9\x1e\xf4\xd1\x02Dt\xc0\x19\xf7\x89\x96.D [F\xeeYW\x95\x13\xc7;\xb5\x13^\x13\xcb\xf0C\x9c\xabf\x1daCS2\x02\xb0\xef\xc7\x8c\x9e\xed\a\n0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r0, 0x1, 0xa, &(0x7f0000000480), &(0x7f0000000280)=0x4) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x5}, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000004000000000000000000850000000700000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r2}, 0x10) fallocate(r0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = getgid() r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSW(r5, 0x5403, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f0000000180)=0xff) r6 = syz_io_uring_setup(0x67a7, &(0x7f0000000680), &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000003000/0x3000)=nil, &(0x7f0000000180), &(0x7f00000000c0)=0x0) r8 = fsmount(0xffffffffffffffff, 0x1, 0x8) ioctl$TIOCSTI(r8, 0x5412, &(0x7f0000000540)=0x9) sync_file_range(0xffffffffffffffff, 0x3, 0xfffffffffffffffe, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x3, 0x1, 0x7ff, 0x6, 0x800, 0x6, 0x6, 0x401, 0x1}, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) io_uring_enter(r6, 0x6562, 0x3533, 0x12, &(0x7f0000000500), 0x8) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001e80)=[{{&(0x7f0000000300)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000000c0)=[{&(0x7f0000000380)="df37f1f9940f8245c63996b3426a18e532f3eb5fe694d8cf9102fe837c835d286571e27fc8242460824aad936d6c1012af3926e4a708f440e59f6ea217974c2f7bcc9a47be1c38d0bb5e080000b3d997a410067e436dfdb43508d80b986cb8334afd938e240325875f897f8a6b72a650d26efe19736caddea2a802c34be89086ed954750c73839149923053bc07b673be8c76c59fb150ff8b4cdd06fca5a4ecd584c6a80168f4eb00a070c7faf4ff151b60aac1af47fa82bad5b29a30850440cc62f275bcd3f5ee4d3ee9ef620bd61cc5a34e0fe58ded59c8bfe026ee737d66deea75e312769", 0xe6}], 0x1, 0x0, 0x0, 0x24008880}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="1c00000000000000", @ANYRES8=r4, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESHEX=r6, @ANYRES32=r9, @ANYRES32, @ANYRES8=r9, @ANYRESOCT=r3, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYBLOB="42c715cb248eb795b09b45cdcc2c2d83c86edd8020f25dd02cb9bc9846d4692f4236b6e99793f3fc255825c493fa0d32f0c9cdefb38ec369f32481f73645174950391c0d599abd7b7f48c39dcceca93c9a3d4c1977d1344dd3bb1d3131f1840da9b2ab878f980fd5599121bf02f8c5ed5fa13d383974d783a547a1bfc3e5182b68ba89dece73e1ae65203679e92849d22724536272acc2e6881ee99a", @ANYRES32=r7, @ANYRES32=r7], 0x78, 0x40000}}, {{0x0, 0x0, 0x0}}, {{&(0x7f0000001600)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000001800)=[{0x0}], 0x1, 0x0, 0x0, 0x8000}}], 0x4, 0x4084) syz_clone3(&(0x7f0000000a00)={0x40b86000, 0x0, 0x0, 0x0, {0x1d}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$KDSKBMETA(r9, 0x4b63, &(0x7f00000004c0)=0x4) 08:44:01 executing program 3: r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x8) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps_rollup\x00') preadv(r1, &(0x7f0000000140)=[{&(0x7f0000000180)=""/208, 0xd0}], 0x1, 0x0, 0x0) 08:44:01 executing program 4: r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x8) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps_rollup\x00') preadv(r1, &(0x7f0000000140)=[{&(0x7f0000000180)=""/208, 0xd0}], 0x1, 0x0, 0x0) 08:44:01 executing program 3: r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x8) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps_rollup\x00') preadv(r1, &(0x7f0000000140)=[{&(0x7f0000000180)=""/208, 0xd0}], 0x1, 0x0, 0x0) 08:44:01 executing program 4: r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x8) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps_rollup\x00') preadv(r1, &(0x7f0000000140)=[{&(0x7f0000000180)=""/208, 0xd0}], 0x1, 0x0, 0x0) 08:44:01 executing program 5: r0 = memfd_create(&(0x7f0000000ac0)='C\x13\xfc2\x95WD\xaa\xba^\x90\xfd\x8d\xc2\xb1[\x81\xda\xda\xd6\x8c\xc99\xec\x0e*||\xe4\xb3\xc4\xb6\v\xaa\x15\x86,\xac\x8d\x89cu\x10\xdc\x93\x9b\xb4\x93\xafE*:\xe4\xdd\xa5\xa75\xb8\x1e;7\xb7.V\xdcrw[\r\x98\x93j\x9c\xf6\xf8\x99\xefF_\xcd\xdf!b\xc5\xec\ntb\xff\b\xaaF?!\x9f\a\x1a\x03\f\xe94\x1deU\x06zS\xc9\xb4\xa7@\xa1\\B\xc2@\r_b\x9a\xeb\b\xa4(V\xd6/N\xc5\xc6f\xb1\x95Z\xe5w^\xd8\xe7J\x80\xf7\xae\xafuv\x84\x9eG\xd1\xe7\x9b\xf0_9\xc2\x9b\xfd\xc3\xf3\xe4\x95P\xf1m\xcf\xc2\xe1\xe6\xa6\x8c\x11\xfb\xb8S\x8b\x92\\\asW-Ee\x02\x00\x00\x00\xd0;Q\xc1~\x89\xec\xc8\x9b\x88\a\xf2\x93\x82(\x8b\x00\xd8\xb4T\x80\x95\x93i|\xc0\x00\x04\x00\x00\x00\x00\x00\x00v\xef\xee+\xab\x9c\x00^R\xb2n?i=\xbe\x16\x8a\xbf\xe3\xcdB\xed\xe14\xe8\xd0\xb7\xff\xfeQ\x1c\x85n8\x1b\xc1\b\x00\x00\x00\x00\x00\x00\x00\x17\x94\xdfW\x92z\xbe\xb2R)\xf1K\xd7\xaf\x99\xf6d\xe8\xec\xb7\xbd+T3\xa6\xa9\xfaY-1qs\x82\xefn*\x96\xc9\x1e\xf4\xd1\x02Dt\xc0\x19\xf7\x89\x96.D [F\xeeYW\x95\x13\xc7;\xb5\x13^\x13\xcb\xf0C\x9c\xabf\x1daCS2\x02\xb0\xef\xc7\x8c\x9e\xed\a\n\x92z\xbe\xb2R)\xf1K\xd7\xaf\x99\xf6d\xe8\xec\xb7\xbd+T3\xa6\xa9\xfaY-1qs\x82\xefn*\x96\xc9\x1e\xf4\xd1\x02Dt\xc0\x19\xf7\x89\x96.D [F\xeeYW\x95\x13\xc7;\xb5\x13^\x13\xcb\xf0C\x9c\xabf\x1daCS2\x02\xb0\xef\xc7\x8c\x9e\xed\a\n\x92z\xbe\xb2R)\xf1K\xd7\xaf\x99\xf6d\xe8\xec\xb7\xbd+T3\xa6\xa9\xfaY-1qs\x82\xefn*\x96\xc9\x1e\xf4\xd1\x02Dt\xc0\x19\xf7\x89\x96.D [F\xeeYW\x95\x13\xc7;\xb5\x13^\x13\xcb\xf0C\x9c\xabf\x1daCS2\x02\xb0\xef\xc7\x8c\x9e\xed\a\n\x92z\xbe\xb2R)\xf1K\xd7\xaf\x99\xf6d\xe8\xec\xb7\xbd+T3\xa6\xa9\xfaY-1qs\x82\xefn*\x96\xc9\x1e\xf4\xd1\x02Dt\xc0\x19\xf7\x89\x96.D [F\xeeYW\x95\x13\xc7;\xb5\x13^\x13\xcb\xf0C\x9c\xabf\x1daCS2\x02\xb0\xef\xc7\x8c\x9e\xed\a\n0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff000000", @ANYRES32=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) bind$packet(r0, &(0x7f0000000300)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @local}, 0x14) sendto$packet(r0, &(0x7f0000000500)="93a745710b01619b9a2be11a080046728283d88c045f30e7e9268c67799779bffcd0", 0x22, 0x0, 0x0, 0x0) 08:44:03 executing program 4: r0 = socket(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x1a6, 0x4) setsockopt$sock_int(r0, 0x1, 0x29, &(0x7f0000000040)=0xfa6c, 0x4) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000600)={0x2, 0x0, @multicast2}, 0x10) recvmsg(r0, &(0x7f0000000940)={0x0, 0x0, 0x0}, 0x40002026) 08:44:03 executing program 1: r0 = socket(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x1a6, 0x4) setsockopt$sock_int(r0, 0x1, 0x29, &(0x7f0000000040)=0xfa6c, 0x4) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000600)={0x2, 0x0, @multicast2}, 0x10) recvmsg(r0, &(0x7f0000000940)={0x0, 0x0, 0x0}, 0x40002026) 08:44:03 executing program 3: unshare(0xa060600) r0 = syz_open_dev$loop(&(0x7f00000003c0), 0x2, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f0000000400)) 08:44:03 executing program 2: unshare(0xa060600) r0 = syz_open_dev$loop(&(0x7f00000003c0), 0x2, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f0000000400)) 08:44:03 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f0000000100)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_key={0x2, 0x9, 0x40, 0x0, "e4877eb35a2651ab"}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x60}, 0x1, 0x7}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x9, 0x0, 0x3, 0x2}, 0x10}}, 0x0) 08:44:03 executing program 3: unshare(0xa060600) r0 = syz_open_dev$loop(&(0x7f00000003c0), 0x2, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f0000000400)) 08:44:03 executing program 1: r0 = socket(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x1a6, 0x4) setsockopt$sock_int(r0, 0x1, 0x29, &(0x7f0000000040)=0xfa6c, 0x4) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000600)={0x2, 0x0, @multicast2}, 0x10) recvmsg(r0, &(0x7f0000000940)={0x0, 0x0, 0x0}, 0x40002026) [ 83.052281][ T4242] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 08:44:03 executing program 2: unshare(0xa060600) r0 = syz_open_dev$loop(&(0x7f00000003c0), 0x2, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f0000000400)) 08:44:03 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x81, 0x8b}, 0x0) syz_mount_image$vfat(&(0x7f0000001200), &(0x7f0000001240)='./file0\x00', 0x10, &(0x7f0000000000)=ANY=[], 0x1, 0x11ec, &(0x7f0000002480)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.kill\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x800) lseek(r2, 0x200, 0x0) r3 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x10000) write$binfmt_script(r0, &(0x7f00000007c0)=ANY=[], 0x6db6e559) 08:44:03 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f00000001c0), 0x8) readv(r0, &(0x7f0000000040)=[{&(0x7f0000000340)=""/224, 0xe0}], 0x1) mkdir(&(0x7f0000000200)='./control\x00', 0x0) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r1, 0x4, 0x2c00) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f00000000c0)={[0xfbfffffffffffefd]}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x20) inotify_add_watch(r1, &(0x7f0000000100)='./control\x00', 0xe4000c64) open(&(0x7f0000000140)='./control\x00', 0x0, 0x0) 08:44:03 executing program 3: unshare(0xa060600) r0 = syz_open_dev$loop(&(0x7f00000003c0), 0x2, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f0000000400)) 08:44:03 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x92}}, 0x0) getsockname$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff000000", @ANYRES32=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) bind$packet(r0, &(0x7f0000000300)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @local}, 0x14) sendto$packet(r0, &(0x7f0000000500)="93a745710b01619b9a2be11a080046728283d88c045f30e7e9268c67799779bffcd0", 0x22, 0x0, 0x0, 0x0) 08:44:03 executing program 2: unshare(0xa060600) r0 = syz_open_dev$loop(&(0x7f00000003c0), 0x2, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f0000000400)) 08:44:03 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/slabinfo\x00', 0x0, 0x0) lseek(r0, 0x55f0, 0x0) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x5, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) getsockopt$IP_VS_SO_GET_INFO(r1, 0x0, 0x481, &(0x7f0000000080), &(0x7f0000000900)=0xc) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/vlan/vlan0\x00') readv(r2, &(0x7f0000000500)=[{&(0x7f0000000140)=""/111, 0x6f}], 0x1) perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x82, &(0x7f0000000080)={@multicast, @random="e0d35b1004bb", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x74, 0x66, 0x0, 0x0, 0x1, 0x0, @rand_addr=0x64010101, @local}, @time_exceeded={0x3, 0x4, 0x0, 0x3, 0x1, 0x0, {0x16, 0x4, 0x0, 0x0, 0x0, 0x66, 0x0, 0x0, 0x1, 0x0, @loopback, @remote, {[@timestamp_prespec={0x44, 0x44, 0x0, 0x3, 0x9, [{@broadcast}, {@multicast2}, {@loopback}, {@multicast2}, {@multicast2}, {@loopback}, {@loopback}, {@private, 0x6}]}]}}}}}}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x7) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$batadv(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_GATEWAYS(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)={0x1c, r7, 0x711, 0x0, 0x0, {0x9}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000410}, 0x20000004) setsockopt$IPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x41, &(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000002000000000200"/63], 0x48) r8 = syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), 0xffffffffffffffff) setxattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='trusted.overlay.opaque\x00', &(0x7f0000000340)='batadv\x00', 0x7, 0x3) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x52000800}, 0xc, &(0x7f0000000200)={&(0x7f00000006c0)=ANY=[@ANYBLOB="0ead97f5438694c4950facc34000000012da27431f7f360f0052a05e796fd5a90ae873bdbe9e189811d408cda4ebd73ef135725d08ced88fa363b1fdb7ae0c928b0135c299323981890387029db18e3002a9df00021580982669901a083dd400ab432b9863835e75af97213dec9a337cfb644e0ea2f41dd3ddc497a7524d9390ac473900452427ad81aea0950c102051df8519b3c05d7d262c44e3bc51efa6a23ac536979726b176a560c7e12247ee20309b2192d2c1c7a24ac0f244d823ab4b653ae79b5268f77b13a2fbe3b2f867a4c0e472f7229ca911abf4ed2f4fa9ba11d46b8c7bb3094baa00"/253, @ANYRES16=r8, @ANYBLOB="200000000000fedbdf25010000002c00018014000200687372300000000000000000000000001400020073797a6b616c6c657230000000000000"], 0x40}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x24022494}, 0x4000000) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="3c0000001000855f8c01d7a88937020000000000fb12153f3f410dde3823c7ea255a21e951a7aa28ab1658b8ba22fe8b32ce4b4de8a84c972af678c6f82c31952fb3f34aaebb06492e91f432932e32d05e2953a17ff4ab87e4db6a9e62853266ccf5461f98def56d2e92ecb33882ac4dd9b6f8e870c6df6a0b6f54c267c6eabb00f54ab0af524b", @ANYRES32=r11, @ANYRESOCT=r5], 0x3c}}, 0x24004835) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000001b00)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xa, &(0x7f0000001ac0)={&(0x7f0000000440)={0x5c, r8, 0x204, 0x70bd27, 0x25dfdbfd, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x4}, @HEADER={0x4}, @HEADER={0x34}]}, 0x5c}, 0x1, 0x0, 0x0, 0x8000}, 0x0) getsockopt$sock_linger(r9, 0x1, 0xd, &(0x7f0000000540), &(0x7f0000000380)=0x3c) sendmsg$nl_route(r10, &(0x7f0000000840)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000800)={&(0x7f0000000640)=@ipv6_newrule={0x58, 0x20, 0x100, 0x70bd29, 0x25dfdbfe, {0xa, 0x80, 0x0, 0x40, 0x5, 0x0, 0x0, 0x0, 0x10010}, [@FRA_SRC={0x14, 0x2, @local}, @FRA_DST={0x14, 0x1, @dev={0xfe, 0x80, '\x00', 0x2b}}, @FRA_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000000}, 0x8000) getsockname$packet(r10, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) 08:44:03 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f00000001c0), 0x8) readv(r0, &(0x7f0000000040)=[{&(0x7f0000000340)=""/224, 0xe0}], 0x1) mkdir(&(0x7f0000000200)='./control\x00', 0x0) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r1, 0x4, 0x2c00) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f00000000c0)={[0xfbfffffffffffefd]}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x20) inotify_add_watch(r1, &(0x7f0000000100)='./control\x00', 0xe4000c64) open(&(0x7f0000000140)='./control\x00', 0x0, 0x0) 08:44:03 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x92}}, 0x0) getsockname$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff000000", @ANYRES32=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) bind$packet(r0, &(0x7f0000000300)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @local}, 0x14) sendto$packet(r0, &(0x7f0000000500)="93a745710b01619b9a2be11a080046728283d88c045f30e7e9268c67799779bffcd0", 0x22, 0x0, 0x0, 0x0) [ 83.237240][ T4271] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 83.305114][ T25] audit: type=1400 audit(1686213843.430:199): avc: denied { write } for pid=4276 comm="syz-executor.3" name="vlan0" dev="proc" ino=4026533398 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 83.330373][ T4261] loop4: detected capacity change from 0 to 8192 [ 83.343723][ T4282] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 83.344300][ T4277] Zero length message leads to an empty skb 08:44:03 executing program 2: r0 = signalfd(0xffffffffffffffff, &(0x7f00000001c0), 0x8) readv(r0, &(0x7f0000000040)=[{&(0x7f0000000340)=""/224, 0xe0}], 0x1) mkdir(&(0x7f0000000200)='./control\x00', 0x0) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r1, 0x4, 0x2c00) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f00000000c0)={[0xfbfffffffffffefd]}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x20) inotify_add_watch(r1, &(0x7f0000000100)='./control\x00', 0xe4000c64) open(&(0x7f0000000140)='./control\x00', 0x0, 0x0) 08:44:03 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/slabinfo\x00', 0x0, 0x0) lseek(r0, 0x55f0, 0x0) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x5, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) getsockopt$IP_VS_SO_GET_INFO(r1, 0x0, 0x481, &(0x7f0000000080), &(0x7f0000000900)=0xc) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/vlan/vlan0\x00') readv(r2, &(0x7f0000000500)=[{&(0x7f0000000140)=""/111, 0x6f}], 0x1) perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x82, &(0x7f0000000080)={@multicast, @random="e0d35b1004bb", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x74, 0x66, 0x0, 0x0, 0x1, 0x0, @rand_addr=0x64010101, @local}, @time_exceeded={0x3, 0x4, 0x0, 0x3, 0x1, 0x0, {0x16, 0x4, 0x0, 0x0, 0x0, 0x66, 0x0, 0x0, 0x1, 0x0, @loopback, @remote, {[@timestamp_prespec={0x44, 0x44, 0x0, 0x3, 0x9, [{@broadcast}, {@multicast2}, {@loopback}, {@multicast2}, {@multicast2}, {@loopback}, {@loopback}, {@private, 0x6}]}]}}}}}}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x7) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$batadv(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_GATEWAYS(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)={0x1c, r7, 0x711, 0x0, 0x0, {0x9}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000410}, 0x20000004) setsockopt$IPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x41, &(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000002000000000200"/63], 0x48) r8 = syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), 0xffffffffffffffff) setxattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='trusted.overlay.opaque\x00', &(0x7f0000000340)='batadv\x00', 0x7, 0x3) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x52000800}, 0xc, &(0x7f0000000200)={&(0x7f00000006c0)=ANY=[@ANYBLOB="0ead97f5438694c4950facc34000000012da27431f7f360f0052a05e796fd5a90ae873bdbe9e189811d408cda4ebd73ef135725d08ced88fa363b1fdb7ae0c928b0135c299323981890387029db18e3002a9df00021580982669901a083dd400ab432b9863835e75af97213dec9a337cfb644e0ea2f41dd3ddc497a7524d9390ac473900452427ad81aea0950c102051df8519b3c05d7d262c44e3bc51efa6a23ac536979726b176a560c7e12247ee20309b2192d2c1c7a24ac0f244d823ab4b653ae79b5268f77b13a2fbe3b2f867a4c0e472f7229ca911abf4ed2f4fa9ba11d46b8c7bb3094baa00"/253, @ANYRES16=r8, @ANYBLOB="200000000000fedbdf25010000002c00018014000200687372300000000000000000000000001400020073797a6b616c6c657230000000000000"], 0x40}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x24022494}, 0x4000000) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="3c0000001000855f8c01d7a88937020000000000fb12153f3f410dde3823c7ea255a21e951a7aa28ab1658b8ba22fe8b32ce4b4de8a84c972af678c6f82c31952fb3f34aaebb06492e91f432932e32d05e2953a17ff4ab87e4db6a9e62853266ccf5461f98def56d2e92ecb33882ac4dd9b6f8e870c6df6a0b6f54c267c6eabb00f54ab0af524b", @ANYRES32=r11, @ANYRESOCT=r5], 0x3c}}, 0x24004835) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000001b00)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xa, &(0x7f0000001ac0)={&(0x7f0000000440)={0x5c, r8, 0x204, 0x70bd27, 0x25dfdbfd, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x4}, @HEADER={0x4}, @HEADER={0x34}]}, 0x5c}, 0x1, 0x0, 0x0, 0x8000}, 0x0) getsockopt$sock_linger(r9, 0x1, 0xd, &(0x7f0000000540), &(0x7f0000000380)=0x3c) sendmsg$nl_route(r10, &(0x7f0000000840)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000800)={&(0x7f0000000640)=@ipv6_newrule={0x58, 0x20, 0x100, 0x70bd29, 0x25dfdbfe, {0xa, 0x80, 0x0, 0x40, 0x5, 0x0, 0x0, 0x0, 0x10010}, [@FRA_SRC={0x14, 0x2, @local}, @FRA_DST={0x14, 0x1, @dev={0xfe, 0x80, '\x00', 0x2b}}, @FRA_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000000}, 0x8000) getsockname$packet(r10, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) 08:44:03 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/slabinfo\x00', 0x0, 0x0) lseek(r0, 0x55f0, 0x0) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x5, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) getsockopt$IP_VS_SO_GET_INFO(r1, 0x0, 0x481, &(0x7f0000000080), &(0x7f0000000900)=0xc) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/vlan/vlan0\x00') readv(r2, &(0x7f0000000500)=[{&(0x7f0000000140)=""/111, 0x6f}], 0x1) perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x82, &(0x7f0000000080)={@multicast, @random="e0d35b1004bb", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x74, 0x66, 0x0, 0x0, 0x1, 0x0, @rand_addr=0x64010101, @local}, @time_exceeded={0x3, 0x4, 0x0, 0x3, 0x1, 0x0, {0x16, 0x4, 0x0, 0x0, 0x0, 0x66, 0x0, 0x0, 0x1, 0x0, @loopback, @remote, {[@timestamp_prespec={0x44, 0x44, 0x0, 0x3, 0x9, [{@broadcast}, {@multicast2}, {@loopback}, {@multicast2}, {@multicast2}, {@loopback}, {@loopback}, {@private, 0x6}]}]}}}}}}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x7) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$batadv(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_GATEWAYS(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)={0x1c, r7, 0x711, 0x0, 0x0, {0x9}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000410}, 0x20000004) setsockopt$IPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x41, &(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000002000000000200"/63], 0x48) r8 = syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), 0xffffffffffffffff) setxattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='trusted.overlay.opaque\x00', &(0x7f0000000340)='batadv\x00', 0x7, 0x3) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x52000800}, 0xc, &(0x7f0000000200)={&(0x7f00000006c0)=ANY=[@ANYBLOB="0ead97f5438694c4950facc34000000012da27431f7f360f0052a05e796fd5a90ae873bdbe9e189811d408cda4ebd73ef135725d08ced88fa363b1fdb7ae0c928b0135c299323981890387029db18e3002a9df00021580982669901a083dd400ab432b9863835e75af97213dec9a337cfb644e0ea2f41dd3ddc497a7524d9390ac473900452427ad81aea0950c102051df8519b3c05d7d262c44e3bc51efa6a23ac536979726b176a560c7e12247ee20309b2192d2c1c7a24ac0f244d823ab4b653ae79b5268f77b13a2fbe3b2f867a4c0e472f7229ca911abf4ed2f4fa9ba11d46b8c7bb3094baa00"/253, @ANYRES16=r8, @ANYBLOB="200000000000fedbdf25010000002c00018014000200687372300000000000000000000000001400020073797a6b616c6c657230000000000000"], 0x40}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x24022494}, 0x4000000) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="3c0000001000855f8c01d7a88937020000000000fb12153f3f410dde3823c7ea255a21e951a7aa28ab1658b8ba22fe8b32ce4b4de8a84c972af678c6f82c31952fb3f34aaebb06492e91f432932e32d05e2953a17ff4ab87e4db6a9e62853266ccf5461f98def56d2e92ecb33882ac4dd9b6f8e870c6df6a0b6f54c267c6eabb00f54ab0af524b", @ANYRES32=r11, @ANYRESOCT=r5], 0x3c}}, 0x24004835) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000001b00)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xa, &(0x7f0000001ac0)={&(0x7f0000000440)={0x5c, r8, 0x204, 0x70bd27, 0x25dfdbfd, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x4}, @HEADER={0x4}, @HEADER={0x34}]}, 0x5c}, 0x1, 0x0, 0x0, 0x8000}, 0x0) getsockopt$sock_linger(r9, 0x1, 0xd, &(0x7f0000000540), &(0x7f0000000380)=0x3c) sendmsg$nl_route(r10, &(0x7f0000000840)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000800)={&(0x7f0000000640)=@ipv6_newrule={0x58, 0x20, 0x100, 0x70bd29, 0x25dfdbfe, {0xa, 0x80, 0x0, 0x40, 0x5, 0x0, 0x0, 0x0, 0x10010}, [@FRA_SRC={0x14, 0x2, @local}, @FRA_DST={0x14, 0x1, @dev={0xfe, 0x80, '\x00', 0x2b}}, @FRA_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000000}, 0x8000) getsockname$packet(r10, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) 08:44:03 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x92}}, 0x0) getsockname$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff000000", @ANYRES32=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) bind$packet(r0, &(0x7f0000000300)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @local}, 0x14) sendto$packet(r0, &(0x7f0000000500)="93a745710b01619b9a2be11a080046728283d88c045f30e7e9268c67799779bffcd0", 0x22, 0x0, 0x0, 0x0) [ 83.476498][ T4294] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 08:44:04 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x81, 0x8b}, 0x0) syz_mount_image$vfat(&(0x7f0000001200), &(0x7f0000001240)='./file0\x00', 0x10, &(0x7f0000000000)=ANY=[], 0x1, 0x11ec, &(0x7f0000002480)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.kill\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x800) lseek(r2, 0x200, 0x0) r3 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x10000) write$binfmt_script(r0, &(0x7f00000007c0)=ANY=[], 0x6db6e559) 08:44:04 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/slabinfo\x00', 0x0, 0x0) lseek(r0, 0x55f0, 0x0) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x5, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) getsockopt$IP_VS_SO_GET_INFO(r1, 0x0, 0x481, &(0x7f0000000080), &(0x7f0000000900)=0xc) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/vlan/vlan0\x00') readv(r2, &(0x7f0000000500)=[{&(0x7f0000000140)=""/111, 0x6f}], 0x1) perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x82, &(0x7f0000000080)={@multicast, @random="e0d35b1004bb", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x74, 0x66, 0x0, 0x0, 0x1, 0x0, @rand_addr=0x64010101, @local}, @time_exceeded={0x3, 0x4, 0x0, 0x3, 0x1, 0x0, {0x16, 0x4, 0x0, 0x0, 0x0, 0x66, 0x0, 0x0, 0x1, 0x0, @loopback, @remote, {[@timestamp_prespec={0x44, 0x44, 0x0, 0x3, 0x9, [{@broadcast}, {@multicast2}, {@loopback}, {@multicast2}, {@multicast2}, {@loopback}, {@loopback}, {@private, 0x6}]}]}}}}}}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x7) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$batadv(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_GATEWAYS(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)={0x1c, r7, 0x711, 0x0, 0x0, {0x9}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000410}, 0x20000004) setsockopt$IPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x41, &(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000002000000000200"/63], 0x48) r8 = syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), 0xffffffffffffffff) setxattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='trusted.overlay.opaque\x00', &(0x7f0000000340)='batadv\x00', 0x7, 0x3) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x52000800}, 0xc, &(0x7f0000000200)={&(0x7f00000006c0)=ANY=[@ANYBLOB="0ead97f5438694c4950facc34000000012da27431f7f360f0052a05e796fd5a90ae873bdbe9e189811d408cda4ebd73ef135725d08ced88fa363b1fdb7ae0c928b0135c299323981890387029db18e3002a9df00021580982669901a083dd400ab432b9863835e75af97213dec9a337cfb644e0ea2f41dd3ddc497a7524d9390ac473900452427ad81aea0950c102051df8519b3c05d7d262c44e3bc51efa6a23ac536979726b176a560c7e12247ee20309b2192d2c1c7a24ac0f244d823ab4b653ae79b5268f77b13a2fbe3b2f867a4c0e472f7229ca911abf4ed2f4fa9ba11d46b8c7bb3094baa00"/253, @ANYRES16=r8, @ANYBLOB="200000000000fedbdf25010000002c00018014000200687372300000000000000000000000001400020073797a6b616c6c657230000000000000"], 0x40}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x24022494}, 0x4000000) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="3c0000001000855f8c01d7a88937020000000000fb12153f3f410dde3823c7ea255a21e951a7aa28ab1658b8ba22fe8b32ce4b4de8a84c972af678c6f82c31952fb3f34aaebb06492e91f432932e32d05e2953a17ff4ab87e4db6a9e62853266ccf5461f98def56d2e92ecb33882ac4dd9b6f8e870c6df6a0b6f54c267c6eabb00f54ab0af524b", @ANYRES32=r11, @ANYRESOCT=r5], 0x3c}}, 0x24004835) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000001b00)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xa, &(0x7f0000001ac0)={&(0x7f0000000440)={0x5c, r8, 0x204, 0x70bd27, 0x25dfdbfd, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x4}, @HEADER={0x4}, @HEADER={0x34}]}, 0x5c}, 0x1, 0x0, 0x0, 0x8000}, 0x0) getsockopt$sock_linger(r9, 0x1, 0xd, &(0x7f0000000540), &(0x7f0000000380)=0x3c) sendmsg$nl_route(r10, &(0x7f0000000840)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000800)={&(0x7f0000000640)=@ipv6_newrule={0x58, 0x20, 0x100, 0x70bd29, 0x25dfdbfe, {0xa, 0x80, 0x0, 0x40, 0x5, 0x0, 0x0, 0x0, 0x10010}, [@FRA_SRC={0x14, 0x2, @local}, @FRA_DST={0x14, 0x1, @dev={0xfe, 0x80, '\x00', 0x2b}}, @FRA_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000000}, 0x8000) getsockname$packet(r10, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) 08:44:04 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/slabinfo\x00', 0x0, 0x0) lseek(r0, 0x55f0, 0x0) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x5, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) getsockopt$IP_VS_SO_GET_INFO(r1, 0x0, 0x481, &(0x7f0000000080), &(0x7f0000000900)=0xc) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/vlan/vlan0\x00') readv(r2, &(0x7f0000000500)=[{&(0x7f0000000140)=""/111, 0x6f}], 0x1) perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x82, &(0x7f0000000080)={@multicast, @random="e0d35b1004bb", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x74, 0x66, 0x0, 0x0, 0x1, 0x0, @rand_addr=0x64010101, @local}, @time_exceeded={0x3, 0x4, 0x0, 0x3, 0x1, 0x0, {0x16, 0x4, 0x0, 0x0, 0x0, 0x66, 0x0, 0x0, 0x1, 0x0, @loopback, @remote, {[@timestamp_prespec={0x44, 0x44, 0x0, 0x3, 0x9, [{@broadcast}, {@multicast2}, {@loopback}, {@multicast2}, {@multicast2}, {@loopback}, {@loopback}, {@private, 0x6}]}]}}}}}}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x7) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$batadv(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_GATEWAYS(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)={0x1c, r7, 0x711, 0x0, 0x0, {0x9}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000410}, 0x20000004) setsockopt$IPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x41, &(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000002000000000200"/63], 0x48) r8 = syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), 0xffffffffffffffff) setxattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='trusted.overlay.opaque\x00', &(0x7f0000000340)='batadv\x00', 0x7, 0x3) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x52000800}, 0xc, &(0x7f0000000200)={&(0x7f00000006c0)=ANY=[@ANYBLOB="0ead97f5438694c4950facc34000000012da27431f7f360f0052a05e796fd5a90ae873bdbe9e189811d408cda4ebd73ef135725d08ced88fa363b1fdb7ae0c928b0135c299323981890387029db18e3002a9df00021580982669901a083dd400ab432b9863835e75af97213dec9a337cfb644e0ea2f41dd3ddc497a7524d9390ac473900452427ad81aea0950c102051df8519b3c05d7d262c44e3bc51efa6a23ac536979726b176a560c7e12247ee20309b2192d2c1c7a24ac0f244d823ab4b653ae79b5268f77b13a2fbe3b2f867a4c0e472f7229ca911abf4ed2f4fa9ba11d46b8c7bb3094baa00"/253, @ANYRES16=r8, @ANYBLOB="200000000000fedbdf25010000002c00018014000200687372300000000000000000000000001400020073797a6b616c6c657230000000000000"], 0x40}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x24022494}, 0x4000000) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="3c0000001000855f8c01d7a88937020000000000fb12153f3f410dde3823c7ea255a21e951a7aa28ab1658b8ba22fe8b32ce4b4de8a84c972af678c6f82c31952fb3f34aaebb06492e91f432932e32d05e2953a17ff4ab87e4db6a9e62853266ccf5461f98def56d2e92ecb33882ac4dd9b6f8e870c6df6a0b6f54c267c6eabb00f54ab0af524b", @ANYRES32=r11, @ANYRESOCT=r5], 0x3c}}, 0x24004835) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000001b00)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xa, &(0x7f0000001ac0)={&(0x7f0000000440)={0x5c, r8, 0x204, 0x70bd27, 0x25dfdbfd, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x4}, @HEADER={0x4}, @HEADER={0x34}]}, 0x5c}, 0x1, 0x0, 0x0, 0x8000}, 0x0) getsockopt$sock_linger(r9, 0x1, 0xd, &(0x7f0000000540), &(0x7f0000000380)=0x3c) sendmsg$nl_route(r10, &(0x7f0000000840)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000800)={&(0x7f0000000640)=@ipv6_newrule={0x58, 0x20, 0x100, 0x70bd29, 0x25dfdbfe, {0xa, 0x80, 0x0, 0x40, 0x5, 0x0, 0x0, 0x0, 0x10010}, [@FRA_SRC={0x14, 0x2, @local}, @FRA_DST={0x14, 0x1, @dev={0xfe, 0x80, '\x00', 0x2b}}, @FRA_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000000}, 0x8000) getsockname$packet(r10, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) 08:44:04 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/slabinfo\x00', 0x0, 0x0) lseek(r0, 0x55f0, 0x0) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x5, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) getsockopt$IP_VS_SO_GET_INFO(r1, 0x0, 0x481, &(0x7f0000000080), &(0x7f0000000900)=0xc) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/vlan/vlan0\x00') readv(r2, &(0x7f0000000500)=[{&(0x7f0000000140)=""/111, 0x6f}], 0x1) perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x82, &(0x7f0000000080)={@multicast, @random="e0d35b1004bb", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x74, 0x66, 0x0, 0x0, 0x1, 0x0, @rand_addr=0x64010101, @local}, @time_exceeded={0x3, 0x4, 0x0, 0x3, 0x1, 0x0, {0x16, 0x4, 0x0, 0x0, 0x0, 0x66, 0x0, 0x0, 0x1, 0x0, @loopback, @remote, {[@timestamp_prespec={0x44, 0x44, 0x0, 0x3, 0x9, [{@broadcast}, {@multicast2}, {@loopback}, {@multicast2}, {@multicast2}, {@loopback}, {@loopback}, {@private, 0x6}]}]}}}}}}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x7) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$batadv(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_GATEWAYS(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)={0x1c, r7, 0x711, 0x0, 0x0, {0x9}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000410}, 0x20000004) setsockopt$IPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x41, &(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000002000000000200"/63], 0x48) r8 = syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), 0xffffffffffffffff) setxattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='trusted.overlay.opaque\x00', &(0x7f0000000340)='batadv\x00', 0x7, 0x3) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x52000800}, 0xc, &(0x7f0000000200)={&(0x7f00000006c0)=ANY=[@ANYBLOB="0ead97f5438694c4950facc34000000012da27431f7f360f0052a05e796fd5a90ae873bdbe9e189811d408cda4ebd73ef135725d08ced88fa363b1fdb7ae0c928b0135c299323981890387029db18e3002a9df00021580982669901a083dd400ab432b9863835e75af97213dec9a337cfb644e0ea2f41dd3ddc497a7524d9390ac473900452427ad81aea0950c102051df8519b3c05d7d262c44e3bc51efa6a23ac536979726b176a560c7e12247ee20309b2192d2c1c7a24ac0f244d823ab4b653ae79b5268f77b13a2fbe3b2f867a4c0e472f7229ca911abf4ed2f4fa9ba11d46b8c7bb3094baa00"/253, @ANYRES16=r8, @ANYBLOB="200000000000fedbdf25010000002c00018014000200687372300000000000000000000000001400020073797a6b616c6c657230000000000000"], 0x40}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x24022494}, 0x4000000) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="3c0000001000855f8c01d7a88937020000000000fb12153f3f410dde3823c7ea255a21e951a7aa28ab1658b8ba22fe8b32ce4b4de8a84c972af678c6f82c31952fb3f34aaebb06492e91f432932e32d05e2953a17ff4ab87e4db6a9e62853266ccf5461f98def56d2e92ecb33882ac4dd9b6f8e870c6df6a0b6f54c267c6eabb00f54ab0af524b", @ANYRES32=r11, @ANYRESOCT=r5], 0x3c}}, 0x24004835) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000001b00)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xa, &(0x7f0000001ac0)={&(0x7f0000000440)={0x5c, r8, 0x204, 0x70bd27, 0x25dfdbfd, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x4}, @HEADER={0x4}, @HEADER={0x34}]}, 0x5c}, 0x1, 0x0, 0x0, 0x8000}, 0x0) getsockopt$sock_linger(r9, 0x1, 0xd, &(0x7f0000000540), &(0x7f0000000380)=0x3c) sendmsg$nl_route(r10, &(0x7f0000000840)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000800)={&(0x7f0000000640)=@ipv6_newrule={0x58, 0x20, 0x100, 0x70bd29, 0x25dfdbfe, {0xa, 0x80, 0x0, 0x40, 0x5, 0x0, 0x0, 0x0, 0x10010}, [@FRA_SRC={0x14, 0x2, @local}, @FRA_DST={0x14, 0x1, @dev={0xfe, 0x80, '\x00', 0x2b}}, @FRA_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000000}, 0x8000) getsockname$packet(r10, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) 08:44:04 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/slabinfo\x00', 0x0, 0x0) lseek(r0, 0x55f0, 0x0) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x5, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) getsockopt$IP_VS_SO_GET_INFO(r1, 0x0, 0x481, &(0x7f0000000080), &(0x7f0000000900)=0xc) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/vlan/vlan0\x00') readv(r2, &(0x7f0000000500)=[{&(0x7f0000000140)=""/111, 0x6f}], 0x1) perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x82, &(0x7f0000000080)={@multicast, @random="e0d35b1004bb", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x74, 0x66, 0x0, 0x0, 0x1, 0x0, @rand_addr=0x64010101, @local}, @time_exceeded={0x3, 0x4, 0x0, 0x3, 0x1, 0x0, {0x16, 0x4, 0x0, 0x0, 0x0, 0x66, 0x0, 0x0, 0x1, 0x0, @loopback, @remote, {[@timestamp_prespec={0x44, 0x44, 0x0, 0x3, 0x9, [{@broadcast}, {@multicast2}, {@loopback}, {@multicast2}, {@multicast2}, {@loopback}, {@loopback}, {@private, 0x6}]}]}}}}}}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x7) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$batadv(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_GATEWAYS(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)={0x1c, r7, 0x711, 0x0, 0x0, {0x9}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000410}, 0x20000004) setsockopt$IPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x41, &(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000002000000000200"/63], 0x48) r8 = syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), 0xffffffffffffffff) setxattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='trusted.overlay.opaque\x00', &(0x7f0000000340)='batadv\x00', 0x7, 0x3) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x52000800}, 0xc, &(0x7f0000000200)={&(0x7f00000006c0)=ANY=[@ANYBLOB="0ead97f5438694c4950facc34000000012da27431f7f360f0052a05e796fd5a90ae873bdbe9e189811d408cda4ebd73ef135725d08ced88fa363b1fdb7ae0c928b0135c299323981890387029db18e3002a9df00021580982669901a083dd400ab432b9863835e75af97213dec9a337cfb644e0ea2f41dd3ddc497a7524d9390ac473900452427ad81aea0950c102051df8519b3c05d7d262c44e3bc51efa6a23ac536979726b176a560c7e12247ee20309b2192d2c1c7a24ac0f244d823ab4b653ae79b5268f77b13a2fbe3b2f867a4c0e472f7229ca911abf4ed2f4fa9ba11d46b8c7bb3094baa00"/253, @ANYRES16=r8, @ANYBLOB="200000000000fedbdf25010000002c00018014000200687372300000000000000000000000001400020073797a6b616c6c657230000000000000"], 0x40}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x24022494}, 0x4000000) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="3c0000001000855f8c01d7a88937020000000000fb12153f3f410dde3823c7ea255a21e951a7aa28ab1658b8ba22fe8b32ce4b4de8a84c972af678c6f82c31952fb3f34aaebb06492e91f432932e32d05e2953a17ff4ab87e4db6a9e62853266ccf5461f98def56d2e92ecb33882ac4dd9b6f8e870c6df6a0b6f54c267c6eabb00f54ab0af524b", @ANYRES32=r11, @ANYRESOCT=r5], 0x3c}}, 0x24004835) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000001b00)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xa, &(0x7f0000001ac0)={&(0x7f0000000440)={0x5c, r8, 0x204, 0x70bd27, 0x25dfdbfd, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x4}, @HEADER={0x4}, @HEADER={0x34}]}, 0x5c}, 0x1, 0x0, 0x0, 0x8000}, 0x0) getsockopt$sock_linger(r9, 0x1, 0xd, &(0x7f0000000540), &(0x7f0000000380)=0x3c) sendmsg$nl_route(r10, &(0x7f0000000840)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000800)={&(0x7f0000000640)=@ipv6_newrule={0x58, 0x20, 0x100, 0x70bd29, 0x25dfdbfe, {0xa, 0x80, 0x0, 0x40, 0x5, 0x0, 0x0, 0x0, 0x10010}, [@FRA_SRC={0x14, 0x2, @local}, @FRA_DST={0x14, 0x1, @dev={0xfe, 0x80, '\x00', 0x2b}}, @FRA_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000000}, 0x8000) getsockname$packet(r10, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) 08:44:04 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/slabinfo\x00', 0x0, 0x0) lseek(r0, 0x55f0, 0x0) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x5, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) getsockopt$IP_VS_SO_GET_INFO(r1, 0x0, 0x481, &(0x7f0000000080), &(0x7f0000000900)=0xc) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/vlan/vlan0\x00') readv(r2, &(0x7f0000000500)=[{&(0x7f0000000140)=""/111, 0x6f}], 0x1) perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x82, &(0x7f0000000080)={@multicast, @random="e0d35b1004bb", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x74, 0x66, 0x0, 0x0, 0x1, 0x0, @rand_addr=0x64010101, @local}, @time_exceeded={0x3, 0x4, 0x0, 0x3, 0x1, 0x0, {0x16, 0x4, 0x0, 0x0, 0x0, 0x66, 0x0, 0x0, 0x1, 0x0, @loopback, @remote, {[@timestamp_prespec={0x44, 0x44, 0x0, 0x3, 0x9, [{@broadcast}, {@multicast2}, {@loopback}, {@multicast2}, {@multicast2}, {@loopback}, {@loopback}, {@private, 0x6}]}]}}}}}}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x7) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$batadv(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_GATEWAYS(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)={0x1c, r7, 0x711, 0x0, 0x0, {0x9}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000410}, 0x20000004) setsockopt$IPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x41, &(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000002000000000200"/63], 0x48) r8 = syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), 0xffffffffffffffff) setxattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='trusted.overlay.opaque\x00', &(0x7f0000000340)='batadv\x00', 0x7, 0x3) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x52000800}, 0xc, &(0x7f0000000200)={&(0x7f00000006c0)=ANY=[@ANYBLOB="0ead97f5438694c4950facc34000000012da27431f7f360f0052a05e796fd5a90ae873bdbe9e189811d408cda4ebd73ef135725d08ced88fa363b1fdb7ae0c928b0135c299323981890387029db18e3002a9df00021580982669901a083dd400ab432b9863835e75af97213dec9a337cfb644e0ea2f41dd3ddc497a7524d9390ac473900452427ad81aea0950c102051df8519b3c05d7d262c44e3bc51efa6a23ac536979726b176a560c7e12247ee20309b2192d2c1c7a24ac0f244d823ab4b653ae79b5268f77b13a2fbe3b2f867a4c0e472f7229ca911abf4ed2f4fa9ba11d46b8c7bb3094baa00"/253, @ANYRES16=r8, @ANYBLOB="200000000000fedbdf25010000002c00018014000200687372300000000000000000000000001400020073797a6b616c6c657230000000000000"], 0x40}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x24022494}, 0x4000000) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="3c0000001000855f8c01d7a88937020000000000fb12153f3f410dde3823c7ea255a21e951a7aa28ab1658b8ba22fe8b32ce4b4de8a84c972af678c6f82c31952fb3f34aaebb06492e91f432932e32d05e2953a17ff4ab87e4db6a9e62853266ccf5461f98def56d2e92ecb33882ac4dd9b6f8e870c6df6a0b6f54c267c6eabb00f54ab0af524b", @ANYRES32=r11, @ANYRESOCT=r5], 0x3c}}, 0x24004835) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000001b00)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xa, &(0x7f0000001ac0)={&(0x7f0000000440)={0x5c, r8, 0x204, 0x70bd27, 0x25dfdbfd, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x4}, @HEADER={0x4}, @HEADER={0x34}]}, 0x5c}, 0x1, 0x0, 0x0, 0x8000}, 0x0) getsockopt$sock_linger(r9, 0x1, 0xd, &(0x7f0000000540), &(0x7f0000000380)=0x3c) sendmsg$nl_route(r10, &(0x7f0000000840)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000800)={&(0x7f0000000640)=@ipv6_newrule={0x58, 0x20, 0x100, 0x70bd29, 0x25dfdbfe, {0xa, 0x80, 0x0, 0x40, 0x5, 0x0, 0x0, 0x0, 0x10010}, [@FRA_SRC={0x14, 0x2, @local}, @FRA_DST={0x14, 0x1, @dev={0xfe, 0x80, '\x00', 0x2b}}, @FRA_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000000}, 0x8000) getsockname$packet(r10, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) 08:44:04 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f00000001c0), 0x8) readv(r0, &(0x7f0000000040)=[{&(0x7f0000000340)=""/224, 0xe0}], 0x1) mkdir(&(0x7f0000000200)='./control\x00', 0x0) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r1, 0x4, 0x2c00) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f00000000c0)={[0xfbfffffffffffefd]}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x20) inotify_add_watch(r1, &(0x7f0000000100)='./control\x00', 0xe4000c64) open(&(0x7f0000000140)='./control\x00', 0x0, 0x0) 08:44:04 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/slabinfo\x00', 0x0, 0x0) lseek(r0, 0x55f0, 0x0) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x5, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) getsockopt$IP_VS_SO_GET_INFO(r1, 0x0, 0x481, &(0x7f0000000080), &(0x7f0000000900)=0xc) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/vlan/vlan0\x00') readv(r2, &(0x7f0000000500)=[{&(0x7f0000000140)=""/111, 0x6f}], 0x1) perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x82, &(0x7f0000000080)={@multicast, @random="e0d35b1004bb", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x74, 0x66, 0x0, 0x0, 0x1, 0x0, @rand_addr=0x64010101, @local}, @time_exceeded={0x3, 0x4, 0x0, 0x3, 0x1, 0x0, {0x16, 0x4, 0x0, 0x0, 0x0, 0x66, 0x0, 0x0, 0x1, 0x0, @loopback, @remote, {[@timestamp_prespec={0x44, 0x44, 0x0, 0x3, 0x9, [{@broadcast}, {@multicast2}, {@loopback}, {@multicast2}, {@multicast2}, {@loopback}, {@loopback}, {@private, 0x6}]}]}}}}}}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x7) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$batadv(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_GATEWAYS(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)={0x1c, r7, 0x711, 0x0, 0x0, {0x9}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000410}, 0x20000004) setsockopt$IPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x41, &(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000002000000000200"/63], 0x48) r8 = syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), 0xffffffffffffffff) setxattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='trusted.overlay.opaque\x00', &(0x7f0000000340)='batadv\x00', 0x7, 0x3) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x52000800}, 0xc, &(0x7f0000000200)={&(0x7f00000006c0)=ANY=[@ANYBLOB="0ead97f5438694c4950facc34000000012da27431f7f360f0052a05e796fd5a90ae873bdbe9e189811d408cda4ebd73ef135725d08ced88fa363b1fdb7ae0c928b0135c299323981890387029db18e3002a9df00021580982669901a083dd400ab432b9863835e75af97213dec9a337cfb644e0ea2f41dd3ddc497a7524d9390ac473900452427ad81aea0950c102051df8519b3c05d7d262c44e3bc51efa6a23ac536979726b176a560c7e12247ee20309b2192d2c1c7a24ac0f244d823ab4b653ae79b5268f77b13a2fbe3b2f867a4c0e472f7229ca911abf4ed2f4fa9ba11d46b8c7bb3094baa00"/253, @ANYRES16=r8, @ANYBLOB="200000000000fedbdf25010000002c00018014000200687372300000000000000000000000001400020073797a6b616c6c657230000000000000"], 0x40}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x24022494}, 0x4000000) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="3c0000001000855f8c01d7a88937020000000000fb12153f3f410dde3823c7ea255a21e951a7aa28ab1658b8ba22fe8b32ce4b4de8a84c972af678c6f82c31952fb3f34aaebb06492e91f432932e32d05e2953a17ff4ab87e4db6a9e62853266ccf5461f98def56d2e92ecb33882ac4dd9b6f8e870c6df6a0b6f54c267c6eabb00f54ab0af524b", @ANYRES32=r11, @ANYRESOCT=r5], 0x3c}}, 0x24004835) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000001b00)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xa, &(0x7f0000001ac0)={&(0x7f0000000440)={0x5c, r8, 0x204, 0x70bd27, 0x25dfdbfd, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x4}, @HEADER={0x4}, @HEADER={0x34}]}, 0x5c}, 0x1, 0x0, 0x0, 0x8000}, 0x0) getsockopt$sock_linger(r9, 0x1, 0xd, &(0x7f0000000540), &(0x7f0000000380)=0x3c) sendmsg$nl_route(r10, &(0x7f0000000840)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000800)={&(0x7f0000000640)=@ipv6_newrule={0x58, 0x20, 0x100, 0x70bd29, 0x25dfdbfe, {0xa, 0x80, 0x0, 0x40, 0x5, 0x0, 0x0, 0x0, 0x10010}, [@FRA_SRC={0x14, 0x2, @local}, @FRA_DST={0x14, 0x1, @dev={0xfe, 0x80, '\x00', 0x2b}}, @FRA_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000000}, 0x8000) getsockname$packet(r10, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) 08:44:04 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/slabinfo\x00', 0x0, 0x0) lseek(r0, 0x55f0, 0x0) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x5, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) getsockopt$IP_VS_SO_GET_INFO(r1, 0x0, 0x481, &(0x7f0000000080), &(0x7f0000000900)=0xc) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/vlan/vlan0\x00') readv(r2, &(0x7f0000000500)=[{&(0x7f0000000140)=""/111, 0x6f}], 0x1) perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x82, &(0x7f0000000080)={@multicast, @random="e0d35b1004bb", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x74, 0x66, 0x0, 0x0, 0x1, 0x0, @rand_addr=0x64010101, @local}, @time_exceeded={0x3, 0x4, 0x0, 0x3, 0x1, 0x0, {0x16, 0x4, 0x0, 0x0, 0x0, 0x66, 0x0, 0x0, 0x1, 0x0, @loopback, @remote, {[@timestamp_prespec={0x44, 0x44, 0x0, 0x3, 0x9, [{@broadcast}, {@multicast2}, {@loopback}, {@multicast2}, {@multicast2}, {@loopback}, {@loopback}, {@private, 0x6}]}]}}}}}}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x7) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$batadv(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_GATEWAYS(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)={0x1c, r7, 0x711, 0x0, 0x0, {0x9}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000410}, 0x20000004) setsockopt$IPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x41, &(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000002000000000200"/63], 0x48) r8 = syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), 0xffffffffffffffff) setxattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='trusted.overlay.opaque\x00', &(0x7f0000000340)='batadv\x00', 0x7, 0x3) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x52000800}, 0xc, &(0x7f0000000200)={&(0x7f00000006c0)=ANY=[@ANYBLOB="0ead97f5438694c4950facc34000000012da27431f7f360f0052a05e796fd5a90ae873bdbe9e189811d408cda4ebd73ef135725d08ced88fa363b1fdb7ae0c928b0135c299323981890387029db18e3002a9df00021580982669901a083dd400ab432b9863835e75af97213dec9a337cfb644e0ea2f41dd3ddc497a7524d9390ac473900452427ad81aea0950c102051df8519b3c05d7d262c44e3bc51efa6a23ac536979726b176a560c7e12247ee20309b2192d2c1c7a24ac0f244d823ab4b653ae79b5268f77b13a2fbe3b2f867a4c0e472f7229ca911abf4ed2f4fa9ba11d46b8c7bb3094baa00"/253, @ANYRES16=r8, @ANYBLOB="200000000000fedbdf25010000002c00018014000200687372300000000000000000000000001400020073797a6b616c6c657230000000000000"], 0x40}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x24022494}, 0x4000000) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="3c0000001000855f8c01d7a88937020000000000fb12153f3f410dde3823c7ea255a21e951a7aa28ab1658b8ba22fe8b32ce4b4de8a84c972af678c6f82c31952fb3f34aaebb06492e91f432932e32d05e2953a17ff4ab87e4db6a9e62853266ccf5461f98def56d2e92ecb33882ac4dd9b6f8e870c6df6a0b6f54c267c6eabb00f54ab0af524b", @ANYRES32=r11, @ANYRESOCT=r5], 0x3c}}, 0x24004835) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000001b00)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xa, &(0x7f0000001ac0)={&(0x7f0000000440)={0x5c, r8, 0x204, 0x70bd27, 0x25dfdbfd, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x4}, @HEADER={0x4}, @HEADER={0x34}]}, 0x5c}, 0x1, 0x0, 0x0, 0x8000}, 0x0) getsockopt$sock_linger(r9, 0x1, 0xd, &(0x7f0000000540), &(0x7f0000000380)=0x3c) sendmsg$nl_route(r10, &(0x7f0000000840)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000800)={&(0x7f0000000640)=@ipv6_newrule={0x58, 0x20, 0x100, 0x70bd29, 0x25dfdbfe, {0xa, 0x80, 0x0, 0x40, 0x5, 0x0, 0x0, 0x0, 0x10010}, [@FRA_SRC={0x14, 0x2, @local}, @FRA_DST={0x14, 0x1, @dev={0xfe, 0x80, '\x00', 0x2b}}, @FRA_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000000}, 0x8000) getsockname$packet(r10, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) 08:44:04 executing program 2: r0 = signalfd(0xffffffffffffffff, &(0x7f00000001c0), 0x8) readv(r0, &(0x7f0000000040)=[{&(0x7f0000000340)=""/224, 0xe0}], 0x1) mkdir(&(0x7f0000000200)='./control\x00', 0x0) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r1, 0x4, 0x2c00) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f00000000c0)={[0xfbfffffffffffefd]}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x20) inotify_add_watch(r1, &(0x7f0000000100)='./control\x00', 0xe4000c64) open(&(0x7f0000000140)='./control\x00', 0x0, 0x0) 08:44:04 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x81, 0x8b}, 0x0) syz_mount_image$vfat(&(0x7f0000001200), &(0x7f0000001240)='./file0\x00', 0x10, &(0x7f0000000000)=ANY=[], 0x1, 0x11ec, &(0x7f0000002480)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.kill\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x800) lseek(r2, 0x200, 0x0) r3 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x10000) write$binfmt_script(r0, &(0x7f00000007c0)=ANY=[], 0x6db6e559) 08:44:04 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x81, 0x8b}, 0x0) syz_mount_image$vfat(&(0x7f0000001200), &(0x7f0000001240)='./file0\x00', 0x10, &(0x7f0000000000)=ANY=[], 0x1, 0x11ec, &(0x7f0000002480)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.kill\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x800) lseek(r2, 0x200, 0x0) r3 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x10000) write$binfmt_script(r0, &(0x7f00000007c0)=ANY=[], 0x6db6e559) [ 84.272443][ T4303] loop4: detected capacity change from 0 to 8192 [ 84.392906][ T4317] loop3: detected capacity change from 0 to 8192 [ 84.584601][ T4321] loop0: detected capacity change from 0 to 8192 08:44:05 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x81, 0x8b}, 0x0) syz_mount_image$vfat(&(0x7f0000001200), &(0x7f0000001240)='./file0\x00', 0x10, &(0x7f0000000000)=ANY=[], 0x1, 0x11ec, &(0x7f0000002480)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.kill\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x800) lseek(r2, 0x200, 0x0) r3 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x10000) write$binfmt_script(r0, &(0x7f00000007c0)=ANY=[], 0x6db6e559) 08:44:05 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x81, 0x8b}, 0x0) syz_mount_image$vfat(&(0x7f0000001200), &(0x7f0000001240)='./file0\x00', 0x10, &(0x7f0000000000)=ANY=[], 0x1, 0x11ec, &(0x7f0000002480)="$eJzs3cGLG1UcB/Bf27Xdpu5m1VptQXzoRS9jswdPXhZpQQwItSmoIEztxIbNJiETFiJi9eTVP0PEozdB/Af24sWz4EX24rEHcaSZ4rpLhF1Fs10+n8v8yLxveI9A4IX3y+y+9sXWZrfMuvkkTp86FUujiHQ/RYrTcSZqn8bLt3786bm333n3zY12+9qNlK5v3Gy9mlJaff679z7++oXvJxdufbP67bnYWXt/99f1n3cu7Vze/f3m3V6ZemUaDCcpT7eHw0l+u1+ksw/ftV/kZZF6g7IY77vf7Q9Ho2nKB3dWGqNxUZYpH0zTZjFNk2GajKcp/zDvDVKWZWmlEfwbna/uV1UVUVWPxdmoqqo6H424EI/HSqxGM9biiXgynoqL8XRcimfi2bg8G7XoeQMAAAAAAAAAAAAAAAAAAMDJov8fAAAAAAAAAAAAAAAAAAAAFu9w/f/n9f8DAAAAAAAAAAAAAAAAAADAf8jz/wEAAAAAAAAAAAAAAAAAAOAYWK4vN1Jajtj6fLuz3amv9esb3ehFP4q4Gs34LWbd/7W6vv5G+9rVNLMWr2zde5i/t905sz/fmv2dwNx8q86n/flz0fhrfj2acXF+fn1ufjleevFB/rM6n0UzfvgghtGPO/Egu5f/pJXS62+1D+SvzMYBAADASZClP83dv2fZ392v80f4feDA/nopriwtdu1ElNOPNvN+vxgrFCem+OXLYzGNR7pY9DcT/4e9D33RMwEAAAAAAAAAAOAoDn8e8O4/Pk646DUCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPzBDhwLAAAAAAjzt06jYwMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACAqwIAAP//hsruPw==") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.kill\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x800) lseek(r2, 0x200, 0x0) r3 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x10000) write$binfmt_script(r0, &(0x7f00000007c0)=ANY=[], 0x6db6e559) 08:44:05 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f00000001c0), 0x8) readv(r0, &(0x7f0000000040)=[{&(0x7f0000000340)=""/224, 0xe0}], 0x1) mkdir(&(0x7f0000000200)='./control\x00', 0x0) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r1, 0x4, 0x2c00) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f00000000c0)={[0xfbfffffffffffefd]}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x20) inotify_add_watch(r1, &(0x7f0000000100)='./control\x00', 0xe4000c64) open(&(0x7f0000000140)='./control\x00', 0x0, 0x0) 08:44:05 executing program 2: r0 = signalfd(0xffffffffffffffff, &(0x7f00000001c0), 0x8) readv(r0, &(0x7f0000000040)=[{&(0x7f0000000340)=""/224, 0xe0}], 0x1) mkdir(&(0x7f0000000200)='./control\x00', 0x0) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r1, 0x4, 0x2c00) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f00000000c0)={[0xfbfffffffffffefd]}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x20) inotify_add_watch(r1, &(0x7f0000000100)='./control\x00', 0xe4000c64) open(&(0x7f0000000140)='./control\x00', 0x0, 0x0) 08:44:05 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x81, 0x8b}, 0x0) syz_mount_image$vfat(&(0x7f0000001200), &(0x7f0000001240)='./file0\x00', 0x10, &(0x7f0000000000)=ANY=[], 0x1, 0x11ec, &(0x7f0000002480)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.kill\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x800) lseek(r2, 0x200, 0x0) r3 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x10000) write$binfmt_script(r0, &(0x7f00000007c0)=ANY=[], 0x6db6e559) 08:44:05 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/slabinfo\x00', 0x0, 0x0) lseek(r0, 0x55f0, 0x0) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x5, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) getsockopt$IP_VS_SO_GET_INFO(r1, 0x0, 0x481, &(0x7f0000000080), &(0x7f0000000900)=0xc) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/vlan/vlan0\x00') readv(r2, &(0x7f0000000500)=[{&(0x7f0000000140)=""/111, 0x6f}], 0x1) perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x82, &(0x7f0000000080)={@multicast, @random="e0d35b1004bb", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x74, 0x66, 0x0, 0x0, 0x1, 0x0, @rand_addr=0x64010101, @local}, @time_exceeded={0x3, 0x4, 0x0, 0x3, 0x1, 0x0, {0x16, 0x4, 0x0, 0x0, 0x0, 0x66, 0x0, 0x0, 0x1, 0x0, @loopback, @remote, {[@timestamp_prespec={0x44, 0x44, 0x0, 0x3, 0x9, [{@broadcast}, {@multicast2}, {@loopback}, {@multicast2}, {@multicast2}, {@loopback}, {@loopback}, {@private, 0x6}]}]}}}}}}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x7) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$batadv(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_GATEWAYS(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)={0x1c, r7, 0x711, 0x0, 0x0, {0x9}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000410}, 0x20000004) setsockopt$IPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x41, &(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000002000000000200"/63], 0x48) r8 = syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), 0xffffffffffffffff) setxattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='trusted.overlay.opaque\x00', &(0x7f0000000340)='batadv\x00', 0x7, 0x3) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x52000800}, 0xc, &(0x7f0000000200)={&(0x7f00000006c0)=ANY=[@ANYBLOB="0ead97f5438694c4950facc34000000012da27431f7f360f0052a05e796fd5a90ae873bdbe9e189811d408cda4ebd73ef135725d08ced88fa363b1fdb7ae0c928b0135c299323981890387029db18e3002a9df00021580982669901a083dd400ab432b9863835e75af97213dec9a337cfb644e0ea2f41dd3ddc497a7524d9390ac473900452427ad81aea0950c102051df8519b3c05d7d262c44e3bc51efa6a23ac536979726b176a560c7e12247ee20309b2192d2c1c7a24ac0f244d823ab4b653ae79b5268f77b13a2fbe3b2f867a4c0e472f7229ca911abf4ed2f4fa9ba11d46b8c7bb3094baa00"/253, @ANYRES16=r8, @ANYBLOB="200000000000fedbdf25010000002c00018014000200687372300000000000000000000000001400020073797a6b616c6c657230000000000000"], 0x40}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x24022494}, 0x4000000) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="3c0000001000855f8c01d7a88937020000000000fb12153f3f410dde3823c7ea255a21e951a7aa28ab1658b8ba22fe8b32ce4b4de8a84c972af678c6f82c31952fb3f34aaebb06492e91f432932e32d05e2953a17ff4ab87e4db6a9e62853266ccf5461f98def56d2e92ecb33882ac4dd9b6f8e870c6df6a0b6f54c267c6eabb00f54ab0af524b", @ANYRES32=r11, @ANYRESOCT=r5], 0x3c}}, 0x24004835) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000001b00)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xa, &(0x7f0000001ac0)={&(0x7f0000000440)={0x5c, r8, 0x204, 0x70bd27, 0x25dfdbfd, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x4}, @HEADER={0x4}, @HEADER={0x34}]}, 0x5c}, 0x1, 0x0, 0x0, 0x8000}, 0x0) getsockopt$sock_linger(r9, 0x1, 0xd, &(0x7f0000000540), &(0x7f0000000380)=0x3c) sendmsg$nl_route(r10, &(0x7f0000000840)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000800)={&(0x7f0000000640)=@ipv6_newrule={0x58, 0x20, 0x100, 0x70bd29, 0x25dfdbfe, {0xa, 0x80, 0x0, 0x40, 0x5, 0x0, 0x0, 0x0, 0x10010}, [@FRA_SRC={0x14, 0x2, @local}, @FRA_DST={0x14, 0x1, @dev={0xfe, 0x80, '\x00', 0x2b}}, @FRA_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000000}, 0x8000) getsockname$packet(r10, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) 08:44:05 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x81, 0x8b}, 0x0) syz_mount_image$vfat(&(0x7f0000001200), &(0x7f0000001240)='./file0\x00', 0x10, &(0x7f0000000000)=ANY=[], 0x1, 0x11ec, &(0x7f0000002480)="$eJzs3cGLG1UcB/Bf27Xdpu5m1VptQXzoRS9jswdPXhZpQQwItSmoIEztxIbNJiETFiJi9eTVP0PEozdB/Af24sWz4EX24rEHcaSZ4rpLhF1Fs10+n8v8yLxveI9A4IX3y+y+9sXWZrfMuvkkTp86FUujiHQ/RYrTcSZqn8bLt3786bm333n3zY12+9qNlK5v3Gy9mlJaff679z7++oXvJxdufbP67bnYWXt/99f1n3cu7Vze/f3m3V6ZemUaDCcpT7eHw0l+u1+ksw/ftV/kZZF6g7IY77vf7Q9Ho2nKB3dWGqNxUZYpH0zTZjFNk2GajKcp/zDvDVKWZWmlEfwbna/uV1UVUVWPxdmoqqo6H424EI/HSqxGM9biiXgynoqL8XRcimfi2bg8G7XoeQMAAAAAAAAAAAAAAAAAAMDJov8fAAAAAAAAAAAAAAAAAAAAFu9w/f/n9f8DAAAAAAAAAAAAAAAAAADAf8jz/wEAAAAAAAAAAAAAAAAAAOAYWK4vN1Jajtj6fLuz3amv9esb3ehFP4q4Gs34LWbd/7W6vv5G+9rVNLMWr2zde5i/t905sz/fmv2dwNx8q86n/flz0fhrfj2acXF+fn1ufjleevFB/rM6n0UzfvgghtGPO/Egu5f/pJXS62+1D+SvzMYBAADASZClP83dv2fZ392v80f4feDA/nopriwtdu1ElNOPNvN+vxgrFCem+OXLYzGNR7pY9DcT/4e9D33RMwEAAAAAAAAAAOAoDn8e8O4/Pk646DUCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPzBDhwLAAAAAAjzt06jYwMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACAqwIAAP//hsruPw==") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.kill\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x800) lseek(r2, 0x200, 0x0) r3 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x10000) write$binfmt_script(r0, &(0x7f00000007c0)=ANY=[], 0x6db6e559) 08:44:05 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/slabinfo\x00', 0x0, 0x0) lseek(r0, 0x55f0, 0x0) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x5, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) getsockopt$IP_VS_SO_GET_INFO(r1, 0x0, 0x481, &(0x7f0000000080), &(0x7f0000000900)=0xc) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/vlan/vlan0\x00') readv(r2, &(0x7f0000000500)=[{&(0x7f0000000140)=""/111, 0x6f}], 0x1) perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x82, &(0x7f0000000080)={@multicast, @random="e0d35b1004bb", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x74, 0x66, 0x0, 0x0, 0x1, 0x0, @rand_addr=0x64010101, @local}, @time_exceeded={0x3, 0x4, 0x0, 0x3, 0x1, 0x0, {0x16, 0x4, 0x0, 0x0, 0x0, 0x66, 0x0, 0x0, 0x1, 0x0, @loopback, @remote, {[@timestamp_prespec={0x44, 0x44, 0x0, 0x3, 0x9, [{@broadcast}, {@multicast2}, {@loopback}, {@multicast2}, {@multicast2}, {@loopback}, {@loopback}, {@private, 0x6}]}]}}}}}}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x7) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$batadv(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_GATEWAYS(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)={0x1c, r7, 0x711, 0x0, 0x0, {0x9}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000410}, 0x20000004) setsockopt$IPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x41, &(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000002000000000200"/63], 0x48) r8 = syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), 0xffffffffffffffff) setxattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='trusted.overlay.opaque\x00', &(0x7f0000000340)='batadv\x00', 0x7, 0x3) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x52000800}, 0xc, &(0x7f0000000200)={&(0x7f00000006c0)=ANY=[@ANYBLOB="0ead97f5438694c4950facc34000000012da27431f7f360f0052a05e796fd5a90ae873bdbe9e189811d408cda4ebd73ef135725d08ced88fa363b1fdb7ae0c928b0135c299323981890387029db18e3002a9df00021580982669901a083dd400ab432b9863835e75af97213dec9a337cfb644e0ea2f41dd3ddc497a7524d9390ac473900452427ad81aea0950c102051df8519b3c05d7d262c44e3bc51efa6a23ac536979726b176a560c7e12247ee20309b2192d2c1c7a24ac0f244d823ab4b653ae79b5268f77b13a2fbe3b2f867a4c0e472f7229ca911abf4ed2f4fa9ba11d46b8c7bb3094baa00"/253, @ANYRES16=r8, @ANYBLOB="200000000000fedbdf25010000002c00018014000200687372300000000000000000000000001400020073797a6b616c6c657230000000000000"], 0x40}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x24022494}, 0x4000000) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="3c0000001000855f8c01d7a88937020000000000fb12153f3f410dde3823c7ea255a21e951a7aa28ab1658b8ba22fe8b32ce4b4de8a84c972af678c6f82c31952fb3f34aaebb06492e91f432932e32d05e2953a17ff4ab87e4db6a9e62853266ccf5461f98def56d2e92ecb33882ac4dd9b6f8e870c6df6a0b6f54c267c6eabb00f54ab0af524b", @ANYRES32=r11, @ANYRESOCT=r5], 0x3c}}, 0x24004835) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000001b00)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xa, &(0x7f0000001ac0)={&(0x7f0000000440)={0x5c, r8, 0x204, 0x70bd27, 0x25dfdbfd, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x4}, @HEADER={0x4}, @HEADER={0x34}]}, 0x5c}, 0x1, 0x0, 0x0, 0x8000}, 0x0) getsockopt$sock_linger(r9, 0x1, 0xd, &(0x7f0000000540), &(0x7f0000000380)=0x3c) sendmsg$nl_route(r10, &(0x7f0000000840)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000800)={&(0x7f0000000640)=@ipv6_newrule={0x58, 0x20, 0x100, 0x70bd29, 0x25dfdbfe, {0xa, 0x80, 0x0, 0x40, 0x5, 0x0, 0x0, 0x0, 0x10010}, [@FRA_SRC={0x14, 0x2, @local}, @FRA_DST={0x14, 0x1, @dev={0xfe, 0x80, '\x00', 0x2b}}, @FRA_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000000}, 0x8000) getsockname$packet(r10, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) 08:44:05 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/slabinfo\x00', 0x0, 0x0) lseek(r0, 0x55f0, 0x0) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x5, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) getsockopt$IP_VS_SO_GET_INFO(r1, 0x0, 0x481, &(0x7f0000000080), &(0x7f0000000900)=0xc) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/vlan/vlan0\x00') readv(r2, &(0x7f0000000500)=[{&(0x7f0000000140)=""/111, 0x6f}], 0x1) perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x82, &(0x7f0000000080)={@multicast, @random="e0d35b1004bb", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x74, 0x66, 0x0, 0x0, 0x1, 0x0, @rand_addr=0x64010101, @local}, @time_exceeded={0x3, 0x4, 0x0, 0x3, 0x1, 0x0, {0x16, 0x4, 0x0, 0x0, 0x0, 0x66, 0x0, 0x0, 0x1, 0x0, @loopback, @remote, {[@timestamp_prespec={0x44, 0x44, 0x0, 0x3, 0x9, [{@broadcast}, {@multicast2}, {@loopback}, {@multicast2}, {@multicast2}, {@loopback}, {@loopback}, {@private, 0x6}]}]}}}}}}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x7) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$batadv(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_GATEWAYS(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)={0x1c, r7, 0x711, 0x0, 0x0, {0x9}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000410}, 0x20000004) setsockopt$IPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x41, &(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000002000000000200"/63], 0x48) r8 = syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), 0xffffffffffffffff) setxattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='trusted.overlay.opaque\x00', &(0x7f0000000340)='batadv\x00', 0x7, 0x3) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x52000800}, 0xc, &(0x7f0000000200)={&(0x7f00000006c0)=ANY=[@ANYBLOB="0ead97f5438694c4950facc34000000012da27431f7f360f0052a05e796fd5a90ae873bdbe9e189811d408cda4ebd73ef135725d08ced88fa363b1fdb7ae0c928b0135c299323981890387029db18e3002a9df00021580982669901a083dd400ab432b9863835e75af97213dec9a337cfb644e0ea2f41dd3ddc497a7524d9390ac473900452427ad81aea0950c102051df8519b3c05d7d262c44e3bc51efa6a23ac536979726b176a560c7e12247ee20309b2192d2c1c7a24ac0f244d823ab4b653ae79b5268f77b13a2fbe3b2f867a4c0e472f7229ca911abf4ed2f4fa9ba11d46b8c7bb3094baa00"/253, @ANYRES16=r8, @ANYBLOB="200000000000fedbdf25010000002c00018014000200687372300000000000000000000000001400020073797a6b616c6c657230000000000000"], 0x40}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x24022494}, 0x4000000) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="3c0000001000855f8c01d7a88937020000000000fb12153f3f410dde3823c7ea255a21e951a7aa28ab1658b8ba22fe8b32ce4b4de8a84c972af678c6f82c31952fb3f34aaebb06492e91f432932e32d05e2953a17ff4ab87e4db6a9e62853266ccf5461f98def56d2e92ecb33882ac4dd9b6f8e870c6df6a0b6f54c267c6eabb00f54ab0af524b", @ANYRES32=r11, @ANYRESOCT=r5], 0x3c}}, 0x24004835) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000001b00)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xa, &(0x7f0000001ac0)={&(0x7f0000000440)={0x5c, r8, 0x204, 0x70bd27, 0x25dfdbfd, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x4}, @HEADER={0x4}, @HEADER={0x34}]}, 0x5c}, 0x1, 0x0, 0x0, 0x8000}, 0x0) getsockopt$sock_linger(r9, 0x1, 0xd, &(0x7f0000000540), &(0x7f0000000380)=0x3c) sendmsg$nl_route(r10, &(0x7f0000000840)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000800)={&(0x7f0000000640)=@ipv6_newrule={0x58, 0x20, 0x100, 0x70bd29, 0x25dfdbfe, {0xa, 0x80, 0x0, 0x40, 0x5, 0x0, 0x0, 0x0, 0x10010}, [@FRA_SRC={0x14, 0x2, @local}, @FRA_DST={0x14, 0x1, @dev={0xfe, 0x80, '\x00', 0x2b}}, @FRA_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000000}, 0x8000) getsockname$packet(r10, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) [ 85.229481][ T4326] loop5: detected capacity change from 0 to 8192 [ 85.259550][ T4328] loop4: detected capacity change from 0 to 8192 08:44:05 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/slabinfo\x00', 0x0, 0x0) lseek(r0, 0x55f0, 0x0) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x5, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) getsockopt$IP_VS_SO_GET_INFO(r1, 0x0, 0x481, &(0x7f0000000080), &(0x7f0000000900)=0xc) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/vlan/vlan0\x00') readv(r2, &(0x7f0000000500)=[{&(0x7f0000000140)=""/111, 0x6f}], 0x1) perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x82, &(0x7f0000000080)={@multicast, @random="e0d35b1004bb", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x74, 0x66, 0x0, 0x0, 0x1, 0x0, @rand_addr=0x64010101, @local}, @time_exceeded={0x3, 0x4, 0x0, 0x3, 0x1, 0x0, {0x16, 0x4, 0x0, 0x0, 0x0, 0x66, 0x0, 0x0, 0x1, 0x0, @loopback, @remote, {[@timestamp_prespec={0x44, 0x44, 0x0, 0x3, 0x9, [{@broadcast}, {@multicast2}, {@loopback}, {@multicast2}, {@multicast2}, {@loopback}, {@loopback}, {@private, 0x6}]}]}}}}}}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x7) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$batadv(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_GATEWAYS(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)={0x1c, r7, 0x711, 0x0, 0x0, {0x9}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000410}, 0x20000004) setsockopt$IPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x41, &(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000002000000000200"/63], 0x48) r8 = syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), 0xffffffffffffffff) setxattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='trusted.overlay.opaque\x00', &(0x7f0000000340)='batadv\x00', 0x7, 0x3) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x52000800}, 0xc, &(0x7f0000000200)={&(0x7f00000006c0)=ANY=[@ANYBLOB="0ead97f5438694c4950facc34000000012da27431f7f360f0052a05e796fd5a90ae873bdbe9e189811d408cda4ebd73ef135725d08ced88fa363b1fdb7ae0c928b0135c299323981890387029db18e3002a9df00021580982669901a083dd400ab432b9863835e75af97213dec9a337cfb644e0ea2f41dd3ddc497a7524d9390ac473900452427ad81aea0950c102051df8519b3c05d7d262c44e3bc51efa6a23ac536979726b176a560c7e12247ee20309b2192d2c1c7a24ac0f244d823ab4b653ae79b5268f77b13a2fbe3b2f867a4c0e472f7229ca911abf4ed2f4fa9ba11d46b8c7bb3094baa00"/253, @ANYRES16=r8, @ANYBLOB="200000000000fedbdf25010000002c00018014000200687372300000000000000000000000001400020073797a6b616c6c657230000000000000"], 0x40}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x24022494}, 0x4000000) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="3c0000001000855f8c01d7a88937020000000000fb12153f3f410dde3823c7ea255a21e951a7aa28ab1658b8ba22fe8b32ce4b4de8a84c972af678c6f82c31952fb3f34aaebb06492e91f432932e32d05e2953a17ff4ab87e4db6a9e62853266ccf5461f98def56d2e92ecb33882ac4dd9b6f8e870c6df6a0b6f54c267c6eabb00f54ab0af524b", @ANYRES32=r11, @ANYRESOCT=r5], 0x3c}}, 0x24004835) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000001b00)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xa, &(0x7f0000001ac0)={&(0x7f0000000440)={0x5c, r8, 0x204, 0x70bd27, 0x25dfdbfd, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x4}, @HEADER={0x4}, @HEADER={0x34}]}, 0x5c}, 0x1, 0x0, 0x0, 0x8000}, 0x0) getsockopt$sock_linger(r9, 0x1, 0xd, &(0x7f0000000540), &(0x7f0000000380)=0x3c) sendmsg$nl_route(r10, &(0x7f0000000840)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000800)={&(0x7f0000000640)=@ipv6_newrule={0x58, 0x20, 0x100, 0x70bd29, 0x25dfdbfe, {0xa, 0x80, 0x0, 0x40, 0x5, 0x0, 0x0, 0x0, 0x10010}, [@FRA_SRC={0x14, 0x2, @local}, @FRA_DST={0x14, 0x1, @dev={0xfe, 0x80, '\x00', 0x2b}}, @FRA_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000000}, 0x8000) getsockname$packet(r10, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) 08:44:05 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/slabinfo\x00', 0x0, 0x0) lseek(r0, 0x55f0, 0x0) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x5, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) getsockopt$IP_VS_SO_GET_INFO(r1, 0x0, 0x481, &(0x7f0000000080), &(0x7f0000000900)=0xc) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/vlan/vlan0\x00') readv(r2, &(0x7f0000000500)=[{&(0x7f0000000140)=""/111, 0x6f}], 0x1) perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x82, &(0x7f0000000080)={@multicast, @random="e0d35b1004bb", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x74, 0x66, 0x0, 0x0, 0x1, 0x0, @rand_addr=0x64010101, @local}, @time_exceeded={0x3, 0x4, 0x0, 0x3, 0x1, 0x0, {0x16, 0x4, 0x0, 0x0, 0x0, 0x66, 0x0, 0x0, 0x1, 0x0, @loopback, @remote, {[@timestamp_prespec={0x44, 0x44, 0x0, 0x3, 0x9, [{@broadcast}, {@multicast2}, {@loopback}, {@multicast2}, {@multicast2}, {@loopback}, {@loopback}, {@private, 0x6}]}]}}}}}}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x7) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$batadv(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_GATEWAYS(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)={0x1c, r7, 0x711, 0x0, 0x0, {0x9}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000410}, 0x20000004) setsockopt$IPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x41, &(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000002000000000200"/63], 0x48) r8 = syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), 0xffffffffffffffff) setxattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='trusted.overlay.opaque\x00', &(0x7f0000000340)='batadv\x00', 0x7, 0x3) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x52000800}, 0xc, &(0x7f0000000200)={&(0x7f00000006c0)=ANY=[@ANYBLOB="0ead97f5438694c4950facc34000000012da27431f7f360f0052a05e796fd5a90ae873bdbe9e189811d408cda4ebd73ef135725d08ced88fa363b1fdb7ae0c928b0135c299323981890387029db18e3002a9df00021580982669901a083dd400ab432b9863835e75af97213dec9a337cfb644e0ea2f41dd3ddc497a7524d9390ac473900452427ad81aea0950c102051df8519b3c05d7d262c44e3bc51efa6a23ac536979726b176a560c7e12247ee20309b2192d2c1c7a24ac0f244d823ab4b653ae79b5268f77b13a2fbe3b2f867a4c0e472f7229ca911abf4ed2f4fa9ba11d46b8c7bb3094baa00"/253, @ANYRES16=r8, @ANYBLOB="200000000000fedbdf25010000002c00018014000200687372300000000000000000000000001400020073797a6b616c6c657230000000000000"], 0x40}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x24022494}, 0x4000000) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="3c0000001000855f8c01d7a88937020000000000fb12153f3f410dde3823c7ea255a21e951a7aa28ab1658b8ba22fe8b32ce4b4de8a84c972af678c6f82c31952fb3f34aaebb06492e91f432932e32d05e2953a17ff4ab87e4db6a9e62853266ccf5461f98def56d2e92ecb33882ac4dd9b6f8e870c6df6a0b6f54c267c6eabb00f54ab0af524b", @ANYRES32=r11, @ANYRESOCT=r5], 0x3c}}, 0x24004835) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000001b00)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xa, &(0x7f0000001ac0)={&(0x7f0000000440)={0x5c, r8, 0x204, 0x70bd27, 0x25dfdbfd, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x4}, @HEADER={0x4}, @HEADER={0x34}]}, 0x5c}, 0x1, 0x0, 0x0, 0x8000}, 0x0) getsockopt$sock_linger(r9, 0x1, 0xd, &(0x7f0000000540), &(0x7f0000000380)=0x3c) sendmsg$nl_route(r10, &(0x7f0000000840)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000800)={&(0x7f0000000640)=@ipv6_newrule={0x58, 0x20, 0x100, 0x70bd29, 0x25dfdbfe, {0xa, 0x80, 0x0, 0x40, 0x5, 0x0, 0x0, 0x0, 0x10010}, [@FRA_SRC={0x14, 0x2, @local}, @FRA_DST={0x14, 0x1, @dev={0xfe, 0x80, '\x00', 0x2b}}, @FRA_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000000}, 0x8000) getsockname$packet(r10, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) [ 85.608483][ T4339] loop3: detected capacity change from 0 to 8192 08:44:05 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/slabinfo\x00', 0x0, 0x0) lseek(r0, 0x55f0, 0x0) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x5, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) getsockopt$IP_VS_SO_GET_INFO(r1, 0x0, 0x481, &(0x7f0000000080), &(0x7f0000000900)=0xc) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/vlan/vlan0\x00') readv(r2, &(0x7f0000000500)=[{&(0x7f0000000140)=""/111, 0x6f}], 0x1) perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x82, &(0x7f0000000080)={@multicast, @random="e0d35b1004bb", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x74, 0x66, 0x0, 0x0, 0x1, 0x0, @rand_addr=0x64010101, @local}, @time_exceeded={0x3, 0x4, 0x0, 0x3, 0x1, 0x0, {0x16, 0x4, 0x0, 0x0, 0x0, 0x66, 0x0, 0x0, 0x1, 0x0, @loopback, @remote, {[@timestamp_prespec={0x44, 0x44, 0x0, 0x3, 0x9, [{@broadcast}, {@multicast2}, {@loopback}, {@multicast2}, {@multicast2}, {@loopback}, {@loopback}, {@private, 0x6}]}]}}}}}}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x7) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$batadv(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_GATEWAYS(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)={0x1c, r7, 0x711, 0x0, 0x0, {0x9}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000410}, 0x20000004) setsockopt$IPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x41, &(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000002000000000200"/63], 0x48) r8 = syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), 0xffffffffffffffff) setxattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='trusted.overlay.opaque\x00', &(0x7f0000000340)='batadv\x00', 0x7, 0x3) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x52000800}, 0xc, &(0x7f0000000200)={&(0x7f00000006c0)=ANY=[@ANYBLOB="0ead97f5438694c4950facc34000000012da27431f7f360f0052a05e796fd5a90ae873bdbe9e189811d408cda4ebd73ef135725d08ced88fa363b1fdb7ae0c928b0135c299323981890387029db18e3002a9df00021580982669901a083dd400ab432b9863835e75af97213dec9a337cfb644e0ea2f41dd3ddc497a7524d9390ac473900452427ad81aea0950c102051df8519b3c05d7d262c44e3bc51efa6a23ac536979726b176a560c7e12247ee20309b2192d2c1c7a24ac0f244d823ab4b653ae79b5268f77b13a2fbe3b2f867a4c0e472f7229ca911abf4ed2f4fa9ba11d46b8c7bb3094baa00"/253, @ANYRES16=r8, @ANYBLOB="200000000000fedbdf25010000002c00018014000200687372300000000000000000000000001400020073797a6b616c6c657230000000000000"], 0x40}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x24022494}, 0x4000000) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="3c0000001000855f8c01d7a88937020000000000fb12153f3f410dde3823c7ea255a21e951a7aa28ab1658b8ba22fe8b32ce4b4de8a84c972af678c6f82c31952fb3f34aaebb06492e91f432932e32d05e2953a17ff4ab87e4db6a9e62853266ccf5461f98def56d2e92ecb33882ac4dd9b6f8e870c6df6a0b6f54c267c6eabb00f54ab0af524b", @ANYRES32=r11, @ANYRESOCT=r5], 0x3c}}, 0x24004835) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000001b00)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xa, &(0x7f0000001ac0)={&(0x7f0000000440)={0x5c, r8, 0x204, 0x70bd27, 0x25dfdbfd, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x4}, @HEADER={0x4}, @HEADER={0x34}]}, 0x5c}, 0x1, 0x0, 0x0, 0x8000}, 0x0) getsockopt$sock_linger(r9, 0x1, 0xd, &(0x7f0000000540), &(0x7f0000000380)=0x3c) sendmsg$nl_route(r10, &(0x7f0000000840)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000800)={&(0x7f0000000640)=@ipv6_newrule={0x58, 0x20, 0x100, 0x70bd29, 0x25dfdbfe, {0xa, 0x80, 0x0, 0x40, 0x5, 0x0, 0x0, 0x0, 0x10010}, [@FRA_SRC={0x14, 0x2, @local}, @FRA_DST={0x14, 0x1, @dev={0xfe, 0x80, '\x00', 0x2b}}, @FRA_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000000}, 0x8000) getsockname$packet(r10, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) [ 85.689446][ T4346] loop0: detected capacity change from 0 to 8192 08:44:06 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x81, 0x8b}, 0x0) syz_mount_image$vfat(&(0x7f0000001200), &(0x7f0000001240)='./file0\x00', 0x10, &(0x7f0000000000)=ANY=[], 0x1, 0x11ec, &(0x7f0000002480)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.kill\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x800) lseek(r2, 0x200, 0x0) r3 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x10000) write$binfmt_script(r0, &(0x7f00000007c0)=ANY=[], 0x6db6e559) 08:44:06 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/slabinfo\x00', 0x0, 0x0) lseek(r0, 0x55f0, 0x0) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x5, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) getsockopt$IP_VS_SO_GET_INFO(r1, 0x0, 0x481, &(0x7f0000000080), &(0x7f0000000900)=0xc) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/vlan/vlan0\x00') readv(r2, &(0x7f0000000500)=[{&(0x7f0000000140)=""/111, 0x6f}], 0x1) perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x82, &(0x7f0000000080)={@multicast, @random="e0d35b1004bb", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x74, 0x66, 0x0, 0x0, 0x1, 0x0, @rand_addr=0x64010101, @local}, @time_exceeded={0x3, 0x4, 0x0, 0x3, 0x1, 0x0, {0x16, 0x4, 0x0, 0x0, 0x0, 0x66, 0x0, 0x0, 0x1, 0x0, @loopback, @remote, {[@timestamp_prespec={0x44, 0x44, 0x0, 0x3, 0x9, [{@broadcast}, {@multicast2}, {@loopback}, {@multicast2}, {@multicast2}, {@loopback}, {@loopback}, {@private, 0x6}]}]}}}}}}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x7) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$batadv(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_GATEWAYS(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)={0x1c, r7, 0x711, 0x0, 0x0, {0x9}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000410}, 0x20000004) setsockopt$IPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x41, &(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000002000000000200"/63], 0x48) r8 = syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), 0xffffffffffffffff) setxattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='trusted.overlay.opaque\x00', &(0x7f0000000340)='batadv\x00', 0x7, 0x3) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x52000800}, 0xc, &(0x7f0000000200)={&(0x7f00000006c0)=ANY=[@ANYBLOB="0ead97f5438694c4950facc34000000012da27431f7f360f0052a05e796fd5a90ae873bdbe9e189811d408cda4ebd73ef135725d08ced88fa363b1fdb7ae0c928b0135c299323981890387029db18e3002a9df00021580982669901a083dd400ab432b9863835e75af97213dec9a337cfb644e0ea2f41dd3ddc497a7524d9390ac473900452427ad81aea0950c102051df8519b3c05d7d262c44e3bc51efa6a23ac536979726b176a560c7e12247ee20309b2192d2c1c7a24ac0f244d823ab4b653ae79b5268f77b13a2fbe3b2f867a4c0e472f7229ca911abf4ed2f4fa9ba11d46b8c7bb3094baa00"/253, @ANYRES16=r8, @ANYBLOB="200000000000fedbdf25010000002c00018014000200687372300000000000000000000000001400020073797a6b616c6c657230000000000000"], 0x40}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x24022494}, 0x4000000) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="3c0000001000855f8c01d7a88937020000000000fb12153f3f410dde3823c7ea255a21e951a7aa28ab1658b8ba22fe8b32ce4b4de8a84c972af678c6f82c31952fb3f34aaebb06492e91f432932e32d05e2953a17ff4ab87e4db6a9e62853266ccf5461f98def56d2e92ecb33882ac4dd9b6f8e870c6df6a0b6f54c267c6eabb00f54ab0af524b", @ANYRES32=r11, @ANYRESOCT=r5], 0x3c}}, 0x24004835) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000001b00)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xa, &(0x7f0000001ac0)={&(0x7f0000000440)={0x5c, r8, 0x204, 0x70bd27, 0x25dfdbfd, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x4}, @HEADER={0x4}, @HEADER={0x34}]}, 0x5c}, 0x1, 0x0, 0x0, 0x8000}, 0x0) getsockopt$sock_linger(r9, 0x1, 0xd, &(0x7f0000000540), &(0x7f0000000380)=0x3c) sendmsg$nl_route(r10, &(0x7f0000000840)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000800)={&(0x7f0000000640)=@ipv6_newrule={0x58, 0x20, 0x100, 0x70bd29, 0x25dfdbfe, {0xa, 0x80, 0x0, 0x40, 0x5, 0x0, 0x0, 0x0, 0x10010}, [@FRA_SRC={0x14, 0x2, @local}, @FRA_DST={0x14, 0x1, @dev={0xfe, 0x80, '\x00', 0x2b}}, @FRA_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000000}, 0x8000) getsockname$packet(r10, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) 08:44:06 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x81, 0x8b}, 0x0) syz_mount_image$vfat(&(0x7f0000001200), &(0x7f0000001240)='./file0\x00', 0x10, &(0x7f0000000000)=ANY=[], 0x1, 0x11ec, &(0x7f0000002480)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.kill\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x800) lseek(r2, 0x200, 0x0) r3 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x10000) write$binfmt_script(r0, &(0x7f00000007c0)=ANY=[], 0x6db6e559) 08:44:06 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/slabinfo\x00', 0x0, 0x0) lseek(r0, 0x55f0, 0x0) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x5, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) getsockopt$IP_VS_SO_GET_INFO(r1, 0x0, 0x481, &(0x7f0000000080), &(0x7f0000000900)=0xc) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/vlan/vlan0\x00') readv(r2, &(0x7f0000000500)=[{&(0x7f0000000140)=""/111, 0x6f}], 0x1) perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x82, &(0x7f0000000080)={@multicast, @random="e0d35b1004bb", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x74, 0x66, 0x0, 0x0, 0x1, 0x0, @rand_addr=0x64010101, @local}, @time_exceeded={0x3, 0x4, 0x0, 0x3, 0x1, 0x0, {0x16, 0x4, 0x0, 0x0, 0x0, 0x66, 0x0, 0x0, 0x1, 0x0, @loopback, @remote, {[@timestamp_prespec={0x44, 0x44, 0x0, 0x3, 0x9, [{@broadcast}, {@multicast2}, {@loopback}, {@multicast2}, {@multicast2}, {@loopback}, {@loopback}, {@private, 0x6}]}]}}}}}}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x7) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$batadv(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_GATEWAYS(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)={0x1c, r7, 0x711, 0x0, 0x0, {0x9}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000410}, 0x20000004) setsockopt$IPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x41, &(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000002000000000200"/63], 0x48) r8 = syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), 0xffffffffffffffff) setxattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='trusted.overlay.opaque\x00', &(0x7f0000000340)='batadv\x00', 0x7, 0x3) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x52000800}, 0xc, &(0x7f0000000200)={&(0x7f00000006c0)=ANY=[@ANYBLOB="0ead97f5438694c4950facc34000000012da27431f7f360f0052a05e796fd5a90ae873bdbe9e189811d408cda4ebd73ef135725d08ced88fa363b1fdb7ae0c928b0135c299323981890387029db18e3002a9df00021580982669901a083dd400ab432b9863835e75af97213dec9a337cfb644e0ea2f41dd3ddc497a7524d9390ac473900452427ad81aea0950c102051df8519b3c05d7d262c44e3bc51efa6a23ac536979726b176a560c7e12247ee20309b2192d2c1c7a24ac0f244d823ab4b653ae79b5268f77b13a2fbe3b2f867a4c0e472f7229ca911abf4ed2f4fa9ba11d46b8c7bb3094baa00"/253, @ANYRES16=r8, @ANYBLOB="200000000000fedbdf25010000002c00018014000200687372300000000000000000000000001400020073797a6b616c6c657230000000000000"], 0x40}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x24022494}, 0x4000000) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="3c0000001000855f8c01d7a88937020000000000fb12153f3f410dde3823c7ea255a21e951a7aa28ab1658b8ba22fe8b32ce4b4de8a84c972af678c6f82c31952fb3f34aaebb06492e91f432932e32d05e2953a17ff4ab87e4db6a9e62853266ccf5461f98def56d2e92ecb33882ac4dd9b6f8e870c6df6a0b6f54c267c6eabb00f54ab0af524b", @ANYRES32=r11, @ANYRESOCT=r5], 0x3c}}, 0x24004835) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000001b00)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xa, &(0x7f0000001ac0)={&(0x7f0000000440)={0x5c, r8, 0x204, 0x70bd27, 0x25dfdbfd, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x4}, @HEADER={0x4}, @HEADER={0x34}]}, 0x5c}, 0x1, 0x0, 0x0, 0x8000}, 0x0) getsockopt$sock_linger(r9, 0x1, 0xd, &(0x7f0000000540), &(0x7f0000000380)=0x3c) sendmsg$nl_route(r10, &(0x7f0000000840)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000800)={&(0x7f0000000640)=@ipv6_newrule={0x58, 0x20, 0x100, 0x70bd29, 0x25dfdbfe, {0xa, 0x80, 0x0, 0x40, 0x5, 0x0, 0x0, 0x0, 0x10010}, [@FRA_SRC={0x14, 0x2, @local}, @FRA_DST={0x14, 0x1, @dev={0xfe, 0x80, '\x00', 0x2b}}, @FRA_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000000}, 0x8000) getsockname$packet(r10, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) 08:44:06 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x81, 0x8b}, 0x0) syz_mount_image$vfat(&(0x7f0000001200), &(0x7f0000001240)='./file0\x00', 0x10, &(0x7f0000000000)=ANY=[], 0x1, 0x11ec, &(0x7f0000002480)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.kill\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x800) lseek(r2, 0x200, 0x0) r3 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x10000) write$binfmt_script(r0, &(0x7f00000007c0)=ANY=[], 0x6db6e559) 08:44:06 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/slabinfo\x00', 0x0, 0x0) lseek(r0, 0x55f0, 0x0) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x5, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) getsockopt$IP_VS_SO_GET_INFO(r1, 0x0, 0x481, &(0x7f0000000080), &(0x7f0000000900)=0xc) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/vlan/vlan0\x00') readv(r2, &(0x7f0000000500)=[{&(0x7f0000000140)=""/111, 0x6f}], 0x1) perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x82, &(0x7f0000000080)={@multicast, @random="e0d35b1004bb", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x74, 0x66, 0x0, 0x0, 0x1, 0x0, @rand_addr=0x64010101, @local}, @time_exceeded={0x3, 0x4, 0x0, 0x3, 0x1, 0x0, {0x16, 0x4, 0x0, 0x0, 0x0, 0x66, 0x0, 0x0, 0x1, 0x0, @loopback, @remote, {[@timestamp_prespec={0x44, 0x44, 0x0, 0x3, 0x9, [{@broadcast}, {@multicast2}, {@loopback}, {@multicast2}, {@multicast2}, {@loopback}, {@loopback}, {@private, 0x6}]}]}}}}}}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x7) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$batadv(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_GATEWAYS(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)={0x1c, r7, 0x711, 0x0, 0x0, {0x9}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000410}, 0x20000004) setsockopt$IPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x41, &(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000002000000000200"/63], 0x48) r8 = syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), 0xffffffffffffffff) setxattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='trusted.overlay.opaque\x00', &(0x7f0000000340)='batadv\x00', 0x7, 0x3) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x52000800}, 0xc, &(0x7f0000000200)={&(0x7f00000006c0)=ANY=[@ANYBLOB="0ead97f5438694c4950facc34000000012da27431f7f360f0052a05e796fd5a90ae873bdbe9e189811d408cda4ebd73ef135725d08ced88fa363b1fdb7ae0c928b0135c299323981890387029db18e3002a9df00021580982669901a083dd400ab432b9863835e75af97213dec9a337cfb644e0ea2f41dd3ddc497a7524d9390ac473900452427ad81aea0950c102051df8519b3c05d7d262c44e3bc51efa6a23ac536979726b176a560c7e12247ee20309b2192d2c1c7a24ac0f244d823ab4b653ae79b5268f77b13a2fbe3b2f867a4c0e472f7229ca911abf4ed2f4fa9ba11d46b8c7bb3094baa00"/253, @ANYRES16=r8, @ANYBLOB="200000000000fedbdf25010000002c00018014000200687372300000000000000000000000001400020073797a6b616c6c657230000000000000"], 0x40}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x24022494}, 0x4000000) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="3c0000001000855f8c01d7a88937020000000000fb12153f3f410dde3823c7ea255a21e951a7aa28ab1658b8ba22fe8b32ce4b4de8a84c972af678c6f82c31952fb3f34aaebb06492e91f432932e32d05e2953a17ff4ab87e4db6a9e62853266ccf5461f98def56d2e92ecb33882ac4dd9b6f8e870c6df6a0b6f54c267c6eabb00f54ab0af524b", @ANYRES32=r11, @ANYRESOCT=r5], 0x3c}}, 0x24004835) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000001b00)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xa, &(0x7f0000001ac0)={&(0x7f0000000440)={0x5c, r8, 0x204, 0x70bd27, 0x25dfdbfd, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x4}, @HEADER={0x4}, @HEADER={0x34}]}, 0x5c}, 0x1, 0x0, 0x0, 0x8000}, 0x0) getsockopt$sock_linger(r9, 0x1, 0xd, &(0x7f0000000540), &(0x7f0000000380)=0x3c) sendmsg$nl_route(r10, &(0x7f0000000840)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000800)={&(0x7f0000000640)=@ipv6_newrule={0x58, 0x20, 0x100, 0x70bd29, 0x25dfdbfe, {0xa, 0x80, 0x0, 0x40, 0x5, 0x0, 0x0, 0x0, 0x10010}, [@FRA_SRC={0x14, 0x2, @local}, @FRA_DST={0x14, 0x1, @dev={0xfe, 0x80, '\x00', 0x2b}}, @FRA_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000000}, 0x8000) getsockname$packet(r10, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) 08:44:06 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x81, 0x8b}, 0x0) syz_mount_image$vfat(&(0x7f0000001200), &(0x7f0000001240)='./file0\x00', 0x10, &(0x7f0000000000)=ANY=[], 0x1, 0x11ec, &(0x7f0000002480)="$eJzs3cGLG1UcB/Bf27Xdpu5m1VptQXzoRS9jswdPXhZpQQwItSmoIEztxIbNJiETFiJi9eTVP0PEozdB/Af24sWz4EX24rEHcaSZ4rpLhF1Fs10+n8v8yLxveI9A4IX3y+y+9sXWZrfMuvkkTp86FUujiHQ/RYrTcSZqn8bLt3786bm333n3zY12+9qNlK5v3Gy9mlJaff679z7++oXvJxdufbP67bnYWXt/99f1n3cu7Vze/f3m3V6ZemUaDCcpT7eHw0l+u1+ksw/ftV/kZZF6g7IY77vf7Q9Ho2nKB3dWGqNxUZYpH0zTZjFNk2GajKcp/zDvDVKWZWmlEfwbna/uV1UVUVWPxdmoqqo6H424EI/HSqxGM9biiXgynoqL8XRcimfi2bg8G7XoeQMAAAAAAAAAAAAAAAAAAMDJov8fAAAAAAAAAAAAAAAAAAAAFu9w/f/n9f8DAAAAAAAAAAAAAAAAAADAf8jz/wEAAAAAAAAAAAAAAAAAAOAYWK4vN1Jajtj6fLuz3amv9esb3ehFP4q4Gs34LWbd/7W6vv5G+9rVNLMWr2zde5i/t905sz/fmv2dwNx8q86n/flz0fhrfj2acXF+fn1ufjleevFB/rM6n0UzfvgghtGPO/Egu5f/pJXS62+1D+SvzMYBAADASZClP83dv2fZ392v80f4feDA/nopriwtdu1ElNOPNvN+vxgrFCem+OXLYzGNR7pY9DcT/4e9D33RMwEAAAAAAAAAAOAoDn8e8O4/Pk646DUCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPzBDhwLAAAAAAjzt06jYwMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACAqwIAAP//hsruPw==") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.kill\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x800) lseek(r2, 0x200, 0x0) r3 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x10000) write$binfmt_script(r0, &(0x7f00000007c0)=ANY=[], 0x6db6e559) 08:44:06 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/slabinfo\x00', 0x0, 0x0) lseek(r0, 0x55f0, 0x0) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x5, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) getsockopt$IP_VS_SO_GET_INFO(r1, 0x0, 0x481, &(0x7f0000000080), &(0x7f0000000900)=0xc) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/vlan/vlan0\x00') readv(r2, &(0x7f0000000500)=[{&(0x7f0000000140)=""/111, 0x6f}], 0x1) perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x82, &(0x7f0000000080)={@multicast, @random="e0d35b1004bb", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x74, 0x66, 0x0, 0x0, 0x1, 0x0, @rand_addr=0x64010101, @local}, @time_exceeded={0x3, 0x4, 0x0, 0x3, 0x1, 0x0, {0x16, 0x4, 0x0, 0x0, 0x0, 0x66, 0x0, 0x0, 0x1, 0x0, @loopback, @remote, {[@timestamp_prespec={0x44, 0x44, 0x0, 0x3, 0x9, [{@broadcast}, {@multicast2}, {@loopback}, {@multicast2}, {@multicast2}, {@loopback}, {@loopback}, {@private, 0x6}]}]}}}}}}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x7) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$batadv(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_GATEWAYS(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)={0x1c, r7, 0x711, 0x0, 0x0, {0x9}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000410}, 0x20000004) setsockopt$IPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x41, &(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000002000000000200"/63], 0x48) r8 = syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), 0xffffffffffffffff) setxattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='trusted.overlay.opaque\x00', &(0x7f0000000340)='batadv\x00', 0x7, 0x3) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x52000800}, 0xc, &(0x7f0000000200)={&(0x7f00000006c0)=ANY=[@ANYBLOB="0ead97f5438694c4950facc34000000012da27431f7f360f0052a05e796fd5a90ae873bdbe9e189811d408cda4ebd73ef135725d08ced88fa363b1fdb7ae0c928b0135c299323981890387029db18e3002a9df00021580982669901a083dd400ab432b9863835e75af97213dec9a337cfb644e0ea2f41dd3ddc497a7524d9390ac473900452427ad81aea0950c102051df8519b3c05d7d262c44e3bc51efa6a23ac536979726b176a560c7e12247ee20309b2192d2c1c7a24ac0f244d823ab4b653ae79b5268f77b13a2fbe3b2f867a4c0e472f7229ca911abf4ed2f4fa9ba11d46b8c7bb3094baa00"/253, @ANYRES16=r8, @ANYBLOB="200000000000fedbdf25010000002c00018014000200687372300000000000000000000000001400020073797a6b616c6c657230000000000000"], 0x40}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x24022494}, 0x4000000) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="3c0000001000855f8c01d7a88937020000000000fb12153f3f410dde3823c7ea255a21e951a7aa28ab1658b8ba22fe8b32ce4b4de8a84c972af678c6f82c31952fb3f34aaebb06492e91f432932e32d05e2953a17ff4ab87e4db6a9e62853266ccf5461f98def56d2e92ecb33882ac4dd9b6f8e870c6df6a0b6f54c267c6eabb00f54ab0af524b", @ANYRES32=r11, @ANYRESOCT=r5], 0x3c}}, 0x24004835) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000001b00)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xa, &(0x7f0000001ac0)={&(0x7f0000000440)={0x5c, r8, 0x204, 0x70bd27, 0x25dfdbfd, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x4}, @HEADER={0x4}, @HEADER={0x34}]}, 0x5c}, 0x1, 0x0, 0x0, 0x8000}, 0x0) getsockopt$sock_linger(r9, 0x1, 0xd, &(0x7f0000000540), &(0x7f0000000380)=0x3c) sendmsg$nl_route(r10, &(0x7f0000000840)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000800)={&(0x7f0000000640)=@ipv6_newrule={0x58, 0x20, 0x100, 0x70bd29, 0x25dfdbfe, {0xa, 0x80, 0x0, 0x40, 0x5, 0x0, 0x0, 0x0, 0x10010}, [@FRA_SRC={0x14, 0x2, @local}, @FRA_DST={0x14, 0x1, @dev={0xfe, 0x80, '\x00', 0x2b}}, @FRA_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000000}, 0x8000) getsockname$packet(r10, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) 08:44:06 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/slabinfo\x00', 0x0, 0x0) lseek(r0, 0x55f0, 0x0) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x5, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) getsockopt$IP_VS_SO_GET_INFO(r1, 0x0, 0x481, &(0x7f0000000080), &(0x7f0000000900)=0xc) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/vlan/vlan0\x00') readv(r2, &(0x7f0000000500)=[{&(0x7f0000000140)=""/111, 0x6f}], 0x1) perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x82, &(0x7f0000000080)={@multicast, @random="e0d35b1004bb", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x74, 0x66, 0x0, 0x0, 0x1, 0x0, @rand_addr=0x64010101, @local}, @time_exceeded={0x3, 0x4, 0x0, 0x3, 0x1, 0x0, {0x16, 0x4, 0x0, 0x0, 0x0, 0x66, 0x0, 0x0, 0x1, 0x0, @loopback, @remote, {[@timestamp_prespec={0x44, 0x44, 0x0, 0x3, 0x9, [{@broadcast}, {@multicast2}, {@loopback}, {@multicast2}, {@multicast2}, {@loopback}, {@loopback}, {@private, 0x6}]}]}}}}}}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x7) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$batadv(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_GATEWAYS(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)={0x1c, r7, 0x711, 0x0, 0x0, {0x9}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000410}, 0x20000004) setsockopt$IPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x41, &(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000002000000000200"/63], 0x48) r8 = syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), 0xffffffffffffffff) setxattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='trusted.overlay.opaque\x00', &(0x7f0000000340)='batadv\x00', 0x7, 0x3) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x52000800}, 0xc, &(0x7f0000000200)={&(0x7f00000006c0)=ANY=[@ANYBLOB="0ead97f5438694c4950facc34000000012da27431f7f360f0052a05e796fd5a90ae873bdbe9e189811d408cda4ebd73ef135725d08ced88fa363b1fdb7ae0c928b0135c299323981890387029db18e3002a9df00021580982669901a083dd400ab432b9863835e75af97213dec9a337cfb644e0ea2f41dd3ddc497a7524d9390ac473900452427ad81aea0950c102051df8519b3c05d7d262c44e3bc51efa6a23ac536979726b176a560c7e12247ee20309b2192d2c1c7a24ac0f244d823ab4b653ae79b5268f77b13a2fbe3b2f867a4c0e472f7229ca911abf4ed2f4fa9ba11d46b8c7bb3094baa00"/253, @ANYRES16=r8, @ANYBLOB="200000000000fedbdf25010000002c00018014000200687372300000000000000000000000001400020073797a6b616c6c657230000000000000"], 0x40}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x24022494}, 0x4000000) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="3c0000001000855f8c01d7a88937020000000000fb12153f3f410dde3823c7ea255a21e951a7aa28ab1658b8ba22fe8b32ce4b4de8a84c972af678c6f82c31952fb3f34aaebb06492e91f432932e32d05e2953a17ff4ab87e4db6a9e62853266ccf5461f98def56d2e92ecb33882ac4dd9b6f8e870c6df6a0b6f54c267c6eabb00f54ab0af524b", @ANYRES32=r11, @ANYRESOCT=r5], 0x3c}}, 0x24004835) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000001b00)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xa, &(0x7f0000001ac0)={&(0x7f0000000440)={0x5c, r8, 0x204, 0x70bd27, 0x25dfdbfd, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x4}, @HEADER={0x4}, @HEADER={0x34}]}, 0x5c}, 0x1, 0x0, 0x0, 0x8000}, 0x0) getsockopt$sock_linger(r9, 0x1, 0xd, &(0x7f0000000540), &(0x7f0000000380)=0x3c) sendmsg$nl_route(r10, &(0x7f0000000840)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000800)={&(0x7f0000000640)=@ipv6_newrule={0x58, 0x20, 0x100, 0x70bd29, 0x25dfdbfe, {0xa, 0x80, 0x0, 0x40, 0x5, 0x0, 0x0, 0x0, 0x10010}, [@FRA_SRC={0x14, 0x2, @local}, @FRA_DST={0x14, 0x1, @dev={0xfe, 0x80, '\x00', 0x2b}}, @FRA_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000000}, 0x8000) getsockname$packet(r10, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) [ 86.254534][ T4362] loop4: detected capacity change from 0 to 8192 [ 86.259470][ T4358] loop5: detected capacity change from 0 to 8192 08:44:06 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/slabinfo\x00', 0x0, 0x0) lseek(r0, 0x55f0, 0x0) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x5, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) getsockopt$IP_VS_SO_GET_INFO(r1, 0x0, 0x481, &(0x7f0000000080), &(0x7f0000000900)=0xc) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/vlan/vlan0\x00') readv(r2, &(0x7f0000000500)=[{&(0x7f0000000140)=""/111, 0x6f}], 0x1) perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x82, &(0x7f0000000080)={@multicast, @random="e0d35b1004bb", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x74, 0x66, 0x0, 0x0, 0x1, 0x0, @rand_addr=0x64010101, @local}, @time_exceeded={0x3, 0x4, 0x0, 0x3, 0x1, 0x0, {0x16, 0x4, 0x0, 0x0, 0x0, 0x66, 0x0, 0x0, 0x1, 0x0, @loopback, @remote, {[@timestamp_prespec={0x44, 0x44, 0x0, 0x3, 0x9, [{@broadcast}, {@multicast2}, {@loopback}, {@multicast2}, {@multicast2}, {@loopback}, {@loopback}, {@private, 0x6}]}]}}}}}}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x7) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$batadv(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_GATEWAYS(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)={0x1c, r7, 0x711, 0x0, 0x0, {0x9}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000410}, 0x20000004) setsockopt$IPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x41, &(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000002000000000200"/63], 0x48) r8 = syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), 0xffffffffffffffff) setxattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='trusted.overlay.opaque\x00', &(0x7f0000000340)='batadv\x00', 0x7, 0x3) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x52000800}, 0xc, &(0x7f0000000200)={&(0x7f00000006c0)=ANY=[@ANYBLOB="0ead97f5438694c4950facc34000000012da27431f7f360f0052a05e796fd5a90ae873bdbe9e189811d408cda4ebd73ef135725d08ced88fa363b1fdb7ae0c928b0135c299323981890387029db18e3002a9df00021580982669901a083dd400ab432b9863835e75af97213dec9a337cfb644e0ea2f41dd3ddc497a7524d9390ac473900452427ad81aea0950c102051df8519b3c05d7d262c44e3bc51efa6a23ac536979726b176a560c7e12247ee20309b2192d2c1c7a24ac0f244d823ab4b653ae79b5268f77b13a2fbe3b2f867a4c0e472f7229ca911abf4ed2f4fa9ba11d46b8c7bb3094baa00"/253, @ANYRES16=r8, @ANYBLOB="200000000000fedbdf25010000002c00018014000200687372300000000000000000000000001400020073797a6b616c6c657230000000000000"], 0x40}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x24022494}, 0x4000000) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="3c0000001000855f8c01d7a88937020000000000fb12153f3f410dde3823c7ea255a21e951a7aa28ab1658b8ba22fe8b32ce4b4de8a84c972af678c6f82c31952fb3f34aaebb06492e91f432932e32d05e2953a17ff4ab87e4db6a9e62853266ccf5461f98def56d2e92ecb33882ac4dd9b6f8e870c6df6a0b6f54c267c6eabb00f54ab0af524b", @ANYRES32=r11, @ANYRESOCT=r5], 0x3c}}, 0x24004835) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000001b00)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xa, &(0x7f0000001ac0)={&(0x7f0000000440)={0x5c, r8, 0x204, 0x70bd27, 0x25dfdbfd, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x4}, @HEADER={0x4}, @HEADER={0x34}]}, 0x5c}, 0x1, 0x0, 0x0, 0x8000}, 0x0) getsockopt$sock_linger(r9, 0x1, 0xd, &(0x7f0000000540), &(0x7f0000000380)=0x3c) sendmsg$nl_route(r10, &(0x7f0000000840)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000800)={&(0x7f0000000640)=@ipv6_newrule={0x58, 0x20, 0x100, 0x70bd29, 0x25dfdbfe, {0xa, 0x80, 0x0, 0x40, 0x5, 0x0, 0x0, 0x0, 0x10010}, [@FRA_SRC={0x14, 0x2, @local}, @FRA_DST={0x14, 0x1, @dev={0xfe, 0x80, '\x00', 0x2b}}, @FRA_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000000}, 0x8000) getsockname$packet(r10, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) 08:44:06 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/slabinfo\x00', 0x0, 0x0) lseek(r0, 0x55f0, 0x0) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x5, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) getsockopt$IP_VS_SO_GET_INFO(r1, 0x0, 0x481, &(0x7f0000000080), &(0x7f0000000900)=0xc) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/vlan/vlan0\x00') readv(r2, &(0x7f0000000500)=[{&(0x7f0000000140)=""/111, 0x6f}], 0x1) perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x82, &(0x7f0000000080)={@multicast, @random="e0d35b1004bb", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x74, 0x66, 0x0, 0x0, 0x1, 0x0, @rand_addr=0x64010101, @local}, @time_exceeded={0x3, 0x4, 0x0, 0x3, 0x1, 0x0, {0x16, 0x4, 0x0, 0x0, 0x0, 0x66, 0x0, 0x0, 0x1, 0x0, @loopback, @remote, {[@timestamp_prespec={0x44, 0x44, 0x0, 0x3, 0x9, [{@broadcast}, {@multicast2}, {@loopback}, {@multicast2}, {@multicast2}, {@loopback}, {@loopback}, {@private, 0x6}]}]}}}}}}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x7) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$batadv(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_GATEWAYS(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)={0x1c, r7, 0x711, 0x0, 0x0, {0x9}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000410}, 0x20000004) setsockopt$IPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x41, &(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000002000000000200"/63], 0x48) r8 = syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), 0xffffffffffffffff) setxattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='trusted.overlay.opaque\x00', &(0x7f0000000340)='batadv\x00', 0x7, 0x3) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x52000800}, 0xc, &(0x7f0000000200)={&(0x7f00000006c0)=ANY=[@ANYBLOB="0ead97f5438694c4950facc34000000012da27431f7f360f0052a05e796fd5a90ae873bdbe9e189811d408cda4ebd73ef135725d08ced88fa363b1fdb7ae0c928b0135c299323981890387029db18e3002a9df00021580982669901a083dd400ab432b9863835e75af97213dec9a337cfb644e0ea2f41dd3ddc497a7524d9390ac473900452427ad81aea0950c102051df8519b3c05d7d262c44e3bc51efa6a23ac536979726b176a560c7e12247ee20309b2192d2c1c7a24ac0f244d823ab4b653ae79b5268f77b13a2fbe3b2f867a4c0e472f7229ca911abf4ed2f4fa9ba11d46b8c7bb3094baa00"/253, @ANYRES16=r8, @ANYBLOB="200000000000fedbdf25010000002c00018014000200687372300000000000000000000000001400020073797a6b616c6c657230000000000000"], 0x40}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x24022494}, 0x4000000) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="3c0000001000855f8c01d7a88937020000000000fb12153f3f410dde3823c7ea255a21e951a7aa28ab1658b8ba22fe8b32ce4b4de8a84c972af678c6f82c31952fb3f34aaebb06492e91f432932e32d05e2953a17ff4ab87e4db6a9e62853266ccf5461f98def56d2e92ecb33882ac4dd9b6f8e870c6df6a0b6f54c267c6eabb00f54ab0af524b", @ANYRES32=r11, @ANYRESOCT=r5], 0x3c}}, 0x24004835) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000001b00)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xa, &(0x7f0000001ac0)={&(0x7f0000000440)={0x5c, r8, 0x204, 0x70bd27, 0x25dfdbfd, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x4}, @HEADER={0x4}, @HEADER={0x34}]}, 0x5c}, 0x1, 0x0, 0x0, 0x8000}, 0x0) getsockopt$sock_linger(r9, 0x1, 0xd, &(0x7f0000000540), &(0x7f0000000380)=0x3c) sendmsg$nl_route(r10, &(0x7f0000000840)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000800)={&(0x7f0000000640)=@ipv6_newrule={0x58, 0x20, 0x100, 0x70bd29, 0x25dfdbfe, {0xa, 0x80, 0x0, 0x40, 0x5, 0x0, 0x0, 0x0, 0x10010}, [@FRA_SRC={0x14, 0x2, @local}, @FRA_DST={0x14, 0x1, @dev={0xfe, 0x80, '\x00', 0x2b}}, @FRA_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000000}, 0x8000) getsockname$packet(r10, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) [ 86.539897][ T4368] loop3: detected capacity change from 0 to 8192 [ 86.556795][ T4372] loop0: detected capacity change from 0 to 8192 08:44:06 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/slabinfo\x00', 0x0, 0x0) lseek(r0, 0x55f0, 0x0) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x5, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) getsockopt$IP_VS_SO_GET_INFO(r1, 0x0, 0x481, &(0x7f0000000080), &(0x7f0000000900)=0xc) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/vlan/vlan0\x00') readv(r2, &(0x7f0000000500)=[{&(0x7f0000000140)=""/111, 0x6f}], 0x1) perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x82, &(0x7f0000000080)={@multicast, @random="e0d35b1004bb", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x74, 0x66, 0x0, 0x0, 0x1, 0x0, @rand_addr=0x64010101, @local}, @time_exceeded={0x3, 0x4, 0x0, 0x3, 0x1, 0x0, {0x16, 0x4, 0x0, 0x0, 0x0, 0x66, 0x0, 0x0, 0x1, 0x0, @loopback, @remote, {[@timestamp_prespec={0x44, 0x44, 0x0, 0x3, 0x9, [{@broadcast}, {@multicast2}, {@loopback}, {@multicast2}, {@multicast2}, {@loopback}, {@loopback}, {@private, 0x6}]}]}}}}}}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x7) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$batadv(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_GATEWAYS(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)={0x1c, r7, 0x711, 0x0, 0x0, {0x9}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000410}, 0x20000004) setsockopt$IPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x41, &(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000002000000000200"/63], 0x48) r8 = syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), 0xffffffffffffffff) setxattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='trusted.overlay.opaque\x00', &(0x7f0000000340)='batadv\x00', 0x7, 0x3) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x52000800}, 0xc, &(0x7f0000000200)={&(0x7f00000006c0)=ANY=[@ANYBLOB="0ead97f5438694c4950facc34000000012da27431f7f360f0052a05e796fd5a90ae873bdbe9e189811d408cda4ebd73ef135725d08ced88fa363b1fdb7ae0c928b0135c299323981890387029db18e3002a9df00021580982669901a083dd400ab432b9863835e75af97213dec9a337cfb644e0ea2f41dd3ddc497a7524d9390ac473900452427ad81aea0950c102051df8519b3c05d7d262c44e3bc51efa6a23ac536979726b176a560c7e12247ee20309b2192d2c1c7a24ac0f244d823ab4b653ae79b5268f77b13a2fbe3b2f867a4c0e472f7229ca911abf4ed2f4fa9ba11d46b8c7bb3094baa00"/253, @ANYRES16=r8, @ANYBLOB="200000000000fedbdf25010000002c00018014000200687372300000000000000000000000001400020073797a6b616c6c657230000000000000"], 0x40}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x24022494}, 0x4000000) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="3c0000001000855f8c01d7a88937020000000000fb12153f3f410dde3823c7ea255a21e951a7aa28ab1658b8ba22fe8b32ce4b4de8a84c972af678c6f82c31952fb3f34aaebb06492e91f432932e32d05e2953a17ff4ab87e4db6a9e62853266ccf5461f98def56d2e92ecb33882ac4dd9b6f8e870c6df6a0b6f54c267c6eabb00f54ab0af524b", @ANYRES32=r11, @ANYRESOCT=r5], 0x3c}}, 0x24004835) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000001b00)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xa, &(0x7f0000001ac0)={&(0x7f0000000440)={0x5c, r8, 0x204, 0x70bd27, 0x25dfdbfd, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x4}, @HEADER={0x4}, @HEADER={0x34}]}, 0x5c}, 0x1, 0x0, 0x0, 0x8000}, 0x0) getsockopt$sock_linger(r9, 0x1, 0xd, &(0x7f0000000540), &(0x7f0000000380)=0x3c) sendmsg$nl_route(r10, &(0x7f0000000840)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000800)={&(0x7f0000000640)=@ipv6_newrule={0x58, 0x20, 0x100, 0x70bd29, 0x25dfdbfe, {0xa, 0x80, 0x0, 0x40, 0x5, 0x0, 0x0, 0x0, 0x10010}, [@FRA_SRC={0x14, 0x2, @local}, @FRA_DST={0x14, 0x1, @dev={0xfe, 0x80, '\x00', 0x2b}}, @FRA_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000000}, 0x8000) getsockname$packet(r10, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) 08:44:07 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='bbr\x00', 0x4) sendto$inet(r0, 0x0, 0x0, 0x20020084, &(0x7f00000018c0), 0x10) 08:44:07 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xe, 0x4, 0x8, 0x3, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000240)={r0, &(0x7f0000000280), &(0x7f0000000000)=""/10, 0x2}, 0x20) 08:44:07 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x81, 0x8b}, 0x0) syz_mount_image$vfat(&(0x7f0000001200), &(0x7f0000001240)='./file0\x00', 0x10, &(0x7f0000000000)=ANY=[], 0x1, 0x11ec, &(0x7f0000002480)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.kill\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x800) lseek(r2, 0x200, 0x0) r3 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x10000) write$binfmt_script(r0, &(0x7f00000007c0)=ANY=[], 0x6db6e559) 08:44:07 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/slabinfo\x00', 0x0, 0x0) lseek(r0, 0x55f0, 0x0) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x5, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) getsockopt$IP_VS_SO_GET_INFO(r1, 0x0, 0x481, &(0x7f0000000080), &(0x7f0000000900)=0xc) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/vlan/vlan0\x00') readv(r2, &(0x7f0000000500)=[{&(0x7f0000000140)=""/111, 0x6f}], 0x1) perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x82, &(0x7f0000000080)={@multicast, @random="e0d35b1004bb", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x74, 0x66, 0x0, 0x0, 0x1, 0x0, @rand_addr=0x64010101, @local}, @time_exceeded={0x3, 0x4, 0x0, 0x3, 0x1, 0x0, {0x16, 0x4, 0x0, 0x0, 0x0, 0x66, 0x0, 0x0, 0x1, 0x0, @loopback, @remote, {[@timestamp_prespec={0x44, 0x44, 0x0, 0x3, 0x9, [{@broadcast}, {@multicast2}, {@loopback}, {@multicast2}, {@multicast2}, {@loopback}, {@loopback}, {@private, 0x6}]}]}}}}}}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x7) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$batadv(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_GATEWAYS(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)={0x1c, r7, 0x711, 0x0, 0x0, {0x9}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000410}, 0x20000004) setsockopt$IPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x41, &(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000002000000000200"/63], 0x48) r8 = syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), 0xffffffffffffffff) setxattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='trusted.overlay.opaque\x00', &(0x7f0000000340)='batadv\x00', 0x7, 0x3) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x52000800}, 0xc, &(0x7f0000000200)={&(0x7f00000006c0)=ANY=[@ANYBLOB="0ead97f5438694c4950facc34000000012da27431f7f360f0052a05e796fd5a90ae873bdbe9e189811d408cda4ebd73ef135725d08ced88fa363b1fdb7ae0c928b0135c299323981890387029db18e3002a9df00021580982669901a083dd400ab432b9863835e75af97213dec9a337cfb644e0ea2f41dd3ddc497a7524d9390ac473900452427ad81aea0950c102051df8519b3c05d7d262c44e3bc51efa6a23ac536979726b176a560c7e12247ee20309b2192d2c1c7a24ac0f244d823ab4b653ae79b5268f77b13a2fbe3b2f867a4c0e472f7229ca911abf4ed2f4fa9ba11d46b8c7bb3094baa00"/253, @ANYRES16=r8, @ANYBLOB="200000000000fedbdf25010000002c00018014000200687372300000000000000000000000001400020073797a6b616c6c657230000000000000"], 0x40}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x24022494}, 0x4000000) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="3c0000001000855f8c01d7a88937020000000000fb12153f3f410dde3823c7ea255a21e951a7aa28ab1658b8ba22fe8b32ce4b4de8a84c972af678c6f82c31952fb3f34aaebb06492e91f432932e32d05e2953a17ff4ab87e4db6a9e62853266ccf5461f98def56d2e92ecb33882ac4dd9b6f8e870c6df6a0b6f54c267c6eabb00f54ab0af524b", @ANYRES32=r11, @ANYRESOCT=r5], 0x3c}}, 0x24004835) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000001b00)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xa, &(0x7f0000001ac0)={&(0x7f0000000440)={0x5c, r8, 0x204, 0x70bd27, 0x25dfdbfd, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x4}, @HEADER={0x4}, @HEADER={0x34}]}, 0x5c}, 0x1, 0x0, 0x0, 0x8000}, 0x0) getsockopt$sock_linger(r9, 0x1, 0xd, &(0x7f0000000540), &(0x7f0000000380)=0x3c) sendmsg$nl_route(r10, &(0x7f0000000840)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000800)={&(0x7f0000000640)=@ipv6_newrule={0x58, 0x20, 0x100, 0x70bd29, 0x25dfdbfe, {0xa, 0x80, 0x0, 0x40, 0x5, 0x0, 0x0, 0x0, 0x10010}, [@FRA_SRC={0x14, 0x2, @local}, @FRA_DST={0x14, 0x1, @dev={0xfe, 0x80, '\x00', 0x2b}}, @FRA_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000000}, 0x8000) getsockname$packet(r10, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) 08:44:07 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='bbr\x00', 0x4) sendto$inet(r0, 0x0, 0x0, 0x20020084, &(0x7f00000018c0), 0x10) 08:44:07 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xe, 0x4, 0x8, 0x3, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000240)={r0, &(0x7f0000000280), &(0x7f0000000000)=""/10, 0x2}, 0x20) 08:44:07 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40200000800000061114c0000000000850000001c0000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x3}, 0x48) 08:44:07 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000200)={0x2}, 0x1) 08:44:07 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000080)=@gcm_128={{0x303, 0x38}, "837ad552eed22b08", "a4326bf47c648997a7347f1767b53cc5", "030000f6", "0000ff45004fffff"}, 0x28) setsockopt$SO_TIMESTAMP(r0, 0x29, 0x4e, &(0x7f0000000140), 0x4) 08:44:07 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xe, 0x4, 0x8, 0x3, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000240)={r0, &(0x7f0000000280), &(0x7f0000000000)=""/10, 0x2}, 0x20) 08:44:07 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40200000800000061114c0000000000850000001c0000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x3}, 0x48) 08:44:07 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xe, 0x4, 0x8, 0x3, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000240)={r0, &(0x7f0000000280), &(0x7f0000000000)=""/10, 0x2}, 0x20) [ 87.224299][ T4387] loop5: detected capacity change from 0 to 8192 08:44:07 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='bbr\x00', 0x4) sendto$inet(r0, 0x0, 0x0, 0x20020084, &(0x7f00000018c0), 0x10) 08:44:07 executing program 2: r0 = fsopen(&(0x7f0000000040)='bpf\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x5) openat$cgroup_ro(r1, &(0x7f0000000240)='memory.events\x00', 0x275a, 0x0) [ 87.387123][ T4412] ================================================================== [ 87.395250][ T4412] BUG: KCSAN: data-race in mark_buffer_dirty_inode / sync_mapping_buffers [ 87.403791][ T4412] [ 87.406133][ T4412] write to 0xffff888136c0ca18 of 8 bytes by task 4387 on cpu 0: [ 87.413772][ T4412] sync_mapping_buffers+0x165/0x7d0 [ 87.418980][ T4412] fat_file_fsync+0xad/0x100 [ 87.423577][ T4412] vfs_fsync_range+0x10b/0x120 [ 87.428371][ T4412] generic_file_write_iter+0x191/0x1c0 [ 87.433852][ T4412] do_iter_write+0x4ae/0x770 [ 87.438453][ T4412] vfs_iter_write+0x50/0x70 [ 87.442966][ T4412] iter_file_splice_write+0x456/0x7d0 [ 87.448340][ T4412] direct_splice_actor+0x84/0xa0 [ 87.453278][ T4412] splice_direct_to_actor+0x2ee/0x5f0 [ 87.458649][ T4412] do_splice_direct+0x104/0x180 [ 87.463498][ T4412] do_sendfile+0x3b8/0x950 [ 87.467924][ T4412] __x64_sys_sendfile64+0x110/0x150 [ 87.473124][ T4412] do_syscall_64+0x41/0xc0 [ 87.477548][ T4412] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 87.483455][ T4412] [ 87.485779][ T4412] read to 0xffff888136c0ca18 of 8 bytes by task 4412 on cpu 1: [ 87.493322][ T4412] mark_buffer_dirty_inode+0x96/0x1c0 [ 87.498777][ T4412] fat_mirror_bhs+0x212/0x310 [ 87.503454][ T4412] fat_alloc_clusters+0x973/0xa60 [ 87.508477][ T4412] fat_get_block+0x25c/0x5e0 [ 87.513086][ T4412] __block_write_begin_int+0x3b0/0xf50 [ 87.518546][ T4412] block_write_begin+0x7c/0x180 [ 87.523428][ T4412] cont_write_begin+0x4c0/0x6f0 [ 87.528281][ T4412] fat_write_begin+0x61/0xf0 [ 87.532873][ T4412] generic_perform_write+0x1c3/0x3d0 [ 87.538163][ T4412] __generic_file_write_iter+0xe6/0x290 [ 87.543724][ T4412] generic_file_write_iter+0x7d/0x1c0 [ 87.549110][ T4412] vfs_write+0x47b/0x780 [ 87.553352][ T4412] ksys_write+0xeb/0x1a0 [ 87.557594][ T4412] __x64_sys_write+0x42/0x50 [ 87.562191][ T4412] do_syscall_64+0x41/0xc0 [ 87.566626][ T4412] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 87.572530][ T4412] [ 87.574847][ T4412] value changed: 0xffff888109eafe50 -> 0x0000000000000000 [ 87.581948][ T4412] [ 87.584281][ T4412] Reported by Kernel Concurrency Sanitizer on: [ 87.590423][ T4412] CPU: 1 PID: 4412 Comm: syz-executor.5 Not tainted 6.4.0-rc5-syzkaller-00024-g5f63595ebd82 #0 [ 87.601005][ T4412] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/25/2023 [ 87.611058][ T4412] ================================================================== [ 87.625015][ T25] audit: type=1400 audit(1686213847.750:200): avc: denied { mount } for pid=4403 comm="syz-executor.2" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 08:44:08 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='bbr\x00', 0x4) sendto$inet(r0, 0x0, 0x0, 0x20020084, &(0x7f00000018c0), 0x10) 08:44:08 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40200000800000061114c0000000000850000001c0000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x3}, 0x48) 08:44:08 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000200)={0x2}, 0x1) 08:44:08 executing program 2: r0 = fsopen(&(0x7f0000000040)='bpf\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x5) openat$cgroup_ro(r1, &(0x7f0000000240)='memory.events\x00', 0x275a, 0x0) 08:44:08 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000080)=@gcm_128={{0x303, 0x38}, "837ad552eed22b08", "a4326bf47c648997a7347f1767b53cc5", "030000f6", "0000ff45004fffff"}, 0x28) setsockopt$SO_TIMESTAMP(r0, 0x29, 0x4e, &(0x7f0000000140), 0x4) 08:44:08 executing program 5: r0 = fsopen(&(0x7f0000000040)='bpf\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x5) openat$cgroup_ro(r1, &(0x7f0000000240)='memory.events\x00', 0x275a, 0x0) 08:44:08 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000200)={0x2}, 0x1) 08:44:08 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40200000800000061114c0000000000850000001c0000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x3}, 0x48) [ 87.880820][ T4412] syz-executor.5 (4412) used greatest stack depth: 10808 bytes left 08:44:08 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000200)={0x2}, 0x1) 08:44:08 executing program 2: r0 = fsopen(&(0x7f0000000040)='bpf\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x5) openat$cgroup_ro(r1, &(0x7f0000000240)='memory.events\x00', 0x275a, 0x0) 08:44:08 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200087e8, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba78050a34f65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03859bcecc7a95425a3a07e756d44ab4ea6f7ae55d88fecf9111a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0xc, &(0x7f0000000040)=[@sack_perm, @sack_perm, @mss, @mss], 0x4) 08:44:08 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200087e8, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba78050a34f65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03859bcecc7a95425a3a07e756d44ab4ea6f7ae55d88fecf9111a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0xc, &(0x7f0000000040)=[@sack_perm, @sack_perm, @mss, @mss], 0x4) 08:44:08 executing program 5: r0 = fsopen(&(0x7f0000000040)='bpf\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x5) openat$cgroup_ro(r1, &(0x7f0000000240)='memory.events\x00', 0x275a, 0x0) 08:44:08 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000200)={0x2}, 0x1) 08:44:08 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000200)={0x2}, 0x1) [ 88.004540][ T25] audit: type=1400 audit(1686213848.130:201): avc: denied { name_bind } for pid=4449 comm="syz-executor.1" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 08:44:08 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200087e8, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba78050a34f65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03859bcecc7a95425a3a07e756d44ab4ea6f7ae55d88fecf9111a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0xc, &(0x7f0000000040)=[@sack_perm, @sack_perm, @mss, @mss], 0x4) [ 88.095821][ T25] audit: type=1400 audit(1686213848.130:202): avc: denied { node_bind } for pid=4449 comm="syz-executor.1" saddr=255.255.255.255 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 08:44:08 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000080)=@gcm_128={{0x303, 0x38}, "837ad552eed22b08", "a4326bf47c648997a7347f1767b53cc5", "030000f6", "0000ff45004fffff"}, 0x28) setsockopt$SO_TIMESTAMP(r0, 0x29, 0x4e, &(0x7f0000000140), 0x4) 08:44:08 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200087e8, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba78050a34f65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03859bcecc7a95425a3a07e756d44ab4ea6f7ae55d88fecf9111a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0xc, &(0x7f0000000040)=[@sack_perm, @sack_perm, @mss, @mss], 0x4) 08:44:08 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000200)={0x2}, 0x1) 08:44:08 executing program 4: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_FLUSH(r0, 0x0, 0x11, 0x0, 0x2900) 08:44:08 executing program 2: r0 = fsopen(&(0x7f0000000040)='bpf\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x5) openat$cgroup_ro(r1, &(0x7f0000000240)='memory.events\x00', 0x275a, 0x0) 08:44:08 executing program 5: r0 = fsopen(&(0x7f0000000040)='bpf\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x5) openat$cgroup_ro(r1, &(0x7f0000000240)='memory.events\x00', 0x275a, 0x0) 08:44:08 executing program 4: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_FLUSH(r0, 0x0, 0x11, 0x0, 0x2900) 08:44:08 executing program 4: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_FLUSH(r0, 0x0, 0x11, 0x0, 0x2900) 08:44:08 executing program 1: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.swap.events\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x2010, r0, 0xf265e000) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0xfc, 0x0, 0x0, 0x50d, 0x2400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x80, 0x3, 0x2, 0x0, 0x3, 0x0, 0x0, 0x0, 0xfff}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00000006c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="0207680902"], 0x10}}, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in=@multicast2, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, {}, 0x0, 0x0, 0x1}, {{@in=@rand_addr=0x64010101, 0x800, 0x32}, 0x0, @in=@multicast2, 0x0, 0x0, 0x0, 0xb7, 0x1fd}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0xa742250118) r3 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001680)={0x50, 0x13, 0x1, 0x0, 0x0, {}, [@INET_DIAG_REQ_BYTECODE={0x4, 0x3}]}, 0x50}}, 0x0) shutdown(r3, 0x1) 08:44:08 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000500)={0xffffffffffffffff, &(0x7f0000000480)="684bac1a5ef990e660cad34776dace476429418076ffdb65", &(0x7f00000004c0)=""/16}, 0x20) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000006d00000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='hugetlb.1GB.usage_in_bytes\x00', 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[], 0x32600) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.throttle.io_service_bytes_recursive\x00', 0x7a05, 0x1700) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = getpid() write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x8, 0x0, 0x0, 0x4, 0x8000, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x581d, 0x0, @perf_bp={&(0x7f0000000000), 0x3}, 0x2010, 0x5, 0x5, 0x0, 0x100000000, 0x0, 0x7, 0x0, 0x6}, r3, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000340)=0x7) syz_clone(0x44001000, 0x0, 0x0, &(0x7f0000001200), 0x0, 0x0) syz_clone(0x44000, &(0x7f0000000600)="96ae1a6e4a39f63ddba4325745857b3d4521af1b8ccfe89647d829a50c6b4615cfb6d4240780fbcefaa2e60d923214876d9a5127ff7e484e2ad23351bef475668954bb62d701390c37ebaa8c896556b364d21de3e2f93bd8be25488e2a07e74c17f6d3a9448d8237b04d1d129bed4f2f686873258ed4e534ae81d9a515c5767716e5516cadfc8a97a43660002a634c1350798c4e8fcb779ca4d2c179", 0x9c, &(0x7f0000000100), &(0x7f0000000300), &(0x7f00000006c0)="c9fc165bb0d14268b977a7d957a8ca4e103f6a773e9eae8775c8e824cb0a871143408ad5f0cace6bfde45c76bddaa4a6976334fe8a824fe50b463788aeae94d15d597c7d5deea465e61e4d3e2c29e2497d7edfaa3b10300eedc4145db2307415c47c5f044ca33022666bc6a0402555d3e1b247fe3def37aaf6c3c27a883c7829dd0f4b7291e1eb") bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000400), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000009c0)={r5, 0xe0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000540)=[0x0, 0x0, 0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000800), &(0x7f0000000840), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000880)}}, 0x10) 08:44:08 executing program 4: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_FLUSH(r0, 0x0, 0x11, 0x0, 0x2900) 08:44:08 executing program 0: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14507e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) io_setup(0x5ff, &(0x7f0000000040)=0x0) io_submit(r2, 0x2, &(0x7f0000001d00)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000000)="96", 0x1}, &(0x7f0000000080)={0x0, 0x0, 0x41, 0x5, 0x0, r0, 0x0, 0x0, 0x2}]) [ 88.342729][ T25] audit: type=1400 audit(1686213848.470:203): avc: denied { map } for pid=4499 comm="syz-executor.1" path="socket:[21913]" dev="sockfs" ino=21913 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=udp_socket permissive=1 [ 88.403269][ C1] hrtimer: interrupt took 17700 ns [ 88.420516][ T25] audit: type=1400 audit(1686213848.550:204): avc: denied { write } for pid=4504 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 08:44:08 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000080)=@gcm_128={{0x303, 0x38}, "837ad552eed22b08", "a4326bf47c648997a7347f1767b53cc5", "030000f6", "0000ff45004fffff"}, 0x28) setsockopt$SO_TIMESTAMP(r0, 0x29, 0x4e, &(0x7f0000000140), 0x4) 08:44:08 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) io_setup(0x8, &(0x7f0000000000)=0x0) io_submit(r1, 0x2, &(0x7f0000004f80)=[&(0x7f0000003880)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}, &(0x7f0000003dc0)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 08:44:08 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x0, 0x5, &(0x7f0000000740)=ANY=[@ANYBLOB="180000000700060800000000000000008500000075000000070000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x11, 0x5, &(0x7f0000000740)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)='ext4_es_insert_delayed_block\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='blkio.bfq.sectors\x00', 0x26e1, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0x7bc03) 08:44:08 executing program 0: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14507e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) io_setup(0x5ff, &(0x7f0000000040)=0x0) io_submit(r2, 0x2, &(0x7f0000001d00)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000000)="96", 0x1}, &(0x7f0000000080)={0x0, 0x0, 0x41, 0x5, 0x0, r0, 0x0, 0x0, 0x2}]) 08:44:08 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) io_setup(0x8, &(0x7f0000000000)=0x0) io_submit(r1, 0x2, &(0x7f0000004f80)=[&(0x7f0000003880)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}, &(0x7f0000003dc0)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) [ 88.508378][ T25] audit: type=1400 audit(1686213848.640:205): avc: denied { shutdown } for pid=4499 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 08:44:08 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x0, 0x5, &(0x7f0000000740)=ANY=[@ANYBLOB="180000000700060800000000000000008500000075000000070000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x11, 0x5, &(0x7f0000000740)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)='ext4_es_insert_delayed_block\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='blkio.bfq.sectors\x00', 0x26e1, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0x7bc03) 08:44:08 executing program 0: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14507e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) io_setup(0x5ff, &(0x7f0000000040)=0x0) io_submit(r2, 0x2, &(0x7f0000001d00)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000000)="96", 0x1}, &(0x7f0000000080)={0x0, 0x0, 0x41, 0x5, 0x0, r0, 0x0, 0x0, 0x2}]) 08:44:08 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) io_setup(0x8, &(0x7f0000000000)=0x0) io_submit(r1, 0x2, &(0x7f0000004f80)=[&(0x7f0000003880)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}, &(0x7f0000003dc0)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 08:44:09 executing program 1: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.swap.events\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x2010, r0, 0xf265e000) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0xfc, 0x0, 0x0, 0x50d, 0x2400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x80, 0x3, 0x2, 0x0, 0x3, 0x0, 0x0, 0x0, 0xfff}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00000006c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="0207680902"], 0x10}}, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in=@multicast2, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, {}, 0x0, 0x0, 0x1}, {{@in=@rand_addr=0x64010101, 0x800, 0x32}, 0x0, @in=@multicast2, 0x0, 0x0, 0x0, 0xb7, 0x1fd}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0xa742250118) r3 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001680)={0x50, 0x13, 0x1, 0x0, 0x0, {}, [@INET_DIAG_REQ_BYTECODE={0x4, 0x3}]}, 0x50}}, 0x0) shutdown(r3, 0x1) 08:44:09 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x0, 0x5, &(0x7f0000000740)=ANY=[@ANYBLOB="180000000700060800000000000000008500000075000000070000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x11, 0x5, &(0x7f0000000740)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)='ext4_es_insert_delayed_block\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='blkio.bfq.sectors\x00', 0x26e1, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0x7bc03) 08:44:09 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) io_setup(0x8, &(0x7f0000000000)=0x0) io_submit(r1, 0x2, &(0x7f0000004f80)=[&(0x7f0000003880)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}, &(0x7f0000003dc0)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 08:44:09 executing program 0: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14507e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) io_setup(0x5ff, &(0x7f0000000040)=0x0) io_submit(r2, 0x2, &(0x7f0000001d00)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000000)="96", 0x1}, &(0x7f0000000080)={0x0, 0x0, 0x41, 0x5, 0x0, r0, 0x0, 0x0, 0x2}]) 08:44:09 executing program 3: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000100)=@ipv6_delroute={0x1c}, 0x1c}}, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0xe0c81) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f00000003c0)={0x0, 0x0, 0x0, 'queue0\x00'}) write$sndseq(r0, &(0x7f0000000000)=[{0x84, 0x77, 0x0, 0x0, @tick, {}, {}, @raw32}], 0xffc8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000080)={0x26, @time}) 08:44:09 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000500)={0xffffffffffffffff, &(0x7f0000000480)="684bac1a5ef990e660cad34776dace476429418076ffdb65", &(0x7f00000004c0)=""/16}, 0x20) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000006d00000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='hugetlb.1GB.usage_in_bytes\x00', 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[], 0x32600) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.throttle.io_service_bytes_recursive\x00', 0x7a05, 0x1700) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = getpid() write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x8, 0x0, 0x0, 0x4, 0x8000, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x581d, 0x0, @perf_bp={&(0x7f0000000000), 0x3}, 0x2010, 0x5, 0x5, 0x0, 0x100000000, 0x0, 0x7, 0x0, 0x6}, r3, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000340)=0x7) syz_clone(0x44001000, 0x0, 0x0, &(0x7f0000001200), 0x0, 0x0) syz_clone(0x44000, &(0x7f0000000600)="96ae1a6e4a39f63ddba4325745857b3d4521af1b8ccfe89647d829a50c6b4615cfb6d4240780fbcefaa2e60d923214876d9a5127ff7e484e2ad23351bef475668954bb62d701390c37ebaa8c896556b364d21de3e2f93bd8be25488e2a07e74c17f6d3a9448d8237b04d1d129bed4f2f686873258ed4e534ae81d9a515c5767716e5516cadfc8a97a43660002a634c1350798c4e8fcb779ca4d2c179", 0x9c, &(0x7f0000000100), &(0x7f0000000300), &(0x7f00000006c0)="c9fc165bb0d14268b977a7d957a8ca4e103f6a773e9eae8775c8e824cb0a871143408ad5f0cace6bfde45c76bddaa4a6976334fe8a824fe50b463788aeae94d15d597c7d5deea465e61e4d3e2c29e2497d7edfaa3b10300eedc4145db2307415c47c5f044ca33022666bc6a0402555d3e1b247fe3def37aaf6c3c27a883c7829dd0f4b7291e1eb") bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000400), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000009c0)={r5, 0xe0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000540)=[0x0, 0x0, 0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000800), &(0x7f0000000840), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000880)}}, 0x10) 08:44:09 executing program 3: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000100)=@ipv6_delroute={0x1c}, 0x1c}}, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0xe0c81) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f00000003c0)={0x0, 0x0, 0x0, 'queue0\x00'}) write$sndseq(r0, &(0x7f0000000000)=[{0x84, 0x77, 0x0, 0x0, @tick, {}, {}, @raw32}], 0xffc8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000080)={0x26, @time}) 08:44:09 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.swap.events\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x2010, r0, 0xf265e000) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0xfc, 0x0, 0x0, 0x50d, 0x2400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x80, 0x3, 0x2, 0x0, 0x3, 0x0, 0x0, 0x0, 0xfff}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00000006c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="0207680902"], 0x10}}, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in=@multicast2, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, {}, 0x0, 0x0, 0x1}, {{@in=@rand_addr=0x64010101, 0x800, 0x32}, 0x0, @in=@multicast2, 0x0, 0x0, 0x0, 0xb7, 0x1fd}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0xa742250118) r3 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001680)={0x50, 0x13, 0x1, 0x0, 0x0, {}, [@INET_DIAG_REQ_BYTECODE={0x4, 0x3}]}, 0x50}}, 0x0) shutdown(r3, 0x1) 08:44:09 executing program 3: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000100)=@ipv6_delroute={0x1c}, 0x1c}}, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0xe0c81) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f00000003c0)={0x0, 0x0, 0x0, 'queue0\x00'}) write$sndseq(r0, &(0x7f0000000000)=[{0x84, 0x77, 0x0, 0x0, @tick, {}, {}, @raw32}], 0xffc8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000080)={0x26, @time}) 08:44:09 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x0, 0x5, &(0x7f0000000740)=ANY=[@ANYBLOB="180000000700060800000000000000008500000075000000070000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x11, 0x5, &(0x7f0000000740)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)='ext4_es_insert_delayed_block\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='blkio.bfq.sectors\x00', 0x26e1, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0x7bc03) 08:44:09 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.swap.events\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x2010, r0, 0xf265e000) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0xfc, 0x0, 0x0, 0x50d, 0x2400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x80, 0x3, 0x2, 0x0, 0x3, 0x0, 0x0, 0x0, 0xfff}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00000006c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="0207680902"], 0x10}}, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in=@multicast2, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, {}, 0x0, 0x0, 0x1}, {{@in=@rand_addr=0x64010101, 0x800, 0x32}, 0x0, @in=@multicast2, 0x0, 0x0, 0x0, 0xb7, 0x1fd}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0xa742250118) r3 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001680)={0x50, 0x13, 0x1, 0x0, 0x0, {}, [@INET_DIAG_REQ_BYTECODE={0x4, 0x3}]}, 0x50}}, 0x0) shutdown(r3, 0x1) 08:44:09 executing program 3: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000100)=@ipv6_delroute={0x1c}, 0x1c}}, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0xe0c81) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f00000003c0)={0x0, 0x0, 0x0, 'queue0\x00'}) write$sndseq(r0, &(0x7f0000000000)=[{0x84, 0x77, 0x0, 0x0, @tick, {}, {}, @raw32}], 0xffc8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000080)={0x26, @time}) 08:44:10 executing program 1: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.swap.events\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x2010, r0, 0xf265e000) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0xfc, 0x0, 0x0, 0x50d, 0x2400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x80, 0x3, 0x2, 0x0, 0x3, 0x0, 0x0, 0x0, 0xfff}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00000006c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="0207680902"], 0x10}}, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in=@multicast2, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, {}, 0x0, 0x0, 0x1}, {{@in=@rand_addr=0x64010101, 0x800, 0x32}, 0x0, @in=@multicast2, 0x0, 0x0, 0x0, 0xb7, 0x1fd}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0xa742250118) r3 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001680)={0x50, 0x13, 0x1, 0x0, 0x0, {}, [@INET_DIAG_REQ_BYTECODE={0x4, 0x3}]}, 0x50}}, 0x0) shutdown(r3, 0x1) 08:44:10 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000500)={0xffffffffffffffff, &(0x7f0000000480)="684bac1a5ef990e660cad34776dace476429418076ffdb65", &(0x7f00000004c0)=""/16}, 0x20) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000006d00000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='hugetlb.1GB.usage_in_bytes\x00', 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[], 0x32600) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.throttle.io_service_bytes_recursive\x00', 0x7a05, 0x1700) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = getpid() write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x8, 0x0, 0x0, 0x4, 0x8000, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x581d, 0x0, @perf_bp={&(0x7f0000000000), 0x3}, 0x2010, 0x5, 0x5, 0x0, 0x100000000, 0x0, 0x7, 0x0, 0x6}, r3, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000340)=0x7) syz_clone(0x44001000, 0x0, 0x0, &(0x7f0000001200), 0x0, 0x0) syz_clone(0x44000, &(0x7f0000000600)="96ae1a6e4a39f63ddba4325745857b3d4521af1b8ccfe89647d829a50c6b4615cfb6d4240780fbcefaa2e60d923214876d9a5127ff7e484e2ad23351bef475668954bb62d701390c37ebaa8c896556b364d21de3e2f93bd8be25488e2a07e74c17f6d3a9448d8237b04d1d129bed4f2f686873258ed4e534ae81d9a515c5767716e5516cadfc8a97a43660002a634c1350798c4e8fcb779ca4d2c179", 0x9c, &(0x7f0000000100), &(0x7f0000000300), &(0x7f00000006c0)="c9fc165bb0d14268b977a7d957a8ca4e103f6a773e9eae8775c8e824cb0a871143408ad5f0cace6bfde45c76bddaa4a6976334fe8a824fe50b463788aeae94d15d597c7d5deea465e61e4d3e2c29e2497d7edfaa3b10300eedc4145db2307415c47c5f044ca33022666bc6a0402555d3e1b247fe3def37aaf6c3c27a883c7829dd0f4b7291e1eb") bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000400), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000009c0)={r5, 0xe0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000540)=[0x0, 0x0, 0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000800), &(0x7f0000000840), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000880)}}, 0x10) 08:44:10 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 08:44:10 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000500)={0xffffffffffffffff, &(0x7f0000000480)="684bac1a5ef990e660cad34776dace476429418076ffdb65", &(0x7f00000004c0)=""/16}, 0x20) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000006d00000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='hugetlb.1GB.usage_in_bytes\x00', 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[], 0x32600) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.throttle.io_service_bytes_recursive\x00', 0x7a05, 0x1700) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = getpid() write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x8, 0x0, 0x0, 0x4, 0x8000, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x581d, 0x0, @perf_bp={&(0x7f0000000000), 0x3}, 0x2010, 0x5, 0x5, 0x0, 0x100000000, 0x0, 0x7, 0x0, 0x6}, r3, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000340)=0x7) syz_clone(0x44001000, 0x0, 0x0, &(0x7f0000001200), 0x0, 0x0) syz_clone(0x44000, &(0x7f0000000600)="96ae1a6e4a39f63ddba4325745857b3d4521af1b8ccfe89647d829a50c6b4615cfb6d4240780fbcefaa2e60d923214876d9a5127ff7e484e2ad23351bef475668954bb62d701390c37ebaa8c896556b364d21de3e2f93bd8be25488e2a07e74c17f6d3a9448d8237b04d1d129bed4f2f686873258ed4e534ae81d9a515c5767716e5516cadfc8a97a43660002a634c1350798c4e8fcb779ca4d2c179", 0x9c, &(0x7f0000000100), &(0x7f0000000300), &(0x7f00000006c0)="c9fc165bb0d14268b977a7d957a8ca4e103f6a773e9eae8775c8e824cb0a871143408ad5f0cace6bfde45c76bddaa4a6976334fe8a824fe50b463788aeae94d15d597c7d5deea465e61e4d3e2c29e2497d7edfaa3b10300eedc4145db2307415c47c5f044ca33022666bc6a0402555d3e1b247fe3def37aaf6c3c27a883c7829dd0f4b7291e1eb") bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000400), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000009c0)={r5, 0xe0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000540)=[0x0, 0x0, 0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000800), &(0x7f0000000840), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000880)}}, 0x10) 08:44:10 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.swap.events\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x2010, r0, 0xf265e000) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0xfc, 0x0, 0x0, 0x50d, 0x2400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x80, 0x3, 0x2, 0x0, 0x3, 0x0, 0x0, 0x0, 0xfff}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00000006c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="0207680902"], 0x10}}, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in=@multicast2, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, {}, 0x0, 0x0, 0x1}, {{@in=@rand_addr=0x64010101, 0x800, 0x32}, 0x0, @in=@multicast2, 0x0, 0x0, 0x0, 0xb7, 0x1fd}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0xa742250118) r3 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001680)={0x50, 0x13, 0x1, 0x0, 0x0, {}, [@INET_DIAG_REQ_BYTECODE={0x4, 0x3}]}, 0x50}}, 0x0) shutdown(r3, 0x1) 08:44:10 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.swap.events\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x2010, r0, 0xf265e000) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0xfc, 0x0, 0x0, 0x50d, 0x2400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x80, 0x3, 0x2, 0x0, 0x3, 0x0, 0x0, 0x0, 0xfff}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00000006c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="0207680902"], 0x10}}, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in=@multicast2, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, {}, 0x0, 0x0, 0x1}, {{@in=@rand_addr=0x64010101, 0x800, 0x32}, 0x0, @in=@multicast2, 0x0, 0x0, 0x0, 0xb7, 0x1fd}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0xa742250118) r3 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001680)={0x50, 0x13, 0x1, 0x0, 0x0, {}, [@INET_DIAG_REQ_BYTECODE={0x4, 0x3}]}, 0x50}}, 0x0) shutdown(r3, 0x1) 08:44:10 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 08:44:10 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 08:44:10 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 08:44:11 executing program 4: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$notify(r0, 0x402, 0x25) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$notify(r1, 0x402, 0x25) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$notify(r2, 0x402, 0x25) r3 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fsetxattr$system_posix_acl(r3, &(0x7f0000000100)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 08:44:11 executing program 4: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$notify(r0, 0x402, 0x25) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$notify(r1, 0x402, 0x25) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$notify(r2, 0x402, 0x25) r3 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fsetxattr$system_posix_acl(r3, &(0x7f0000000100)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 08:44:11 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000500)={0xffffffffffffffff, &(0x7f0000000480)="684bac1a5ef990e660cad34776dace476429418076ffdb65", &(0x7f00000004c0)=""/16}, 0x20) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000006d00000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='hugetlb.1GB.usage_in_bytes\x00', 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[], 0x32600) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.throttle.io_service_bytes_recursive\x00', 0x7a05, 0x1700) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = getpid() write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x8, 0x0, 0x0, 0x4, 0x8000, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x581d, 0x0, @perf_bp={&(0x7f0000000000), 0x3}, 0x2010, 0x5, 0x5, 0x0, 0x100000000, 0x0, 0x7, 0x0, 0x6}, r3, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000340)=0x7) syz_clone(0x44001000, 0x0, 0x0, &(0x7f0000001200), 0x0, 0x0) syz_clone(0x44000, &(0x7f0000000600)="96ae1a6e4a39f63ddba4325745857b3d4521af1b8ccfe89647d829a50c6b4615cfb6d4240780fbcefaa2e60d923214876d9a5127ff7e484e2ad23351bef475668954bb62d701390c37ebaa8c896556b364d21de3e2f93bd8be25488e2a07e74c17f6d3a9448d8237b04d1d129bed4f2f686873258ed4e534ae81d9a515c5767716e5516cadfc8a97a43660002a634c1350798c4e8fcb779ca4d2c179", 0x9c, &(0x7f0000000100), &(0x7f0000000300), &(0x7f00000006c0)="c9fc165bb0d14268b977a7d957a8ca4e103f6a773e9eae8775c8e824cb0a871143408ad5f0cace6bfde45c76bddaa4a6976334fe8a824fe50b463788aeae94d15d597c7d5deea465e61e4d3e2c29e2497d7edfaa3b10300eedc4145db2307415c47c5f044ca33022666bc6a0402555d3e1b247fe3def37aaf6c3c27a883c7829dd0f4b7291e1eb") bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000400), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000009c0)={r5, 0xe0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000540)=[0x0, 0x0, 0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000800), &(0x7f0000000840), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000880)}}, 0x10) 08:44:11 executing program 1: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.swap.events\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x2010, r0, 0xf265e000) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0xfc, 0x0, 0x0, 0x50d, 0x2400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x80, 0x3, 0x2, 0x0, 0x3, 0x0, 0x0, 0x0, 0xfff}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00000006c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="0207680902"], 0x10}}, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in=@multicast2, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, {}, 0x0, 0x0, 0x1}, {{@in=@rand_addr=0x64010101, 0x800, 0x32}, 0x0, @in=@multicast2, 0x0, 0x0, 0x0, 0xb7, 0x1fd}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0xa742250118) r3 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001680)={0x50, 0x13, 0x1, 0x0, 0x0, {}, [@INET_DIAG_REQ_BYTECODE={0x4, 0x3}]}, 0x50}}, 0x0) shutdown(r3, 0x1) 08:44:11 executing program 4: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$notify(r0, 0x402, 0x25) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$notify(r1, 0x402, 0x25) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$notify(r2, 0x402, 0x25) r3 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fsetxattr$system_posix_acl(r3, &(0x7f0000000100)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 08:44:11 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000500)={0xffffffffffffffff, &(0x7f0000000480)="684bac1a5ef990e660cad34776dace476429418076ffdb65", &(0x7f00000004c0)=""/16}, 0x20) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000006d00000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='hugetlb.1GB.usage_in_bytes\x00', 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[], 0x32600) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.throttle.io_service_bytes_recursive\x00', 0x7a05, 0x1700) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = getpid() write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x8, 0x0, 0x0, 0x4, 0x8000, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x581d, 0x0, @perf_bp={&(0x7f0000000000), 0x3}, 0x2010, 0x5, 0x5, 0x0, 0x100000000, 0x0, 0x7, 0x0, 0x6}, r3, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000340)=0x7) syz_clone(0x44001000, 0x0, 0x0, &(0x7f0000001200), 0x0, 0x0) syz_clone(0x44000, &(0x7f0000000600)="96ae1a6e4a39f63ddba4325745857b3d4521af1b8ccfe89647d829a50c6b4615cfb6d4240780fbcefaa2e60d923214876d9a5127ff7e484e2ad23351bef475668954bb62d701390c37ebaa8c896556b364d21de3e2f93bd8be25488e2a07e74c17f6d3a9448d8237b04d1d129bed4f2f686873258ed4e534ae81d9a515c5767716e5516cadfc8a97a43660002a634c1350798c4e8fcb779ca4d2c179", 0x9c, &(0x7f0000000100), &(0x7f0000000300), &(0x7f00000006c0)="c9fc165bb0d14268b977a7d957a8ca4e103f6a773e9eae8775c8e824cb0a871143408ad5f0cace6bfde45c76bddaa4a6976334fe8a824fe50b463788aeae94d15d597c7d5deea465e61e4d3e2c29e2497d7edfaa3b10300eedc4145db2307415c47c5f044ca33022666bc6a0402555d3e1b247fe3def37aaf6c3c27a883c7829dd0f4b7291e1eb") bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000400), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000009c0)={r5, 0xe0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000540)=[0x0, 0x0, 0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000800), &(0x7f0000000840), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000880)}}, 0x10) 08:44:11 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.swap.events\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x2010, r0, 0xf265e000) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0xfc, 0x0, 0x0, 0x50d, 0x2400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x80, 0x3, 0x2, 0x0, 0x3, 0x0, 0x0, 0x0, 0xfff}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00000006c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="0207680902"], 0x10}}, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in=@multicast2, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, {}, 0x0, 0x0, 0x1}, {{@in=@rand_addr=0x64010101, 0x800, 0x32}, 0x0, @in=@multicast2, 0x0, 0x0, 0x0, 0xb7, 0x1fd}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0xa742250118) r3 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001680)={0x50, 0x13, 0x1, 0x0, 0x0, {}, [@INET_DIAG_REQ_BYTECODE={0x4, 0x3}]}, 0x50}}, 0x0) shutdown(r3, 0x1) 08:44:11 executing program 4: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$notify(r0, 0x402, 0x25) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$notify(r1, 0x402, 0x25) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$notify(r2, 0x402, 0x25) r3 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fsetxattr$system_posix_acl(r3, &(0x7f0000000100)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 08:44:11 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.swap.events\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x2010, r0, 0xf265e000) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0xfc, 0x0, 0x0, 0x50d, 0x2400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x80, 0x3, 0x2, 0x0, 0x3, 0x0, 0x0, 0x0, 0xfff}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00000006c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="0207680902"], 0x10}}, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in=@multicast2, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, {}, 0x0, 0x0, 0x1}, {{@in=@rand_addr=0x64010101, 0x800, 0x32}, 0x0, @in=@multicast2, 0x0, 0x0, 0x0, 0xb7, 0x1fd}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0xa742250118) r3 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001680)={0x50, 0x13, 0x1, 0x0, 0x0, {}, [@INET_DIAG_REQ_BYTECODE={0x4, 0x3}]}, 0x50}}, 0x0) shutdown(r3, 0x1) 08:44:11 executing program 4: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$notify(r0, 0x402, 0x25) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$notify(r1, 0x402, 0x25) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$notify(r2, 0x402, 0x25) r3 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fsetxattr$system_posix_acl(r3, &(0x7f0000000100)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 08:44:11 executing program 4: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$notify(r0, 0x402, 0x25) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$notify(r1, 0x402, 0x25) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$notify(r2, 0x402, 0x25) r3 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fsetxattr$system_posix_acl(r3, &(0x7f0000000100)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 08:44:11 executing program 4: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$notify(r0, 0x402, 0x25) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$notify(r1, 0x402, 0x25) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$notify(r2, 0x402, 0x25) r3 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fsetxattr$system_posix_acl(r3, &(0x7f0000000100)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 08:44:11 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={0xffffffffffffffff}, 0x4) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0xbaee, 0x7fff, 0x7, 0x141, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x2, 0xb}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f00000003c0)={&(0x7f0000000140)="6de58bfaf46f5ccc7099215e03d3ad892b674690dddfe39739edb1a2fb4e9650fdf3310e1fc73d410696f0213a8f38cebe09307149429abfdaca914376263daec2a33a2854606c37bcc551bad0b22c1e2f92591e46b126c07b75f9202453ec858a00b734c184298544e60e083451e29d7e70f5e859228ac2e418d73c3f1bde75f67271d8243891c008687520c04032c05e99c6ad0802e4cd1281819031f9b9d933e849a80a6b45f56df24fe265d7a4ca1695e6b0adc666df57a29c5c1dd8ffa0ea1cacc1503b9258a364befbec1a24ab0ba0dc", &(0x7f0000000240)=""/177, &(0x7f0000000300), &(0x7f0000000340)="2fd3c6857b3d656790a5c1b9252fa8562ca4", 0x0, r1}, 0x38) r2 = openat$cgroup_ro(r1, &(0x7f0000000540)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)={&(0x7f0000000600)='.\x00'}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0x8, 0xfffffffb, 0x8, 0x7ff, 0x3002, r1, 0x10001, '\x00', 0x0, r1, 0x3, 0x1}, 0x48) r5 = openat$cgroup_ro(r1, &(0x7f0000000700)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000740)={r1}, 0x8) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000007c0)={&(0x7f0000000780)='./file0\x00', 0x0, 0x10}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000840)={0x6, 0x1, &(0x7f0000000400)=@raw=[@jmp={0x5, 0x0, 0x6, 0xa, 0x1, 0x8, 0xfffffffffffffffc}], &(0x7f0000000440)='syzkaller\x00', 0x8, 0xa0, &(0x7f0000000480)=""/160, 0x41100, 0x6, '\x00', 0x0, 0x25, r2, 0x8, &(0x7f0000000580)={0x9, 0x2}, 0x8, 0x10, &(0x7f00000005c0)={0x1, 0x1, 0x2, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000800)=[r3, r1, r1, r0, r4, r5, r6, r7]}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000a80)={r5, 0x58, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b40)={0x6, 0x8, &(0x7f00000008c0)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x6, 0x3, 0x0, 0x5}, @exit, @map_idx={0x18, 0x4, 0x5, 0x0, 0x3}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000900)='syzkaller\x00', 0x6, 0xbb, &(0x7f0000000940)=""/187, 0x41100, 0x1, '\x00', r8, 0x25, r6, 0x8, &(0x7f0000000ac0)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x0, 0xe, 0x40ff, 0x8}, 0x10}, 0x80) r9 = syz_clone(0xa4000, &(0x7f0000000bc0)="d459531871b7f355d55995c715e2db0e42d518c0eddcef6857ba12cb7c4a39668dc9e39d30a849730e76e60111f171ca11251494b771a87ee6306e12e2d092a9ba4f1f07880ca9fcdde105298cdb7e9371b7a62f80105f41c3f9e177dde0be1125fc12259c899621ea002bfa68a1c32f5497c15dd3f70615b2244d6378f28e2b61dd5741cc918f70aca43afbefaac3e86501d424746730b6089f402445e9bec410aa39f09b4de19b47fb95f2af6858a5c357e708e1e0b1a9f77f0eb178273252139fd02622be1dc946314744f2617ab61858d16bca6235cdff6118aabd14494b9f8da20a6f8e43628f412c162ded6dc1677a0c5fb7a470", 0xf7, &(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)="97d85c3ed92f92a6401ba4d0dc4ae94168c3a50a7b33103cbc9169f4c49dd135fdf823f953f7008d2fca3ed9b0e593c0a1e6efda19576c7d026b7490857c8694240144b4cb79ae722e3c74dfe85ae120821cbf97b56b5a3cca5861d91da2d0d0475c21") r10 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e00)={&(0x7f0000000dc0)='rxrpc_disconnect_call\x00', r5}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e80)={r9, r10, 0x0, 0x2, &(0x7f0000000e40)=':\x00'}, 0x30) 08:44:11 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={0xffffffffffffffff}, 0x4) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0xbaee, 0x7fff, 0x7, 0x141, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x2, 0xb}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f00000003c0)={&(0x7f0000000140)="6de58bfaf46f5ccc7099215e03d3ad892b674690dddfe39739edb1a2fb4e9650fdf3310e1fc73d410696f0213a8f38cebe09307149429abfdaca914376263daec2a33a2854606c37bcc551bad0b22c1e2f92591e46b126c07b75f9202453ec858a00b734c184298544e60e083451e29d7e70f5e859228ac2e418d73c3f1bde75f67271d8243891c008687520c04032c05e99c6ad0802e4cd1281819031f9b9d933e849a80a6b45f56df24fe265d7a4ca1695e6b0adc666df57a29c5c1dd8ffa0ea1cacc1503b9258a364befbec1a24ab0ba0dc", &(0x7f0000000240)=""/177, &(0x7f0000000300), &(0x7f0000000340)="2fd3c6857b3d656790a5c1b9252fa8562ca4", 0x0, r1}, 0x38) r2 = openat$cgroup_ro(r1, &(0x7f0000000540)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)={&(0x7f0000000600)='.\x00'}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0x8, 0xfffffffb, 0x8, 0x7ff, 0x3002, r1, 0x10001, '\x00', 0x0, r1, 0x3, 0x1}, 0x48) r5 = openat$cgroup_ro(r1, &(0x7f0000000700)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000740)={r1}, 0x8) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000007c0)={&(0x7f0000000780)='./file0\x00', 0x0, 0x10}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000840)={0x6, 0x1, &(0x7f0000000400)=@raw=[@jmp={0x5, 0x0, 0x6, 0xa, 0x1, 0x8, 0xfffffffffffffffc}], &(0x7f0000000440)='syzkaller\x00', 0x8, 0xa0, &(0x7f0000000480)=""/160, 0x41100, 0x6, '\x00', 0x0, 0x25, r2, 0x8, &(0x7f0000000580)={0x9, 0x2}, 0x8, 0x10, &(0x7f00000005c0)={0x1, 0x1, 0x2, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000800)=[r3, r1, r1, r0, r4, r5, r6, r7]}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000a80)={r5, 0x58, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b40)={0x6, 0x8, &(0x7f00000008c0)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x6, 0x3, 0x0, 0x5}, @exit, @map_idx={0x18, 0x4, 0x5, 0x0, 0x3}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000900)='syzkaller\x00', 0x6, 0xbb, &(0x7f0000000940)=""/187, 0x41100, 0x1, '\x00', r8, 0x25, r6, 0x8, &(0x7f0000000ac0)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x0, 0xe, 0x40ff, 0x8}, 0x10}, 0x80) r9 = syz_clone(0xa4000, &(0x7f0000000bc0)="d459531871b7f355d55995c715e2db0e42d518c0eddcef6857ba12cb7c4a39668dc9e39d30a849730e76e60111f171ca11251494b771a87ee6306e12e2d092a9ba4f1f07880ca9fcdde105298cdb7e9371b7a62f80105f41c3f9e177dde0be1125fc12259c899621ea002bfa68a1c32f5497c15dd3f70615b2244d6378f28e2b61dd5741cc918f70aca43afbefaac3e86501d424746730b6089f402445e9bec410aa39f09b4de19b47fb95f2af6858a5c357e708e1e0b1a9f77f0eb178273252139fd02622be1dc946314744f2617ab61858d16bca6235cdff6118aabd14494b9f8da20a6f8e43628f412c162ded6dc1677a0c5fb7a470", 0xf7, &(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)="97d85c3ed92f92a6401ba4d0dc4ae94168c3a50a7b33103cbc9169f4c49dd135fdf823f953f7008d2fca3ed9b0e593c0a1e6efda19576c7d026b7490857c8694240144b4cb79ae722e3c74dfe85ae120821cbf97b56b5a3cca5861d91da2d0d0475c21") r10 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e00)={&(0x7f0000000dc0)='rxrpc_disconnect_call\x00', r5}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e80)={r9, r10, 0x0, 0x2, &(0x7f0000000e40)=':\x00'}, 0x30) 08:44:13 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000500)={0xffffffffffffffff, &(0x7f0000000480)="684bac1a5ef990e660cad34776dace476429418076ffdb65", &(0x7f00000004c0)=""/16}, 0x20) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000006d00000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='hugetlb.1GB.usage_in_bytes\x00', 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[], 0x32600) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.throttle.io_service_bytes_recursive\x00', 0x7a05, 0x1700) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = getpid() write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x8, 0x0, 0x0, 0x4, 0x8000, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x581d, 0x0, @perf_bp={&(0x7f0000000000), 0x3}, 0x2010, 0x5, 0x5, 0x0, 0x100000000, 0x0, 0x7, 0x0, 0x6}, r3, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000340)=0x7) syz_clone(0x44001000, 0x0, 0x0, &(0x7f0000001200), 0x0, 0x0) syz_clone(0x44000, &(0x7f0000000600)="96ae1a6e4a39f63ddba4325745857b3d4521af1b8ccfe89647d829a50c6b4615cfb6d4240780fbcefaa2e60d923214876d9a5127ff7e484e2ad23351bef475668954bb62d701390c37ebaa8c896556b364d21de3e2f93bd8be25488e2a07e74c17f6d3a9448d8237b04d1d129bed4f2f686873258ed4e534ae81d9a515c5767716e5516cadfc8a97a43660002a634c1350798c4e8fcb779ca4d2c179", 0x9c, &(0x7f0000000100), &(0x7f0000000300), &(0x7f00000006c0)="c9fc165bb0d14268b977a7d957a8ca4e103f6a773e9eae8775c8e824cb0a871143408ad5f0cace6bfde45c76bddaa4a6976334fe8a824fe50b463788aeae94d15d597c7d5deea465e61e4d3e2c29e2497d7edfaa3b10300eedc4145db2307415c47c5f044ca33022666bc6a0402555d3e1b247fe3def37aaf6c3c27a883c7829dd0f4b7291e1eb") bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000400), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000009c0)={r5, 0xe0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000540)=[0x0, 0x0, 0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000800), &(0x7f0000000840), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000880)}}, 0x10) 08:44:13 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={0xffffffffffffffff}, 0x4) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0xbaee, 0x7fff, 0x7, 0x141, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x2, 0xb}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f00000003c0)={&(0x7f0000000140)="6de58bfaf46f5ccc7099215e03d3ad892b674690dddfe39739edb1a2fb4e9650fdf3310e1fc73d410696f0213a8f38cebe09307149429abfdaca914376263daec2a33a2854606c37bcc551bad0b22c1e2f92591e46b126c07b75f9202453ec858a00b734c184298544e60e083451e29d7e70f5e859228ac2e418d73c3f1bde75f67271d8243891c008687520c04032c05e99c6ad0802e4cd1281819031f9b9d933e849a80a6b45f56df24fe265d7a4ca1695e6b0adc666df57a29c5c1dd8ffa0ea1cacc1503b9258a364befbec1a24ab0ba0dc", &(0x7f0000000240)=""/177, &(0x7f0000000300), &(0x7f0000000340)="2fd3c6857b3d656790a5c1b9252fa8562ca4", 0x0, r1}, 0x38) r2 = openat$cgroup_ro(r1, &(0x7f0000000540)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)={&(0x7f0000000600)='.\x00'}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0x8, 0xfffffffb, 0x8, 0x7ff, 0x3002, r1, 0x10001, '\x00', 0x0, r1, 0x3, 0x1}, 0x48) r5 = openat$cgroup_ro(r1, &(0x7f0000000700)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000740)={r1}, 0x8) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000007c0)={&(0x7f0000000780)='./file0\x00', 0x0, 0x10}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000840)={0x6, 0x1, &(0x7f0000000400)=@raw=[@jmp={0x5, 0x0, 0x6, 0xa, 0x1, 0x8, 0xfffffffffffffffc}], &(0x7f0000000440)='syzkaller\x00', 0x8, 0xa0, &(0x7f0000000480)=""/160, 0x41100, 0x6, '\x00', 0x0, 0x25, r2, 0x8, &(0x7f0000000580)={0x9, 0x2}, 0x8, 0x10, &(0x7f00000005c0)={0x1, 0x1, 0x2, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000800)=[r3, r1, r1, r0, r4, r5, r6, r7]}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000a80)={r5, 0x58, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b40)={0x6, 0x8, &(0x7f00000008c0)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x6, 0x3, 0x0, 0x5}, @exit, @map_idx={0x18, 0x4, 0x5, 0x0, 0x3}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000900)='syzkaller\x00', 0x6, 0xbb, &(0x7f0000000940)=""/187, 0x41100, 0x1, '\x00', r8, 0x25, r6, 0x8, &(0x7f0000000ac0)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x0, 0xe, 0x40ff, 0x8}, 0x10}, 0x80) r9 = syz_clone(0xa4000, &(0x7f0000000bc0)="d459531871b7f355d55995c715e2db0e42d518c0eddcef6857ba12cb7c4a39668dc9e39d30a849730e76e60111f171ca11251494b771a87ee6306e12e2d092a9ba4f1f07880ca9fcdde105298cdb7e9371b7a62f80105f41c3f9e177dde0be1125fc12259c899621ea002bfa68a1c32f5497c15dd3f70615b2244d6378f28e2b61dd5741cc918f70aca43afbefaac3e86501d424746730b6089f402445e9bec410aa39f09b4de19b47fb95f2af6858a5c357e708e1e0b1a9f77f0eb178273252139fd02622be1dc946314744f2617ab61858d16bca6235cdff6118aabd14494b9f8da20a6f8e43628f412c162ded6dc1677a0c5fb7a470", 0xf7, &(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)="97d85c3ed92f92a6401ba4d0dc4ae94168c3a50a7b33103cbc9169f4c49dd135fdf823f953f7008d2fca3ed9b0e593c0a1e6efda19576c7d026b7490857c8694240144b4cb79ae722e3c74dfe85ae120821cbf97b56b5a3cca5861d91da2d0d0475c21") r10 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e00)={&(0x7f0000000dc0)='rxrpc_disconnect_call\x00', r5}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e80)={r9, r10, 0x0, 0x2, &(0x7f0000000e40)=':\x00'}, 0x30) 08:44:13 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={0xffffffffffffffff}, 0x4) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0xbaee, 0x7fff, 0x7, 0x141, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x2, 0xb}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f00000003c0)={&(0x7f0000000140)="6de58bfaf46f5ccc7099215e03d3ad892b674690dddfe39739edb1a2fb4e9650fdf3310e1fc73d410696f0213a8f38cebe09307149429abfdaca914376263daec2a33a2854606c37bcc551bad0b22c1e2f92591e46b126c07b75f9202453ec858a00b734c184298544e60e083451e29d7e70f5e859228ac2e418d73c3f1bde75f67271d8243891c008687520c04032c05e99c6ad0802e4cd1281819031f9b9d933e849a80a6b45f56df24fe265d7a4ca1695e6b0adc666df57a29c5c1dd8ffa0ea1cacc1503b9258a364befbec1a24ab0ba0dc", &(0x7f0000000240)=""/177, &(0x7f0000000300), &(0x7f0000000340)="2fd3c6857b3d656790a5c1b9252fa8562ca4", 0x0, r1}, 0x38) r2 = openat$cgroup_ro(r1, &(0x7f0000000540)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)={&(0x7f0000000600)='.\x00'}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0x8, 0xfffffffb, 0x8, 0x7ff, 0x3002, r1, 0x10001, '\x00', 0x0, r1, 0x3, 0x1}, 0x48) r5 = openat$cgroup_ro(r1, &(0x7f0000000700)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000740)={r1}, 0x8) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000007c0)={&(0x7f0000000780)='./file0\x00', 0x0, 0x10}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000840)={0x6, 0x1, &(0x7f0000000400)=@raw=[@jmp={0x5, 0x0, 0x6, 0xa, 0x1, 0x8, 0xfffffffffffffffc}], &(0x7f0000000440)='syzkaller\x00', 0x8, 0xa0, &(0x7f0000000480)=""/160, 0x41100, 0x6, '\x00', 0x0, 0x25, r2, 0x8, &(0x7f0000000580)={0x9, 0x2}, 0x8, 0x10, &(0x7f00000005c0)={0x1, 0x1, 0x2, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000800)=[r3, r1, r1, r0, r4, r5, r6, r7]}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000a80)={r5, 0x58, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b40)={0x6, 0x8, &(0x7f00000008c0)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x6, 0x3, 0x0, 0x5}, @exit, @map_idx={0x18, 0x4, 0x5, 0x0, 0x3}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000900)='syzkaller\x00', 0x6, 0xbb, &(0x7f0000000940)=""/187, 0x41100, 0x1, '\x00', r8, 0x25, r6, 0x8, &(0x7f0000000ac0)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x0, 0xe, 0x40ff, 0x8}, 0x10}, 0x80) r9 = syz_clone(0xa4000, &(0x7f0000000bc0)="d459531871b7f355d55995c715e2db0e42d518c0eddcef6857ba12cb7c4a39668dc9e39d30a849730e76e60111f171ca11251494b771a87ee6306e12e2d092a9ba4f1f07880ca9fcdde105298cdb7e9371b7a62f80105f41c3f9e177dde0be1125fc12259c899621ea002bfa68a1c32f5497c15dd3f70615b2244d6378f28e2b61dd5741cc918f70aca43afbefaac3e86501d424746730b6089f402445e9bec410aa39f09b4de19b47fb95f2af6858a5c357e708e1e0b1a9f77f0eb178273252139fd02622be1dc946314744f2617ab61858d16bca6235cdff6118aabd14494b9f8da20a6f8e43628f412c162ded6dc1677a0c5fb7a470", 0xf7, &(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)="97d85c3ed92f92a6401ba4d0dc4ae94168c3a50a7b33103cbc9169f4c49dd135fdf823f953f7008d2fca3ed9b0e593c0a1e6efda19576c7d026b7490857c8694240144b4cb79ae722e3c74dfe85ae120821cbf97b56b5a3cca5861d91da2d0d0475c21") r10 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e00)={&(0x7f0000000dc0)='rxrpc_disconnect_call\x00', r5}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e80)={r9, r10, 0x0, 0x2, &(0x7f0000000e40)=':\x00'}, 0x30) 08:44:13 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x2, 0x0, 0x0, 0x0, 0x63, 0x11, 0x9d}, [@ldst={0x4}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3e0, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x76}, 0x48) 08:44:13 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 08:44:13 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x2, 0x0, 0x0, 0x0, 0x63, 0x11, 0x9d}, [@ldst={0x4}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3e0, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x76}, 0x48) 08:44:13 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000060000000000000000850000000f000000c5000000a000020095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000200)='kmem_cache_free\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r1, 0x0) execve(0x0, 0x0, 0x0) 08:44:13 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x2, 0x0, 0x0, 0x0, 0x63, 0x11, 0x9d}, [@ldst={0x4}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3e0, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x76}, 0x48) 08:44:13 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_FILTER(r1, 0x65, 0x1, 0x0, 0x0) bind$can_raw(r1, &(0x7f0000000040), 0x10) close_range(r0, 0xffffffffffffffff, 0x0) [ 93.717440][ T5126] Driver unsupported XDP return value 0 on prog (id 33) dev N/A, expect packet loss! 08:44:13 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000060000000000000000850000000f000000c5000000a000020095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000200)='kmem_cache_free\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r1, 0x0) execve(0x0, 0x0, 0x0) 08:44:13 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x2, 0x0, 0x0, 0x0, 0x63, 0x11, 0x9d}, [@ldst={0x4}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3e0, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x76}, 0x48) 08:44:13 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={0xffffffffffffffff}, 0x4) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0xbaee, 0x7fff, 0x7, 0x141, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x2, 0xb}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f00000003c0)={&(0x7f0000000140)="6de58bfaf46f5ccc7099215e03d3ad892b674690dddfe39739edb1a2fb4e9650fdf3310e1fc73d410696f0213a8f38cebe09307149429abfdaca914376263daec2a33a2854606c37bcc551bad0b22c1e2f92591e46b126c07b75f9202453ec858a00b734c184298544e60e083451e29d7e70f5e859228ac2e418d73c3f1bde75f67271d8243891c008687520c04032c05e99c6ad0802e4cd1281819031f9b9d933e849a80a6b45f56df24fe265d7a4ca1695e6b0adc666df57a29c5c1dd8ffa0ea1cacc1503b9258a364befbec1a24ab0ba0dc", &(0x7f0000000240)=""/177, &(0x7f0000000300), &(0x7f0000000340)="2fd3c6857b3d656790a5c1b9252fa8562ca4", 0x0, r1}, 0x38) r2 = openat$cgroup_ro(r1, &(0x7f0000000540)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)={&(0x7f0000000600)='.\x00'}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0x8, 0xfffffffb, 0x8, 0x7ff, 0x3002, r1, 0x10001, '\x00', 0x0, r1, 0x3, 0x1}, 0x48) r5 = openat$cgroup_ro(r1, &(0x7f0000000700)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000740)={r1}, 0x8) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000007c0)={&(0x7f0000000780)='./file0\x00', 0x0, 0x10}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000840)={0x6, 0x1, &(0x7f0000000400)=@raw=[@jmp={0x5, 0x0, 0x6, 0xa, 0x1, 0x8, 0xfffffffffffffffc}], &(0x7f0000000440)='syzkaller\x00', 0x8, 0xa0, &(0x7f0000000480)=""/160, 0x41100, 0x6, '\x00', 0x0, 0x25, r2, 0x8, &(0x7f0000000580)={0x9, 0x2}, 0x8, 0x10, &(0x7f00000005c0)={0x1, 0x1, 0x2, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000800)=[r3, r1, r1, r0, r4, r5, r6, r7]}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000a80)={r5, 0x58, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b40)={0x6, 0x8, &(0x7f00000008c0)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x6, 0x3, 0x0, 0x5}, @exit, @map_idx={0x18, 0x4, 0x5, 0x0, 0x3}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000900)='syzkaller\x00', 0x6, 0xbb, &(0x7f0000000940)=""/187, 0x41100, 0x1, '\x00', r8, 0x25, r6, 0x8, &(0x7f0000000ac0)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x0, 0xe, 0x40ff, 0x8}, 0x10}, 0x80) r9 = syz_clone(0xa4000, &(0x7f0000000bc0)="d459531871b7f355d55995c715e2db0e42d518c0eddcef6857ba12cb7c4a39668dc9e39d30a849730e76e60111f171ca11251494b771a87ee6306e12e2d092a9ba4f1f07880ca9fcdde105298cdb7e9371b7a62f80105f41c3f9e177dde0be1125fc12259c899621ea002bfa68a1c32f5497c15dd3f70615b2244d6378f28e2b61dd5741cc918f70aca43afbefaac3e86501d424746730b6089f402445e9bec410aa39f09b4de19b47fb95f2af6858a5c357e708e1e0b1a9f77f0eb178273252139fd02622be1dc946314744f2617ab61858d16bca6235cdff6118aabd14494b9f8da20a6f8e43628f412c162ded6dc1677a0c5fb7a470", 0xf7, &(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)="97d85c3ed92f92a6401ba4d0dc4ae94168c3a50a7b33103cbc9169f4c49dd135fdf823f953f7008d2fca3ed9b0e593c0a1e6efda19576c7d026b7490857c8694240144b4cb79ae722e3c74dfe85ae120821cbf97b56b5a3cca5861d91da2d0d0475c21") r10 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e00)={&(0x7f0000000dc0)='rxrpc_disconnect_call\x00', r5}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e80)={r9, r10, 0x0, 0x2, &(0x7f0000000e40)=':\x00'}, 0x30) [ 93.772329][ T25] audit: type=1400 audit(1686213853.900:206): avc: denied { setopt } for pid=5136 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 93.836348][ T25] audit: type=1400 audit(1686213853.900:207): avc: denied { bind } for pid=5136 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 08:44:14 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_FILTER(r1, 0x65, 0x1, 0x0, 0x0) bind$can_raw(r1, &(0x7f0000000040), 0x10) close_range(r0, 0xffffffffffffffff, 0x0) 08:44:14 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={0xffffffffffffffff}, 0x4) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0xbaee, 0x7fff, 0x7, 0x141, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x2, 0xb}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f00000003c0)={&(0x7f0000000140)="6de58bfaf46f5ccc7099215e03d3ad892b674690dddfe39739edb1a2fb4e9650fdf3310e1fc73d410696f0213a8f38cebe09307149429abfdaca914376263daec2a33a2854606c37bcc551bad0b22c1e2f92591e46b126c07b75f9202453ec858a00b734c184298544e60e083451e29d7e70f5e859228ac2e418d73c3f1bde75f67271d8243891c008687520c04032c05e99c6ad0802e4cd1281819031f9b9d933e849a80a6b45f56df24fe265d7a4ca1695e6b0adc666df57a29c5c1dd8ffa0ea1cacc1503b9258a364befbec1a24ab0ba0dc", &(0x7f0000000240)=""/177, &(0x7f0000000300), &(0x7f0000000340)="2fd3c6857b3d656790a5c1b9252fa8562ca4", 0x0, r1}, 0x38) r2 = openat$cgroup_ro(r1, &(0x7f0000000540)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)={&(0x7f0000000600)='.\x00'}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0x8, 0xfffffffb, 0x8, 0x7ff, 0x3002, r1, 0x10001, '\x00', 0x0, r1, 0x3, 0x1}, 0x48) r5 = openat$cgroup_ro(r1, &(0x7f0000000700)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000740)={r1}, 0x8) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000007c0)={&(0x7f0000000780)='./file0\x00', 0x0, 0x10}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000840)={0x6, 0x1, &(0x7f0000000400)=@raw=[@jmp={0x5, 0x0, 0x6, 0xa, 0x1, 0x8, 0xfffffffffffffffc}], &(0x7f0000000440)='syzkaller\x00', 0x8, 0xa0, &(0x7f0000000480)=""/160, 0x41100, 0x6, '\x00', 0x0, 0x25, r2, 0x8, &(0x7f0000000580)={0x9, 0x2}, 0x8, 0x10, &(0x7f00000005c0)={0x1, 0x1, 0x2, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000800)=[r3, r1, r1, r0, r4, r5, r6, r7]}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000a80)={r5, 0x58, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b40)={0x6, 0x8, &(0x7f00000008c0)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x6, 0x3, 0x0, 0x5}, @exit, @map_idx={0x18, 0x4, 0x5, 0x0, 0x3}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000900)='syzkaller\x00', 0x6, 0xbb, &(0x7f0000000940)=""/187, 0x41100, 0x1, '\x00', r8, 0x25, r6, 0x8, &(0x7f0000000ac0)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x0, 0xe, 0x40ff, 0x8}, 0x10}, 0x80) r9 = syz_clone(0xa4000, &(0x7f0000000bc0)="d459531871b7f355d55995c715e2db0e42d518c0eddcef6857ba12cb7c4a39668dc9e39d30a849730e76e60111f171ca11251494b771a87ee6306e12e2d092a9ba4f1f07880ca9fcdde105298cdb7e9371b7a62f80105f41c3f9e177dde0be1125fc12259c899621ea002bfa68a1c32f5497c15dd3f70615b2244d6378f28e2b61dd5741cc918f70aca43afbefaac3e86501d424746730b6089f402445e9bec410aa39f09b4de19b47fb95f2af6858a5c357e708e1e0b1a9f77f0eb178273252139fd02622be1dc946314744f2617ab61858d16bca6235cdff6118aabd14494b9f8da20a6f8e43628f412c162ded6dc1677a0c5fb7a470", 0xf7, &(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)="97d85c3ed92f92a6401ba4d0dc4ae94168c3a50a7b33103cbc9169f4c49dd135fdf823f953f7008d2fca3ed9b0e593c0a1e6efda19576c7d026b7490857c8694240144b4cb79ae722e3c74dfe85ae120821cbf97b56b5a3cca5861d91da2d0d0475c21") r10 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e00)={&(0x7f0000000dc0)='rxrpc_disconnect_call\x00', r5}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e80)={r9, r10, 0x0, 0x2, &(0x7f0000000e40)=':\x00'}, 0x30) 08:44:14 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000060000000000000000850000000f000000c5000000a000020095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000200)='kmem_cache_free\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r1, 0x0) execve(0x0, 0x0, 0x0) 08:44:14 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_FILTER(r1, 0x65, 0x1, 0x0, 0x0) bind$can_raw(r1, &(0x7f0000000040), 0x10) close_range(r0, 0xffffffffffffffff, 0x0) 08:44:14 executing program 4: r0 = open(&(0x7f0000000180)='./bus\x00', 0x149a42, 0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f0000001100)='.', 0xfffffd3c}], 0x1) r1 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) fremovexattr(r1, &(0x7f0000000040)=@known='system.posix_acl_access\x00') creat(&(0x7f0000000140)='./bus\x00', 0x0) 08:44:14 executing program 3: syz_emit_ethernet(0x46, &(0x7f0000000080)={@multicast, @dev, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x1, 0x0, @private=0xa010101, @local}, @dest_unreach={0x3, 0x4, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x89, 0x0, @private=0x2, @empty=0xe0000000}, "ad00000071c50000"}}}}}, 0x0) 08:44:14 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_FILTER(r1, 0x65, 0x1, 0x0, 0x0) bind$can_raw(r1, &(0x7f0000000040), 0x10) close_range(r0, 0xffffffffffffffff, 0x0) 08:44:14 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_FILTER(r1, 0x65, 0x1, 0x0, 0x0) bind$can_raw(r1, &(0x7f0000000040), 0x10) close_range(r0, 0xffffffffffffffff, 0x0) 08:44:14 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000060000000000000000850000000f000000c5000000a000020095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000200)='kmem_cache_free\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r1, 0x0) execve(0x0, 0x0, 0x0) 08:44:14 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={0xffffffffffffffff}, 0x4) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0xbaee, 0x7fff, 0x7, 0x141, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x2, 0xb}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f00000003c0)={&(0x7f0000000140)="6de58bfaf46f5ccc7099215e03d3ad892b674690dddfe39739edb1a2fb4e9650fdf3310e1fc73d410696f0213a8f38cebe09307149429abfdaca914376263daec2a33a2854606c37bcc551bad0b22c1e2f92591e46b126c07b75f9202453ec858a00b734c184298544e60e083451e29d7e70f5e859228ac2e418d73c3f1bde75f67271d8243891c008687520c04032c05e99c6ad0802e4cd1281819031f9b9d933e849a80a6b45f56df24fe265d7a4ca1695e6b0adc666df57a29c5c1dd8ffa0ea1cacc1503b9258a364befbec1a24ab0ba0dc", &(0x7f0000000240)=""/177, &(0x7f0000000300), &(0x7f0000000340)="2fd3c6857b3d656790a5c1b9252fa8562ca4", 0x0, r1}, 0x38) r2 = openat$cgroup_ro(r1, &(0x7f0000000540)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)={&(0x7f0000000600)='.\x00'}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0x8, 0xfffffffb, 0x8, 0x7ff, 0x3002, r1, 0x10001, '\x00', 0x0, r1, 0x3, 0x1}, 0x48) r5 = openat$cgroup_ro(r1, &(0x7f0000000700)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000740)={r1}, 0x8) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000007c0)={&(0x7f0000000780)='./file0\x00', 0x0, 0x10}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000840)={0x6, 0x1, &(0x7f0000000400)=@raw=[@jmp={0x5, 0x0, 0x6, 0xa, 0x1, 0x8, 0xfffffffffffffffc}], &(0x7f0000000440)='syzkaller\x00', 0x8, 0xa0, &(0x7f0000000480)=""/160, 0x41100, 0x6, '\x00', 0x0, 0x25, r2, 0x8, &(0x7f0000000580)={0x9, 0x2}, 0x8, 0x10, &(0x7f00000005c0)={0x1, 0x1, 0x2, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000800)=[r3, r1, r1, r0, r4, r5, r6, r7]}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000a80)={r5, 0x58, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b40)={0x6, 0x8, &(0x7f00000008c0)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x6, 0x3, 0x0, 0x5}, @exit, @map_idx={0x18, 0x4, 0x5, 0x0, 0x3}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000900)='syzkaller\x00', 0x6, 0xbb, &(0x7f0000000940)=""/187, 0x41100, 0x1, '\x00', r8, 0x25, r6, 0x8, &(0x7f0000000ac0)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x0, 0xe, 0x40ff, 0x8}, 0x10}, 0x80) r9 = syz_clone(0xa4000, &(0x7f0000000bc0)="d459531871b7f355d55995c715e2db0e42d518c0eddcef6857ba12cb7c4a39668dc9e39d30a849730e76e60111f171ca11251494b771a87ee6306e12e2d092a9ba4f1f07880ca9fcdde105298cdb7e9371b7a62f80105f41c3f9e177dde0be1125fc12259c899621ea002bfa68a1c32f5497c15dd3f70615b2244d6378f28e2b61dd5741cc918f70aca43afbefaac3e86501d424746730b6089f402445e9bec410aa39f09b4de19b47fb95f2af6858a5c357e708e1e0b1a9f77f0eb178273252139fd02622be1dc946314744f2617ab61858d16bca6235cdff6118aabd14494b9f8da20a6f8e43628f412c162ded6dc1677a0c5fb7a470", 0xf7, &(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)="97d85c3ed92f92a6401ba4d0dc4ae94168c3a50a7b33103cbc9169f4c49dd135fdf823f953f7008d2fca3ed9b0e593c0a1e6efda19576c7d026b7490857c8694240144b4cb79ae722e3c74dfe85ae120821cbf97b56b5a3cca5861d91da2d0d0475c21") r10 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e00)={&(0x7f0000000dc0)='rxrpc_disconnect_call\x00', r5}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e80)={r9, r10, 0x0, 0x2, &(0x7f0000000e40)=':\x00'}, 0x30) 08:44:14 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_FILTER(r1, 0x65, 0x1, 0x0, 0x0) bind$can_raw(r1, &(0x7f0000000040), 0x10) close_range(r0, 0xffffffffffffffff, 0x0) 08:44:14 executing program 3: syz_emit_ethernet(0x46, &(0x7f0000000080)={@multicast, @dev, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x1, 0x0, @private=0xa010101, @local}, @dest_unreach={0x3, 0x4, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x89, 0x0, @private=0x2, @empty=0xe0000000}, "ad00000071c50000"}}}}}, 0x0) 08:44:14 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_FILTER(r1, 0x65, 0x1, 0x0, 0x0) bind$can_raw(r1, &(0x7f0000000040), 0x10) close_range(r0, 0xffffffffffffffff, 0x0) 08:44:14 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x3, 0x4, &(0x7f0000000080)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x29}]}, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 08:44:14 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000180)=[@in={0x2, 0x0, @private=0xa010101}], 0x10) 08:44:14 executing program 3: syz_emit_ethernet(0x46, &(0x7f0000000080)={@multicast, @dev, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x1, 0x0, @private=0xa010101, @local}, @dest_unreach={0x3, 0x4, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x89, 0x0, @private=0x2, @empty=0xe0000000}, "ad00000071c50000"}}}}}, 0x0) [ 94.360533][ T5157] ================================================================== [ 94.368663][ T5157] BUG: KCSAN: data-race in xas_find_marked / xas_init_marks [ 94.376002][ T5157] [ 94.378333][ T5157] read-write to 0xffff888136c288f8 of 8 bytes by task 5177 on cpu 0: [ 94.386408][ T5157] xas_init_marks+0x17e/0x320 [ 94.391116][ T5157] xas_store+0x216/0xc90 [ 94.395359][ T5157] delete_from_page_cache_batch+0x341/0x750 [ 94.401249][ T5157] truncate_inode_pages_range+0x354/0x800 [ 94.406973][ T5157] truncate_pagecache+0x53/0x70 [ 94.411831][ T5157] ext4_setattr+0xa03/0xec0 [ 94.416335][ T5157] notify_change+0x8c3/0x930 [ 94.420920][ T5157] do_truncate+0x116/0x150 [ 94.425337][ T5157] path_openat+0x1984/0x1d00 [ 94.429927][ T5157] do_filp_open+0xf6/0x200 [ 94.434341][ T5157] do_sys_openat2+0xb5/0x2a0 [ 94.438932][ T5157] __x64_sys_creat+0x66/0x90 [ 94.443515][ T5157] do_syscall_64+0x41/0xc0 [ 94.447924][ T5157] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 94.453824][ T5157] [ 94.456167][ T5157] read to 0xffff888136c288f8 of 8 bytes by task 5157 on cpu 1: [ 94.463705][ T5157] xas_find_marked+0x216/0x660 [ 94.468483][ T5157] find_get_entry+0x5d/0x290 [ 94.473086][ T5157] filemap_get_folios_tag+0x136/0x230 [ 94.478460][ T5157] mpage_prepare_extent_to_map+0x321/0xb50 [ 94.484270][ T5157] ext4_do_writepages+0x717/0x21e0 [ 94.489379][ T5157] ext4_writepages+0x15e/0x2e0 [ 94.494147][ T5157] do_writepages+0x1c5/0x340 [ 94.498756][ T5157] filemap_fdatawrite_wbc+0xdb/0xf0 [ 94.503952][ T5157] file_write_and_wait_range+0xfa/0x190 [ 94.509506][ T5157] ext4_sync_file+0x10d/0x730 [ 94.514188][ T5157] vfs_fsync_range+0x10b/0x120 [ 94.518948][ T5157] ext4_buffered_write_iter+0x397/0x3e0 [ 94.524488][ T5157] ext4_file_write_iter+0xd7/0x10e0 [ 94.529681][ T5157] do_iter_write+0x4ae/0x770 [ 94.534277][ T5157] vfs_writev+0x1a2/0x310 [ 94.538602][ T5157] do_writev+0xf8/0x220 [ 94.542757][ T5157] __x64_sys_writev+0x45/0x50 [ 94.547428][ T5157] do_syscall_64+0x41/0xc0 [ 94.551838][ T5157] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 94.557732][ T5157] [ 94.560045][ T5157] value changed: 0xfffffffffffc0000 -> 0xffffffffc0000000 [ 94.567139][ T5157] [ 94.569451][ T5157] Reported by Kernel Concurrency Sanitizer on: [ 94.575585][ T5157] CPU: 1 PID: 5157 Comm: syz-executor.4 Not tainted 6.4.0-rc5-syzkaller-00024-g5f63595ebd82 #0 [ 94.585898][ T5157] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/25/2023 [ 94.595945][ T5157] ================================================================== 08:44:14 executing program 4: r0 = open(&(0x7f0000000180)='./bus\x00', 0x149a42, 0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f0000001100)='.', 0xfffffd3c}], 0x1) r1 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) fremovexattr(r1, &(0x7f0000000040)=@known='system.posix_acl_access\x00') creat(&(0x7f0000000140)='./bus\x00', 0x0) 08:44:14 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0xe, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xa0}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 08:44:14 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000180)=[@in={0x2, 0x0, @private=0xa010101}], 0x10) 08:44:14 executing program 3: syz_emit_ethernet(0x46, &(0x7f0000000080)={@multicast, @dev, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x1, 0x0, @private=0xa010101, @local}, @dest_unreach={0x3, 0x4, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x89, 0x0, @private=0x2, @empty=0xe0000000}, "ad00000071c50000"}}}}}, 0x0) 08:44:14 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x3, 0x4, &(0x7f0000000080)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x29}]}, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 08:44:14 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000940)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') r0 = open(&(0x7f0000000000)='./bus\x00', 0x14167e, 0x0) r1 = open(&(0x7f00000004c0)='./bus\x00', 0x42042, 0x0) ftruncate(r1, 0x2008002) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000180)=ANY=[], 0x50f79f) geteuid() getuid() r3 = gettid() process_vm_writev(r3, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x44, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) 08:44:14 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000180)=[@in={0x2, 0x0, @private=0xa010101}], 0x10) [ 94.619134][ T5157] syz-executor.4 (5157) used greatest stack depth: 9928 bytes left [ 94.642997][ T25] audit: type=1400 audit(1686213854.770:208): avc: denied { mount } for pid=5190 comm="syz-executor.5" name="/" dev="ramfs" ino=22160 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 08:44:14 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000180)=[@in={0x2, 0x0, @private=0xa010101}], 0x10) 08:44:14 executing program 3: r0 = open(&(0x7f0000000180)='./bus\x00', 0x149a42, 0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f0000001100)='.', 0xfffffd3c}], 0x1) r1 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) fremovexattr(r1, &(0x7f0000000040)=@known='system.posix_acl_access\x00') creat(&(0x7f0000000140)='./bus\x00', 0x0) 08:44:14 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x3, 0x4, &(0x7f0000000080)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x29}]}, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 08:44:14 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0xe, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xa0}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 08:44:14 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x3, 0x4, &(0x7f0000000080)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x29}]}, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 94.681813][ T25] audit: type=1400 audit(1686213854.800:209): avc: denied { execute } for pid=5190 comm="syz-executor.5" path="/root/syzkaller-testdir1182241252/syzkaller.3Ul5Da/93/file0/bus" dev="ramfs" ino=22164 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:ramfs_t tclass=file permissive=1 [ 94.904042][ T25] audit: type=1400 audit(1686213855.030:210): avc: denied { unmount } for pid=3062 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 08:44:15 executing program 4: r0 = open(&(0x7f0000000180)='./bus\x00', 0x149a42, 0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f0000001100)='.', 0xfffffd3c}], 0x1) r1 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) fremovexattr(r1, &(0x7f0000000040)=@known='system.posix_acl_access\x00') creat(&(0x7f0000000140)='./bus\x00', 0x0) 08:44:15 executing program 0: r0 = open(&(0x7f0000000180)='./bus\x00', 0x149a42, 0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f0000001100)='.', 0xfffffd3c}], 0x1) r1 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) fremovexattr(r1, &(0x7f0000000040)=@known='system.posix_acl_access\x00') creat(&(0x7f0000000140)='./bus\x00', 0x0) 08:44:15 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0xe, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xa0}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 08:44:15 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000040)=[{0x14, 0x0, 0x0, 0x8}, {0x25}, {0x6, 0x0, 0x0, 0x7ffffdc0}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 08:44:15 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000940)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') r0 = open(&(0x7f0000000000)='./bus\x00', 0x14167e, 0x0) r1 = open(&(0x7f00000004c0)='./bus\x00', 0x42042, 0x0) ftruncate(r1, 0x2008002) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000180)=ANY=[], 0x50f79f) geteuid() getuid() r3 = gettid() process_vm_writev(r3, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x44, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) 08:44:15 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000040)=[{0x14, 0x0, 0x0, 0x8}, {0x25}, {0x6, 0x0, 0x0, 0x7ffffdc0}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 08:44:15 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0xe, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xa0}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 08:44:15 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000040)=[{0x14, 0x0, 0x0, 0x8}, {0x25}, {0x6, 0x0, 0x0, 0x7ffffdc0}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 08:44:15 executing program 3: r0 = open(&(0x7f0000000180)='./bus\x00', 0x149a42, 0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f0000001100)='.', 0xfffffd3c}], 0x1) r1 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) fremovexattr(r1, &(0x7f0000000040)=@known='system.posix_acl_access\x00') creat(&(0x7f0000000140)='./bus\x00', 0x0) 08:44:15 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x24}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000600)=ANY=[@ANYBLOB="38000000240007750000004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000003240)=@newtfilter={0x7c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {0x2}}, [@filter_kind_options=@f_cgroup={{0xb}, {0x4c, 0x2, [@TCA_CGROUP_POLICE={0x10, 0x2, [@TCA_POLICE_RATE64={0xc}]}, @TCA_CGROUP_ACT={0x38, 0x1, [@m_connmark={0x34, 0x0, 0x0, 0x0, {{0xd}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}}]}, 0x7c}}, 0x0) 08:44:15 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000040)=[{0x14, 0x0, 0x0, 0x8}, {0x25}, {0x6, 0x0, 0x0, 0x7ffffdc0}]}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 08:44:15 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x3e8, 0x200, 0x0, 0x100, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@initdev={0xac, 0x1e, 0x0, 0x0}, @local, 0x0, 0x0, 0x0, 0x0, {@mac=@broadcast}, {@mac=@multicast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'xfrm0\x00', 'erspan0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00', 0x0, 0x4}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x2}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {@mac=@multicast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00', 0x0, 0x4}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) [ 95.534218][ T5237] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. 08:44:16 executing program 4: r0 = open(&(0x7f0000000180)='./bus\x00', 0x149a42, 0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f0000001100)='.', 0xfffffd3c}], 0x1) r1 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) fremovexattr(r1, &(0x7f0000000040)=@known='system.posix_acl_access\x00') creat(&(0x7f0000000140)='./bus\x00', 0x0) 08:44:16 executing program 0: r0 = open(&(0x7f0000000180)='./bus\x00', 0x149a42, 0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f0000001100)='.', 0xfffffd3c}], 0x1) r1 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) fremovexattr(r1, &(0x7f0000000040)=@known='system.posix_acl_access\x00') creat(&(0x7f0000000140)='./bus\x00', 0x0) 08:44:16 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000940)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') r0 = open(&(0x7f0000000000)='./bus\x00', 0x14167e, 0x0) r1 = open(&(0x7f00000004c0)='./bus\x00', 0x42042, 0x0) ftruncate(r1, 0x2008002) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000180)=ANY=[], 0x50f79f) geteuid() getuid() r3 = gettid() process_vm_writev(r3, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x44, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) 08:44:16 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x3e8, 0x200, 0x0, 0x100, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@initdev={0xac, 0x1e, 0x0, 0x0}, @local, 0x0, 0x0, 0x0, 0x0, {@mac=@broadcast}, {@mac=@multicast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'xfrm0\x00', 'erspan0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00', 0x0, 0x4}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x2}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {@mac=@multicast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00', 0x0, 0x4}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 08:44:16 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x24}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000600)=ANY=[@ANYBLOB="38000000240007750000004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000003240)=@newtfilter={0x7c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {0x2}}, [@filter_kind_options=@f_cgroup={{0xb}, {0x4c, 0x2, [@TCA_CGROUP_POLICE={0x10, 0x2, [@TCA_POLICE_RATE64={0xc}]}, @TCA_CGROUP_ACT={0x38, 0x1, [@m_connmark={0x34, 0x0, 0x0, 0x0, {{0xd}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}}]}, 0x7c}}, 0x0) 08:44:16 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x3e8, 0x200, 0x0, 0x100, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@initdev={0xac, 0x1e, 0x0, 0x0}, @local, 0x0, 0x0, 0x0, 0x0, {@mac=@broadcast}, {@mac=@multicast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'xfrm0\x00', 'erspan0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00', 0x0, 0x4}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x2}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {@mac=@multicast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00', 0x0, 0x4}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 08:44:16 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x3e8, 0x200, 0x0, 0x100, 0x300, 0x300, 0x300, 0x4, 0x0, {[{{@arp={@initdev={0xac, 0x1e, 0x0, 0x0}, @local, 0x0, 0x0, 0x0, 0x0, {@mac=@broadcast}, {@mac=@multicast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'xfrm0\x00', 'erspan0\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00', 0x0, 0x4}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x2}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {}, {@mac=@multicast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00', 0x0, 0x4}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) [ 95.909534][ T5253] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. 08:44:16 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x24}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000600)=ANY=[@ANYBLOB="38000000240007750000004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000003240)=@newtfilter={0x7c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {0x2}}, [@filter_kind_options=@f_cgroup={{0xb}, {0x4c, 0x2, [@TCA_CGROUP_POLICE={0x10, 0x2, [@TCA_POLICE_RATE64={0xc}]}, @TCA_CGROUP_ACT={0x38, 0x1, [@m_connmark={0x34, 0x0, 0x0, 0x0, {{0xd}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}}]}, 0x7c}}, 0x0) [ 96.013223][ T5264] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. 08:44:16 executing program 3: r0 = open(&(0x7f0000000180)='./bus\x00', 0x149a42, 0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f0000001100)='.', 0xfffffd3c}], 0x1) r1 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) fremovexattr(r1, &(0x7f0000000040)=@known='system.posix_acl_access\x00') creat(&(0x7f0000000140)='./bus\x00', 0x0) 08:44:16 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) chroot(&(0x7f00000000c0)='./file0/../file0\x00') mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) open_tree(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x0) 08:44:16 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x24}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000600)=ANY=[@ANYBLOB="38000000240007750000004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000003240)=@newtfilter={0x7c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {0x2}}, [@filter_kind_options=@f_cgroup={{0xb}, {0x4c, 0x2, [@TCA_CGROUP_POLICE={0x10, 0x2, [@TCA_POLICE_RATE64={0xc}]}, @TCA_CGROUP_ACT={0x38, 0x1, [@m_connmark={0x34, 0x0, 0x0, 0x0, {{0xd}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}}]}, 0x7c}}, 0x0) 08:44:16 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000940)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') r0 = open(&(0x7f0000000000)='./bus\x00', 0x14167e, 0x0) r1 = open(&(0x7f00000004c0)='./bus\x00', 0x42042, 0x0) ftruncate(r1, 0x2008002) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000180)=ANY=[], 0x50f79f) geteuid() getuid() r3 = gettid() process_vm_writev(r3, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x44, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) [ 96.409016][ T5270] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. 08:44:16 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000000c0)=""/36, 0x1a, 0x24, 0x1}, 0x20) 08:44:16 executing program 0: r0 = open(&(0x7f0000000180)='./bus\x00', 0x149a42, 0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f0000001100)='.', 0xfffffd3c}], 0x1) r1 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) fremovexattr(r1, &(0x7f0000000040)=@known='system.posix_acl_access\x00') creat(&(0x7f0000000140)='./bus\x00', 0x0) 08:44:16 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) chroot(&(0x7f00000000c0)='./file0/../file0\x00') mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) open_tree(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x0) 08:44:16 executing program 4: r0 = open(&(0x7f0000000180)='./bus\x00', 0x1452fe, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4002011, r0, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) r1 = open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000548c0)={0x0, [], 0x0, "b514444c55d2a4"}) pwritev2(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x78a00}], 0x1, 0x3fc00, 0x0, 0x3) 08:44:16 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000000c0)=""/36, 0x1a, 0x24, 0x1}, 0x20) 08:44:16 executing program 5: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]}) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x85, &(0x7f0000000340)={0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}, 0x90) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)) 08:44:16 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000000c0)=""/36, 0x1a, 0x24, 0x1}, 0x20) 08:44:16 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) chroot(&(0x7f00000000c0)='./file0/../file0\x00') mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) open_tree(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x0) [ 96.720933][ T25] audit: type=1326 audit(1686213856.850:211): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5287 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f770c23f169 code=0x0 08:44:17 executing program 4: r0 = open(&(0x7f0000000180)='./bus\x00', 0x1452fe, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4002011, r0, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) r1 = open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000548c0)={0x0, [], 0x0, "b514444c55d2a4"}) pwritev2(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x78a00}], 0x1, 0x3fc00, 0x0, 0x3) 08:44:17 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000000c0)=""/36, 0x1a, 0x24, 0x1}, 0x20) 08:44:17 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x40841, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000000)={@val, @void, @eth={@broadcast, @broadcast, @val={@void}, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x78, 0x0, 0x0, 0x0, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev}, {0x0, 0x6558, 0x64, 0x0, @wg=@response={0x2, 0x0, 0x8, "2a81be1206811931fa99c9934b27df63263e20b69e2333636be2b8078af79652", "59ef9bd945912d9c00d5307c7c9286ba", {"e1e103a9720c50eaba20a1151787e551", "d3f3433970143c6f609f1a6d2b9e337a"}}}}}}}}, 0x8e) 08:44:17 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) chroot(&(0x7f00000000c0)='./file0/../file0\x00') mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) open_tree(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x0) 08:44:17 executing program 1: syz_open_procfs$namespace(0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000100)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ioctl$AUTOFS_IOC_EXPIRE(r0, 0x810c9365, &(0x7f00000002c0)={{}, 0x100, './bus\x00'}) sched_setscheduler(0x0, 0x1, &(0x7f0000000400)=0x8) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x4008804) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10120, 0x2, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x6900) r6 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r6, 0x2007ffb) r7 = open(&(0x7f0000000240)='./bus\x00', 0x0, 0x0) openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) r8 = fsopen(&(0x7f0000000040)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r8, 0x6, 0x0, 0x0, 0x0) r9 = fsmount(r8, 0x0, 0x0) mknodat(r9, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendfile(r5, r7, 0x0, 0x280001d00c0cd) ftruncate(r5, 0x0) [ 97.031437][ T5306] syz-executor.3 uses obsolete (PF_INET,SOCK_PACKET) [ 97.053645][ T25] audit: type=1400 audit(1686213857.180:212): avc: denied { ioctl } for pid=5305 comm="syz-executor.3" path="socket:[23299]" dev="sockfs" ino=23299 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 08:44:17 executing program 2: r0 = socket(0xa, 0x1, 0x0) getsockopt$WPAN_SECURITY_LEVEL(r0, 0x0, 0xe, 0x0, &(0x7f0000000140)) 08:44:17 executing program 4: r0 = open(&(0x7f0000000180)='./bus\x00', 0x1452fe, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4002011, r0, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) r1 = open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000548c0)={0x0, [], 0x0, "b514444c55d2a4"}) pwritev2(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x78a00}], 0x1, 0x3fc00, 0x0, 0x3) 08:44:17 executing program 0: set_mempolicy(0x3, &(0x7f0000000080)=0xfff, 0x5) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x5) syz_clone(0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0) 08:44:17 executing program 2: r0 = socket(0xa, 0x1, 0x0) getsockopt$WPAN_SECURITY_LEVEL(r0, 0x0, 0xe, 0x0, &(0x7f0000000140))